Rachoń, Jakub, et al. “Authentication in VoIP Telephony With Use of the Echo Hiding Method”. Journal of Telecommunications and Information Technology, vol. 43, no. 1, Mar. 2011, pp. 17-21, https://doi.org/10.26636/jtit.2011.1.1127.