|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 2 scholarly publications.
Biometrics
Telecommunications
Chaos
Feature extraction
System identification
Image encryption
Computer security