IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 513 - 528
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 529 - 536
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 503 - 512
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 605 - 612
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 636 - 641
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 623 - 630
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 588 - 595
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 596 - 604
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 537 - 547
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 548 - 558
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 570 - 587
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 613 - 622
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 721 - 733
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 710 - 720
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 734 - 743
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 793 - 808