IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 290 - 303
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 347 - 358
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 256 - 266
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 818 - 830
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 616 - 627
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 595 - 605
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 297 - 309
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 310 - 320
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 6 > 1855 - 1864
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 4 > 682 - 694
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 5 > 717 - 732
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 7 > 1126 - 1139
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1802 - 1814
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1731 - 1745
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 12 > 2007 - 2020
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 4 > 719 - 729
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 8 > 1278 - 1287
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 2 > 293 - 307
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 574 - 583
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 5 > 932 - 940