Optimum forensic and counter-forensic strategies for source identification with training data | IEEE Conference Publication | IEEE Xplore