An examiner told me there is a grammatical error in your paragraph but I cannot find it.
For BPF attack, the watermarked speech signals were
passed through a BPF with bandwidth of from 100 Hz to
7500 Hz and the central frequency of 4 KHz. By changing
the bandwidth of the BPF, the watermarked speech signals
were filtered. Then, the fragile watermark was extracted as
in Figure 10. As seen, the random nature of the extracted
watermark shows that any BPF can be detected.