Huang, H., & Han, Z. Multi‐image encryption and authentication using computational ghost imaging and singular value decomposition. Wiley.
Chicago Style (17th ed.) CitationHuang, Hong, and ZhiGuang Han. Multi‐image Encryption and Authentication Using Computational Ghost Imaging and Singular Value Decomposition. Wiley.
MLA (9th ed.) CitationHuang, Hong, and ZhiGuang Han. Multi‐image Encryption and Authentication Using Computational Ghost Imaging and Singular Value Decomposition. Wiley.
Warning: These citations may not always be 100% accurate.