1. Nutzinger, M.: Real time attacks on audio steganography. J. Inf Hiding Multimed. Signal Process. 3(1), (2012) ISSN 2073-4212
2. Kim, C., Stern, R.M.: Robust Signal-to-Noise Ratio Estimation Based on Waveform Amplitude Distribution Analysis. In: Interspeech pp. 2598–2601 (2008)
3. Thwarting Audio Steganography Attacks in Cloud Storage Systems. In: International Conference on Cloud and Service Computing, pp. 259–265
4. De Rango, F., Tropea, M., Fazio, P., Marano, S.: Overview on VoIP: subjective and objective measurement methods, IJCSNS Int. J. Comput. Sci. Netw. Secur. 6(1B), (2006)
5. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking, pp. 121–148. Artech House, Boston, London (2000)