Fig. 3From: Verifiable image revision from chameleon hashesFrame of image authentication scheme supporting verifiable image revisionBack to article page