|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 2 scholarly publications.
Digital watermarking
Targeting Task Performance metric
Databases
Computer security
Data hiding
Image compression
Fuzzy logic