1. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1948)
2. Hai-Ying, G.: The MP3 steganography algorithm based on Huffman coding. Acta Scientiarum Naturalium Universitatis Sunyatse 046(004), 32–35 (2007)
3. Lv, Z., Haiping, T.: Random steganography algorithm of dynamic significant bits based on WAV audio. Comput. Appl. Softw. 27(11), 232–236 (2010)
4. Liu, X., Tian, H., Liu, J., Lu, J.: Survey for voice-over-IP steganography and steganalysis. J. Chongqing Univ. Posts Telecommun. (Nat. Sci. Ed.) 31(3), 407–418 (2019)
5. Su, Y.M., Huang, Y.F., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Conference on Computational Engineering in Systems Applications. IEEE (2006)