Figure 13From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Number of hash bytes required to detect the removed man in the Goldhill image (hash strings generated with 100 random keys versus "standard" JPEG2000 PBHash, decomposition depths 4, 5, 6, and 8). Back to article page