|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 4 scholarly publications.
Image encryption
Computer generated holography
Image processing
Near field diffraction
Transform theory
Computer security
Computing systems