Fig. 8From: JPEG Privacy and Security framework for social networking and GLAM servicesAuthorization of access to a protected imageBack to article page