Figure 22From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Attacked Plane image and Hamming distances to hash strings of the original generated with 100 random keys (50-byte hash at decomposition depth 5). Back to article page