IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 2 > 324 - 334
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 2 > 335 - 349
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 3 > 450 - 463
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 4 > 593 - 607
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 4 > 608 - 618
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 5 > 705 - 716
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 998 - 1012
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 9 > 1456 - 1468
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1746 - 1759
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1827 - 1837
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 12 > 2073 - 2088
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 12 > 1937 - 1946
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 4 > 666 - 680
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 4 > 633 - 644
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 8 > 1211 - 1226
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 8 > 1288 - 1298
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 8 > 1278 - 1287
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 9 > 1450 - 1464
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2248 - 2263
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2144 - 2157