Figure 16From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Hamming distances among 128-byte hashes (decomposition depth 6) generated with 200 random keys: hash of the original image is compared to the modified image, both use the same key (Goldhill, Plane, Lena). Back to article page