|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 1 scholarly publication.
Computer security
Image encryption
Information security
Joint transforms
Binary data
Fourier transforms
Phase shifts