Institute of Electrical and Electronics Engineers, IEEE Transactions on Information Forensics and Security, 5(7), p. 1578-1593, 2012
DOI: 10.1109/tifs.2012.2206386
Export citation
Search in Google Scholar
Full text: Unavailable