Authors: L. Yu, T. Zhang, X. Luo, L. Xue and H. Chang
Published in IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 865-880, April 2017.
Full article can be viewed here.