[1] H. Ghasemzadeh and M. H. Keyvanrad, Toward a Robust and Secure Echo Steganography Method Based on Parameters Hopping," in Signal Processing and Intelligent Systems, 2015.
[2] H. Ghasemzadeh, M. T. Khass, and M. K. Arjmandi, Audio steganalysis based on reversed psychoacoustic model of human hearing," Digital signal processing, vol. 51, pp. 133-141, 2016.
[3] S. Sridharan, E. Dawson, and B. Goldburg, Fast Fourier transform based speech encryption system," IEE Proceedings I (Communications, Speech and Vision), vol. 138, pp. 215-223, 1991.
[4] M. A. Brandau, Implementation of a real-time voice encryption system," 2008.
[5] J. Guo, J.-C. Yen, and H.-F. Pai, New voice over Internet protocol technique with hierarchical data security protection," in Vision, Image and Signal Processing, IEE Proceedings-, 2002, pp. 237-243.
[6] V. enk, V. Deli, and V. Miloevi, A new speech scrambling concept based on Hadamard matrices," Signal Processing Letters, IEEE, vol. 4, pp.161-163, 1997.
[7] K. Sakurai, K. Koga, and T. Muratani, A speech scrambler using the fast Fourier transform technique," Selected Areas in Communications,IEEE Journal on, vol. 2, pp. 434-442, 1984.
[8] A. Matsunaga, K. Koga, and M. Ohkawa, An analog speech scrambling system using the FFT technique with high-level security," Selected Areas in Communications, IEEE Journal on, vol.7, pp. 540-547, 1989.
[9] E. Dawson, Design of a discrete cosine transform based speech scrambler," Electronics letters, vol. 27, pp. 613-614, 1991.
[10] S. Sridharan, E. Dawson, and B. Goldburg, Speech encryption in the transform domain," Electronics Letters, vol. 26, pp. 655-657, 1990.
[11] B. Goldburg, S. Sridharan, and E. Dawson, Design and cryptanalysis of transform-based analog speech scramblers," Selected Areas in Communications, IEEE Journal on, vol. 11, pp. 735-744,1993.
[12] A. Jameel, M. Y. Siyal, and N. Ahmed, Transform-domain and DSP based secure speech communication system," Microprocessors and Microsystems, vol. 31, pp. 335-346, 2007.
[13] A. S. Bopardikar, Speech encryption using wavelet packets," 2005.
[14] S. Sadkhan, N. Abdulmuhsen, and N. F. Al Tahan, A proposed analog speech scrambler based on parallel structure of wavelet transforms," in Radio Science Conference, 2007. NRSC 2007. National, 2007, pp. 1-12.
[15] D. Tseng and J. Chiu, An OFDM speech scrambler without residual intelligibility," in TENCON 2007-2007 IEEE Region 10 Conference, 2007, pp.1-4.
[16] H. Li, Z. Qin, L. Shao, and B. Wang, A novel audio scrambling algorithm in variable dimension space," in Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on, 2009, pp. 1647-1651.
[17] Q.-H. Lin, F.-L. Yin, T.-M. Mei, and H. Liang, A blind source separation based method for speech encryption," Circuits and Systems I: Regular Papers, IEEE Transactions on, vol. 53, pp.1320-1328, 2006.
[18] W.-Q. Yan, W.-G. Fu, and M. S. Kankanhalli, Progressive audio scrambling in compressed domain," Multimedia, IEEE Transactions on, vol.10, pp. 960-968, 2008.
[19] C.-P. Wu and C. J. Kuo, Design of integrated multimedia compression and encryption systems," Multimedia, IEEE Transactions on, vol.7, pp. 828-839, 2005.
[20] L. Zeng, X. Zhang, L. Chen, Z. Fan, and Y.Wang, Scrambling-based speech encryption via compressed sensing," EURASIP Journal on Advances in Signal Processing, vol. 2012, pp. 1-12,2012.
[21] S. James, S. George, and P. Deepthi, Secure selective encryption of compressed audio," in Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy(AICERA/ICMiCR), 2013 Annual International Conference on, 2013, pp. 1-6.
[22] Z. Su, J. Jiang, S. Lian, G. Zhang, and D.Hu, Hierarchical selective encryption for G. 729 speech based on bit sensitivity," Journal of Internet Technology, vol. 11, pp. 599-607, 2010.
[23] G.-R. Kwon, C. Wang, S. Lian, and S.-s. Hwang, Advanced partial encryption using watermarking and scrambling in MP3," Multimedia Tools and Applications, vol. 59, pp. 885-895, 2012.
[24] K. Datta and I. S. Gupta, Partial encryption and watermarking scheme for audio files with controlled degradation of quality," Multimedia tools and applications, vol. 64, pp. 649-669, 2013.
[25] B. Goldburg, S. Sridharan, and E. Dawson, Cryptanalysis of frequency domain analogue speech scramblers," IEE Proceedings I (Communications, Speech and Vision), vol. 140, pp.235-239, 1993.
[26] B. Goldburg, E. Dawson, and S. Sridharan, The automated cryptanalysis of analog speech scramblers," in Advances in CryptologyEUROCRYPT91, 1991, pp. 422-430.
[27] Y.-X. Zhao, M.-C. Su, Z.-L. Chou, and J. Lee, A puzzle solver and its application in speech descrambling," in Proc. 2007 WSEAS Int. Conf.Computer Engineering and Applications, 2007,pp. 171-176.
[28] A. Jolfaei, X.-W. Wu, and V. Muthukkumarasamy, On the Security of Permutation Only Image Encryption Schemes," Information Forensics and Security, IEEE Transactions on,vol. 11, pp. 235-246, 2016.
[29] H. C. Van Tilborg and S. Jajodia, Encyclopedia of cryptography and security: Springer Science & Business Media, 2014.
[30] H. Ghasemzadeh, H. Mehrara, and M. Tajik Khas, Cipher-text only attack on hopping window time domain scramblers," in 4th. International Conference on Computer and Knowledge Engineering (iccke2014), 2014.
[31] K. Grchenig, Foundations of time-frequency analysis: Springer Science & Business Media, 2013.
[32] B. S. Atal and S. L. Hanauer, Speech analysis and synthesis by linear prediction of the speech wave," The Journal of the Acoustical Society of America, vol. 50, pp. 637-655, 1971.
[33] S. S. Haykin, Adaptive filter theory: Pearson Education India, 2008.
[34] D. Kahn, The Codebreakers: The comprehensive history of secret communication from ancient times to the internet: Simon and Schuster, 1996.
[35] H. Ghasemzadeh and M. Khalil Arjmandi, Optimum solution and evaluation of rectangular jigsaw puzzles based on branch and bound method and combinatorial accuracy," Multimedia Tools and Applications, pp. 1-25, 2017.
[36] H. Ghasemzadeh, A metaheuristic approach for solving jigsaw puzzles," in Intelligent Systems(ICIS), 2014 Iranian Conference on, 2014, pp.1-6.
[37] J.-C. Fournier, Graphs Theory and Applications: With Exercises and Problems vol. 72: John Wiley & Sons, 2010.
[38] J. S. Garofolo, L. F. Lamel, W. M. Fisher,J. G. Fiscus, and D. S. Pallett, DARPA TIMIT acoustic-phonetic continous speech corpus CD-ROM. NIST speech disc 1-1.1," NASASTI/Recon Technical Report N, vol. 93, 1993.
[39] E. Zwicker and H. Fastl, Psychoacoustics: facts and models: Springer Science & Business Media,2013.