|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 1 scholarly publication.
Image encryption
Biometrics
Image compression
Steganography
Image processing
Multiplexing
Information security