2013
DOI: 10.3788/aos201333.0307002
|View full text |Cite
|
Sign up to set email alerts
|

Additional Key Rotation Multiplexing Encryption Using Joint Transform Correlator Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…At the beginning it was put forward to solve the problem of medical image. ASM directly benefits from the variable model of ACM [4], which can extract the target feature points of external shape, and also can accurately extract the target internal shape and feature point. In 1998, Cootes et al proposed the active appearance model (AAM) based on the ASM algorithm [5].…”
Section: Introductionmentioning
confidence: 99%
“…At the beginning it was put forward to solve the problem of medical image. ASM directly benefits from the variable model of ACM [4], which can extract the target feature points of external shape, and also can accurately extract the target internal shape and feature point. In 1998, Cootes et al proposed the active appearance model (AAM) based on the ASM algorithm [5].…”
Section: Introductionmentioning
confidence: 99%