|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 1 scholarly publication.
Biometrics
Image encryption
Fourier transforms
Symmetric-key encryption
Computer security
Cryptography
Computer programming