Figure 28From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Hamming distances by varying one α-parameter (resolution level 1-2). Back to article page