IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 559 - 569
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 630 - 636
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 489 - 490
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 491 - 502
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 513 - 528
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 529 - 536
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 503 - 512
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 605 - 612
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 636 - 641
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 623 - 630
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 588 - 595
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 596 - 604
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 537 - 547
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 548 - 558
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 570 - 587