Paper Accepted BY IEEE Transactions on Information Forensics and Security