Fig. 4From: Robust image hashing through DWT-SVD and spectral residual methodDepict the image restoration and authenticationBack to article page