|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 8 scholarly publications.
Image compression
Image quality
Image encryption
Web 2.0 technologies
Social networks
Computer security
Network security