User requirements of image security systems
User requirements of image security systems
- Author(s): R. Green
- DOI: 10.1049/ic:20000224
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
IEE Seminar on Secure Images and Image Authentication — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): R. Green Source: IEE Seminar on Secure Images and Image Authentication, 2000 page ()
- Conference: IEE Seminar on Secure Images and Image Authentication
(12 pages)
Related content
content/conferences/10.1049/ic_20000224
pub_keyword,iet_inspecKeyword,pub_concept
6
6