|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 4 scholarly publications.
Image encryption
Biometrics
Computer programming
Receivers
Signal processing
Computer security
Distortion