Login / Signup

Redundant image representations in security applications.

Philippe JostPierre VandergheynstPascal Frossard
Published in: ICIP (2004)
Keyphrases