IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 529 - 538
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 553 - 566
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 476 - 491
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 816 - 825
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 842 - 848
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 1029 - 1039
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 1018 - 1028
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 1003 - 1017
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1105 - 1117
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 5 > 1566 - 1577
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1841 - 1854
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 4 > 593 - 607
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 7 > 1182 - 1194
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 9 > 1531 - 1540
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 9 > 1456 - 1468
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 507 - 518
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1472 - 1485
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 10 > 2084 - 2094
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 11 > 2257 - 2269
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 12 > 2477 - 2491