New security and control protocol for VoIP based on steganography and digital watermarking
نویسندگان
چکیده
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF’s (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application’s traffic. Additionally this solution offers authentication and integrity of voice send and it is capable of exchanging and verifying QoS and security parameters. It is based on two information hiding techniques: digital watermarking and steganography. That is why it does not consume additional bandwidth and the data transmitted is inseparably bound to the voice content.
منابع مشابه
Covert channel for improving VoIP security
In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...
متن کاملLightweight security mechanism for PSTN-VoIP cooperation
In this paper we describe a new, lightweight security mechanism for PSTN-VoIP cooperation that is based on two information hiding techniques: digital watermarking and steganography. Proposed scheme is especially suitable for PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular application of IP Telephony systems. With the use of this mechanism we authenticate end-to-end transm...
متن کاملLightweight Security Mechanism for PSTN-IP Telephony Convergence
A new, lightweight security mechanism for the PSTN-VoIP hybrid networks is described. It is based on the two informationhiding techniques: audio watermarking and network steganography. The proposed scheme is suitable especially for the PSTN-IP-PSTN (toll-by-passing) scenario, which nowadays is a very popular application of the IP Telephony systems. Proposed mechanism can be used to authenticate...
متن کاملMel-cepstrum-based steganalysis for VoIP steganography
Steganography and steganalysis in VoIP applications are important research topics as speech data is an appropriate cover to hide messages or comprehensive documents. In our paper we introduce a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages. In particular we combine known and established audio steganalysis features with t...
متن کاملCover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches
The main goals of this paper are to show the impact of the basic assumptions for the cover channel characteristics as well as the impact of different training/testing set generation strategies on the statistical detectability of exemplary chosen audio hiding approaches known from steganography and watermarking. Here we have selected exemplary five steganography algorithms and four watermarking ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Annales UMCS, Informatica
دوره 4 شماره
صفحات -
تاریخ انتشار 2006