need to secure the access to electronically stored images or photos (ie the information
conveyed in images/photos) in particular when their physical storages are exposed to
hackers or any other malicious person. This hap pens for example when a storing electronic
server is hacked and when the physical storage of images is susceptible to be disclosed or
when an image is not protected against copying processes. Each of these situations can …