IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 645 - 654
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 153 - 165
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 293 - 301
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 318 - 329
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 708 - 717
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 611 - 627
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 718 - 728
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 802 - 811
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 974 - 981
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 1 > 62 - 70
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 461 - 469
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 893 - 904
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 162 - 174
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 175 - 188
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 432 - 444
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 491 - 505
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1288 - 1300
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 205 - 215
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 3 > 464 - 476
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 3 > 426 - 435