|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one

CITATIONS
Cited by 14 scholarly publications.
Computer security
Image encryption
Information security
Image registration
Image compression
Image processing
Image segmentation