APA (7th ed.) Citation

Huang, H., & Han, Z. Multi‐image encryption and authentication using computational ghost imaging and singular value decomposition. Wiley.

Chicago Style (17th ed.) Citation

Huang, Hong, and ZhiGuang Han. Multi‐image Encryption and Authentication Using Computational Ghost Imaging and Singular Value Decomposition. Wiley.

MLA (9th ed.) Citation

Huang, Hong, and ZhiGuang Han. Multi‐image Encryption and Authentication Using Computational Ghost Imaging and Singular Value Decomposition. Wiley.

Warning: These citations may not always be 100% accurate.