Skip to main content
. 2016 Oct 21;5(1):1830. doi: 10.1186/s40064-016-3460-2

Fig. 5.

Fig. 5

Embedded image Pirate, using: a binary mask, b perceptive mask