Fig. 1From: Verifiable image revision from chameleon hashesThe workflow of a privacy-aware image authentication systemBack to article page