Fig. 4From: JPEG Privacy and Security framework for social networking and GLAM servicesExamples of secure transmorphing operations applied to an imageBack to article page