IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 816 - 825
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 781 - 801
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 826 - 836
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 658 - 669
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 705 - 720
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 771 - 780
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 761 - 770
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 945 - 954
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 848 - 856
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 920 - 931
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 810 - 815
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 883 - 892
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 613 - 624
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 965 - 967