|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 2 scholarly publications.
Image encryption
Computer security
Symmetric-key encryption
Image transmission
Visualization
Receivers
Statistical analysis