IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 184 - 190
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 229 - 238
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 163 - 173
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 2 > 390 - 401
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 2 > 402 - 413
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 2 > 273 - 282
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 2 > 283 - 294
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 3 > 477 - 487
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 3 > 429 - 439
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 4 > 657 - 668
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 924 - 935
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 863 - 873
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1876 - 1891
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1731 - 1745
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 12 > 2046 - 2058
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 1 > 5 - 13
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 4 > 709 - 718
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 782 - 800
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 6 > 1024 - 1033
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 6 > 961 - 975