Figure 27From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Attacked Plane image and Hamming distances to hash strings of Lena generated with 100 random keys (16 byte hash at decomposition depth 7). Back to article page