References

[1] Emmanuel Sodipo, The Art of Security and Information Hiding [M], Computers, Published: (Jun 15), 2011.

[2] Srivatsa M, Iyengar A, Ling Liu, Hongbo Jiang. Privacy in VoIP Networks: Flow Analysis Attacks and Defense. IEEE Transactions on Parallel and Distributed Systems. 2011;22(4):621633.

[3] Ogunfunmi T, Narasimha MJ. Speech over VoIP Networks: Advanced Signal Processing and System Implementation. IEEE Circuits and Systems Magazine. 2012;12(2):3555.

[4] Keromytis AD. A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials. 2012;14(2):514537.

[5] Thomas Porter, Jan Kanclirz Jr., Brian Baskin, Practical VoIP Security. Syngress, June 10, 2006, ISBN-10:1597490601, ISBN-13: 978-1597490603. ...

Get Information Hiding in Speech Signals for Secure Communication now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.