Figure 2: Image authentication performances with varying thresholds.