Fig. 8From: Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacksOriginal and secured voices and their FFT versions. a Normal voice. b FFT of normal voice. c Secure voice. d FFT of secure voiceBack to article page