|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 13 scholarly publications.
Image encryption
Computer security
3D image processing
Detection and tracking algorithms
3D image reconstruction
Image restoration
Transform theory