Institute of Electrical and Electronics Engineers, IEEE Transactions on Information Forensics and Security, 7(10), p. 1350-1358, 2015
DOI: 10.1109/tifs.2015.2407699
Export citation
Search in Google Scholar
Full text: Unavailable