... the JPEG2000 framework, described in Sections4.4 and 4.5, mutual authentication is obtained throughshared-key image encryption. In fact, during the multistagechallenge-response process for authentication, ... watermarking, or image scramblingto insert secret visual information into messages for server authentication. Several visual login systems have been proposed in theliterature, many implementing ... method using public-key encryption allowing back-ward compatibility with JPEG2000, ” in Proceedings of the Inter-national Conference on Image Processing (ICIP ’04), vol. 2, pp.3435–3438, Singapore,...