Fig. 6From: JPEG Privacy and Security framework for social networking and GLAM servicesRecovery of the original from a secure transmorphed JPEG imageBack to article page