Figure 21From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Attacked Lena image and Hamming distances to hash strings of the original generated with 100 random keys (50-byte hash at decomposition depth 5). Back to article page