Figure 8From: Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication Attacked Goldhill and Lena images. Back to article page