Return to Article Details Authentication in VoIP Telephony with Use of the Echo Hiding Method Download Download PDF