[1] Mohammad Ali Nematollahi, ChaleeVorakulpipat andHamurabiGamboaRosale, “Speech Watermaking,”Springer Topics in Signal Processing, pp. 39-53, August 2016.
[2] Mohammad Ali Nematollahi and S. A. R. Al-Haddad, “Distant Speaker Recognition: An Overview,” International Journal of Humanoid Robotics, vol. 13, pp. 1-45, issue. 02, June2016.
[3] Dong Hu and Ping Lee, “Security Research on VoIP with Watermarking,” AIP conference proceedings, vol. 1060,pp. 98-101, issue. 1, November 2008.
[4] WojciechMazurczyk and ZbigniewKotulski, “New VoIP Traffic Security Schema with Digital Watermarking,” International Conference of Computer Safety, Reliability and Security, pp. 170 – 181, 2006.
[5] Faundez – Zanuy M, Lucena – Molina JJ and Hagmuller M, “Speech Watermarking: An Approach for the Forensic Analysis of Digital Telephonic Recordings,” Journal of Forensic Sciences, vol.55, pp. 1080-1087, July 2010.
[6] Shervin Shoki, Mohamod Ismail, NasharuddinZainal, “Voice Quality in Speech Watermarking using Spread Spectrum Technique,” International Journal on Computer and Communication Engineering, pp. 169-173, July 2012.
[7] Mohammad Ali Nematollahi, Mohammad Ali Akhaee, S.A.R. Al-Haddad and HamurabiGamboa – Rosales, “ Semi-fragile Digital Speech Watermarking for online Speaker Recognition,” EURASIP Journal on Audio, Speech and Music Processing, pp. 1-15, December 2015.
[8] Doh.Suk Kim, “Perceptual phase Quantization of Speech,” IEEE Transaction on Speech and Audio Processing, vol. 11, pp. 355-364, issue. 4, July 2003.
[9] Michael Arnold, Peter G.Baum and Walter VoeBing, “A phase Modulation Audio Watermarking Technique,” International Workshop on Information Hiding, pp. 102-116, 2009.
[10] I. D. Shterev, “Quantization-based Watermarking: Methods for Amplitude Scale Estimation Security and Linear Filtering Invariance,” Delft Univ. of Technology, pp.14-25, 2007.
[11] Akira Nishimura, “Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude Expansion,” International Workshop on Digital Watermarking, pp. 215-229, 2014.
[12] Qiang Cheng and J.SorenSen, “Spread Spectrum Signaling for Speech Watermarking,” IEEE International Conference on Acoustic, Speech and Signal Processing, vol. 6,pp.1337-1340, May 2001.
[13] Frank Hartung and Bernd Girod, “Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain,” Proceedings International Conference on Acoustics, Speech and Signal Processing, vol. 4, pp. 2621-2624, April 1997.
[14] Abd El-Samie FE,” Information Security for Automatic Speaker Identification”, 1st edition. Springer, pp. 66-92, 2011.
[16] Fathi E. Abd El-Samie, “An Efficient Singular Value Decomposition Algorithm for Digital Audio Watermarking,” International Journal of Speech Technology, vol. 12, pp. 27–45, 2009.
[21] Zeiler A and et al, “Empirical Mode Decomposition-an Introduction,” IEEE International Joint Conference on Neural Networks, pp.1-8, 2010.
[22] KaisKhaldi and Abdel-OuahabBoudraa, “Audio Watermarking Via EMD,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, pp. 675-680, March 2013.
[23] Donghoh Kim andHee-Soek Oh, “
EMD: A Package for Empirical Mode Decomposition and Hilbert Spectrum,”The R Journal, vol. 1/1, May 2009.
[24] Nawal El Hamdouni, AbdellahAdib, Sonia DjaziriLarbi andMoniaTurki, “Hybrid Embedding Strategy for a Blind Audio Watermarking System using EMD and ISA Techniques,” 4th International Symposium on Communications, Control and Signal Processing (ISCCSP), pp.1-4, March 2010.
[25] S. Wang, A. Sekey and A. Gersho, “An Objective Measure for Predicting Subjective Quality of Speech Coders,” IEEE Journal on selected areas in communications, vol. 10, no. 5, pp. 819–829, 1992.
[26] Volodya Grancharov and W. Bastiaan Kleijn, “Speech Quality Assessment,” Proceedings of the IEEE pacific Rim Conf. on Communications, Computers and Signal Processing, pp. 125-128. 1993.