1. Lubacz, J., Mazurczyk, W., Szczypiorski, K.: Vice over IP. IEEE Spectr. 47(2), 42–47 (2010)
2. Tian, H., Jiang, H., Zhou, K., Feng, D.: Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput. Commun. 34(18), 2236–2247 (2011)
3. Mazurczyk, W.: VoIP steganography and its detection—a survey. CoRR, arXiv.org E-print Archive. http://arxiv.org/ftp/arxiv/papers/1203/1203.4374.pdf (2012). Accessed 20 Aug 2012
4. Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP Streams. In: Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE, Monterrey, Mexico, November 2008, Part II. LNCS, vol. 5332, pp. 1001–1018 (2008)
5. Tian, H., Jiang, H., Zhou, K., Feng, D.: Transparency-orientated encoding strategies for voice-over-IP steganography. Comput. J. 55(6), 702–716 (2012)