Introduction - If you have any usage issues, please Google them yourself
The logistic- map sequences to encrypt the watermark are used. The original audio signal in DWT
(Discrete Wavelet Transform) domain is seperated into some pieces determined by the ratio between the length of
the low frequency parts and the length of the encrypted watermark. Every bit of the watermark is added into the
relevant pieces of the low frequency parts in the DWT domain. Experimental results show that the algorithm is
robust against some StirMark attacks.