IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 449 - 460
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 381 - 392
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 570 - 580
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 534 - 543
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 556 - 569
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 441 - 448
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 365 - 373
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 507 - 517
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 406 - 415
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 425 - 440
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 461 - 469
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 518 - 533
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 544 - 555
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 857 - 867
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 625 - 637
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 649 - 657