Privacy and Packet Dispersion of Voice
نویسندگان
چکیده
In this paper we are mainly focusing about how to improve privacy in peer to peer VOIP network without the involvement of third party. Currently we have the technologies like skype, Gtalk through which we can communicate all over the world through internet. In this technologies the voice from source to destination will be transformed through the third party server to the destination so here we cant expect privacy from that we came to the conclusion that there is a need for privacy so we are creating the personal network which connects many system through the LAN or wifi and allows users to communicate directly without any third party server in between.
منابع مشابه
Privacy and Packet Dispersion of Voice Applications in P2P Networks-VoIP
In this paper we are mainly focusing about how to improve privacy in peer to peer VOIP network without the involvement of third party. Currently we have the technologies like skype, Gtalk through which we can communicate all over the world through internet. In this technologies the voice from source to destination will be transformed through the third party server to the destination so here we ...
متن کاملA New Algorithm for Voice Activity Detection Based on Wavelet Packets (RESEARCH NOTE)
Speech constitutes much of the communicated information; most other perceived audio signals do not carry nearly as much information. Indeed, much of the non-speech signals maybe classified as ‘noise’ in human communication. The process of separating conversational speech and noise is termed voice activity detection (VAD). This paper describes a new approach to VAD which is based on the Wavelet ...
متن کاملCritical voice network security analysis and new approach for securing Voice over IP Communications
Voice networks evolved from the fixed traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of IP telephony such as signaling informat...
متن کاملLegal Protection of the Right to Voice
Right on voice is one of the rights which protect of person’s voice and sound and prohibit of imitation (sound effects) and sound forgery. Today on the light of increasing developments of communications this right includes some forms and instances which protected by legal systems in different ways. In some of the legal systems, this right has recognized on the basis of personality rights and ri...
متن کاملVoice Over IP: Privacy and Forensic Implications
With the tremendous growth in popularity and bandwidth of the Internet, VoIP technology has emerged that allows phone calls to be routed over Internet infrastructure rather than the traditional Public Switched Telephone Network (PSTN) infrastructure. The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. Wiretapping is not applicab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012