Figure 24From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Attacked Lena image and Hamming distances to hash strings of the original generated with 100 random keys (128-byte hash at decomposition depth 6). Back to article page