[1]
A. P., “Cryptographic Approach Using Audio for Data Security”, IJRITCC, vol. 3, no. 2, pp. 825–827, Feb. 2015.