|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 1 scholarly publication.
Sensors
Information security
Computer generated holography
Data hiding
Holograms
Holography
Prototyping