IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 181 - 187
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 376 - 390
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 503 - 512
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 52 - 61
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 179 - 192
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 530 - 541
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 867 - 882
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 928 - 932
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 288 - 299
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 570 - 580
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 905 - 919
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 426 - 437
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 541 - 550
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 843 - 852
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 333 - 345
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 418 - 431
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 543 - 552
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 530 - 542
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1127 - 1143
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 874 - 887