IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 188 - 197
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 267 - 282
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 613 - 622
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 52 - 61
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 223 - 233
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 203 - 212
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 98 - 110
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 564 - 569
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 899 - 910
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 824 - 836
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 812 - 823
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 1 > 52 - 61
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 544 - 555
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 816 - 825
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 213 - 226
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 96 - 106
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 82 - 95
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 346 - 359
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 798 - 808
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 3 > 1029 - 1039