Privacy and Packet Dispersion of Voice

نویسندگان

  • A. Thamizharasi VIT
  • M. Vanitha VIT
چکیده

In this paper we are mainly focusing about how to improve privacy in peer to peer VOIP network without the involvement of third party. Currently we have the technologies like skype, Gtalk through which we can communicate all over the world through internet. In this technologies the voice from source to destination will be transformed through the third party server to the destination so here we cant expect privacy from that we came to the conclusion that there is a need for privacy so we are creating the personal network which connects many system through the LAN or wifi and allows users to communicate directly without any third party server in between.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy and Packet Dispersion of Voice Applications in P2P Networks-VoIP

In this paper we are mainly focusing about how to improve privacy in peer to peer VOIP network without the involvement of third party. Currently we have the technologies like skype, Gtalk through which we can communicate all over the world through internet. In this technologies the voice from source to destination will be transformed through the third party server to the destination so here we ...

متن کامل

A New Algorithm for Voice Activity Detection Based on Wavelet Packets (RESEARCH NOTE)

Speech constitutes much of the communicated information; most other perceived audio signals do not carry nearly as much information. Indeed, much of the non-speech signals maybe classified as ‘noise’ in human communication. The process of separating conversational speech and noise is termed voice activity detection (VAD). This paper describes a new approach to VAD which is based on the Wavelet ...

متن کامل

Critical voice network security analysis and new approach for securing Voice over IP Communications

Voice networks evolved from the fixed traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of IP telephony such as signaling informat...

متن کامل

Legal Protection of the Right to Voice

Right on voice is one of the rights which protect of person’s voice and sound and prohibit of imitation (sound effects) and sound forgery. Today on the light of increasing developments of communications this right includes some forms and instances which protected by legal systems in different ways. In some of the legal systems, this right has recognized on the basis of personality rights and ri...

متن کامل

Voice Over IP: Privacy and Forensic Implications

With the tremendous growth in popularity and bandwidth of the Internet, VoIP technology has emerged that allows phone calls to be routed over Internet infrastructure rather than the traditional Public Switched Telephone Network (PSTN) infrastructure. The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. Wiretapping is not applicab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012