IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 924 - 935
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 853 - 862
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 936 - 948
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 1074 - 1075
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 1073
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 833 - 834
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 831 - 832
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 1076
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 835 - 837
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 888 - 900
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 901 - 910
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 963 - 972
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 1051 - 1060
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 998 - 1012
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 911 - 923
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 874 - 887