Figure 25From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Attacked Goldhill image and Hamming distances to hash strings of the original generated with 100 random keys (128-byte hash at decomposition depth 6). Back to article page