IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1325 - 1335
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1394 - 1401
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1359 - 1370
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1336 - 1349
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1371 - 1383
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1456 - 1471
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1486 - 1498
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1513 - 1528
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1384 - 1393
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1350 - 1358
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1432 - 1441
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1442 - 1455
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1402 - 1415
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1549
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1548
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1546 - 1547
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1545