IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 259 - 272
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 1 > 148 - 157
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 240 - 254
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 256 - 266
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 606 - 615
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 628 - 639
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 853 - 860
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 672 - 681
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 775 - 790
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 640 - 649
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 595 - 605
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 703 - 711
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 139 - 147
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 148 - 159
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 704 - 716
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1354 - 1367
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 2 > 414 - 419
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 12 > 1923 - 1936
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 772 - 781
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 801 - 813