|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 4 scholarly publications.
Image compression
Biometrics
Steganography
Image encryption
Information security
Multiplexing
Data hiding