Institute of Electrical and Electronics Engineers, IEEE Transactions on Information Forensics and Security, 2(12), p. 445-453
DOI: 10.1109/tifs.2016.2622226
Export citation
Search in Google Scholar
Full text: Unavailable