Open Access Open Access  Restricted Access Subscription or Fee Access

A Comprehensive Solution Based on Watermarking and Encryption for Securing a Voice Over Internet Protocol System

Mohamed Khelf(1*), Mohamed Ouslim(2), Mohammed Hamoudi(3)

(1) Université des Sciences et de la Technologie d’Oran Mohamed Boudiaf, USTO-MB, Algeria
(2) Université des Sciences et de la Technologie d’Oran Mohamed Boudiaf, USTO-MB, Algeria
(3) Université des Sciences et de la Technologie d’Oran Mohamed Boudiaf, USTO-MB, Algeria
(*) Corresponding author


DOI: https://doi.org/10.15866/irecos.v11i7.9644

Abstract


Voice over Internet Protocol is an interactive service that requires less than 150 ms of delay from end-to-end to emulate what today phones perform. Implementing a security mechanism introduces further delay, and optimization has to be done to meet the Quality of service requirements. In this paper, we propose a new solution to secure Voice over Internet Protocol communication using a high capacity blind watermark based on classification and Discrete Wavelet Transform for data source authentication and tampering localization. The used algorithm can embed the mark, with up to one kilobit per second with a Signal to Noise Ratio up to 21dB. It is able to detect tampering in real time and it can resist to packet loss. Moreover, to maintain the conversation privacy, we used the encryption. Several tests were conducted to help us choose the appropriate encryption algorithm that provides the best performance and without degrading the voice quality. These tests were performed on devices with different types of hardware and software, including some devices with lower processing power. The obtained results are very satisfactory since the tradeoff between providing the Voice over Internet Protocol security and maintaining a good Quality of Service has been successfully fulfilled.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Discrete Wavelet Transform; Encryption; Quality of Service; Voice Over Internet Protocol; Watermarking

Full Text:

PDF


References


A. Azfar, K. K. R. Choo, L. Liu, Android Mobile Voip Apps: A Survey and Examination of their Security and Privacy, Springer, Vol. 16, No 1, pp 73-111
http://dx.doi.org/10.1007/s10660-015-9208-1

L. Tama'si, D. Orincsay, B. G. Jozsa, G. Magyar, Design of Survivable VPN Based VoIP Networks, IEEE 2005.
http://dx.doi.org/10.1109/drcn.2005.1563911

P. Radmand, A. Talevski, Impact of Encryption on Qos in Voip, IEEE Second International Conference on Social Computing (SOCIAL-COM), pp. 721-726, 2010.
http://dx.doi.org/10.1109/socialcom.2010.112

S. K. Talha, B. I. A. Barry, Evaluating the Impact of AES Encryption Algorithm on Voice Over Internet Protocol (VoIP) Systems, 2013 International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), pp. 686-391, 2013.
http://dx.doi.org/10.1109/icceee.2013.6634023

Wahab, R. B. Bahaweres, M. Alaydrus, Muhaemin, R. Sarno, Performance Analysis of VoIP Client with Integrated Encryption Module, 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA), 2013.
http://dx.doi.org/10.1109/iccspa.2013.6487300

O. P. Verma, R. Agarwal, D. Dafouti, S. Tyagi ,Peformance Analysis of Data Encryption Algorithms, IEEE, vol. 5, pp. 399-403, 2011.
http://dx.doi.org/10.1109/icectech.2011.5942029

D. S. A. Elminaam, H. M. A kader, M. M. Hadhoud, Evaluating The Performance of Symmetric Encryption Algorithm, International Journal of Network Security, vol. 8, No. 12, pp. 280-286
http://paper.ijcsns.org/07_book/200812/20081240.pdf

R. kajal,D. Saini,K. Grewal, Virtual Private Network, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, October 2012.
http://www.ijarcsse.com/docs/papers/10_October2012/Volume_2_issue_10_October2012/V2I900209.pdf

A. Nishimura, Audio Data Hiding that is Robust with Respect to Aerial Transmission and Speech Codecs, International Journal of Innovative Computing, Information and Control (ICIC), pp. 1389-1400 vol. 6, N° 3 (B), March 2010.
http://www.ijicic.org/ihmsp08-18-1.pdf

M. Fallahpour, D. Megías, High Capacity Robust Audio Watermarking Scheme Based on FFT And Linear Regression, International Journal on Innovative Computing Information and Control (ICIC), vol. 8, NO. 4, pp. 2477-2489.
http://www.ijicic.org/ijicic-10-12106.pdf

R. Mart´inez-Noriega, M. Nakano, High Payload Audio Watermarking: Toward Channel Characterization of MP3 Compression, Journal of Information Hiding and Multimedia Signal Processing 2011, vol. 2, NO. 2, April 2011.
http://bit.kuas.edu.tw/~jihmsp/2011/vol2/JIH-MSP-2011-03-001.pdf

S. Wu, J. Huang, D. Huang, Y. Q. Shi, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission, IEEE Transactions On Broadcasting, vol. 51, NO. 1, March 2005.
http://dx.doi.org/10.1109/tbc.2004.838265

W.N. Lie, L.C. Chang, Robust and High-Quality Time-Domain Audio Watermarking Based on Low-Frequency Amplitude Modification, IEEE Transactions on Multimedia, vol. 8, NO. 1, February 2006.
http://dx.doi.org/10.1109/tmm.2005.861292

S. Xiang, H.J. Kim, J. Huang, Audio Watermarking Robust Against Time-Scale Modification and MP3 Compression, Signal Processing, vol.88 NO 10, pp.2372-2387, October 2008.
http://dx.doi.org/10.1016/j.sigpro.2008.03.019

H. Xiang, J. Huang, Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks, IEEE Transactions on Multimedia, vol. 9, NO. 7, November 2007.
http://dx.doi.org/10.1109/tmm.2007.906580

S. Shin. O. Kim, J. Kiln, J. Choil, A Robust Audio Watermarking Algorithm Using Pitch Scaling, IEEE DSP 2002, pp.701-704. http://dx.doi.org/10.1109/ICDSP.2002.1028187

Madhavan, S., Govindarajan, Y., A Wavelet Based Scheme for Video Watermarking, (2013) International Review on Computers and Software (IRECOS), 8 (4), pp. 1023-1032.

S. A. M. Gilani, A. N. Skodras, Adaptive Image Watermarking using Multiple Transforms, (2007) International Review on Computers and Software (IRECOS), 2 (6), pp. 653 - 660.

A. O. Zaid, A. Makhloufi, A. Bouallegue, C. Olivier, A. Nait-Ali, Blind Watermarking Integrated to Wavelet Image Coding Scheme, (2008) International Review on Computers and Software (IRECOS), 3 (1), pp. 53-61.

J. N. Ellinas, Stereo Image Reversible Watermarking, (2008) International Review on Computers and Software (IRECOS), 3 (5), pp. 457-464.

A.Sabri, M. Karoud, H. Tairi, A. Aarab, A Robust Image Watermarking Based on the Empirical Mode Decomposition, (2009) International Review on Computers and Software (IRECOS), 4 (3), pp. 360-365.

Mohamed, A., Ismail, M., Zainal, N., Robust Audio Encryption Method for MPEG-2 AAC Audio Based on Module Arithmetic and Chaotic Maps, (2015) International Review on Computers and Software (IRECOS), 10 (1), pp. 80-89.
http://dx.doi.org/10.15866/irecos.v10i1.5126

C. Bassil, A. Serhrouchni, N. Rouhana, Critical Analysis and New Perspective for Securing Voice Networks, Springer-Verlag Berlin Heidelberg 2005, pp. 810-818.
http://dx.doi.org/10.1007/978-3-540-31957-3_91

J. Dhillon, Symmetric and Asymmetric Cryptography Algorithm for Improving Data Security, International Journal of Scientific Engineering and Technology, vol.3, NO.8, pp.1123-1125.
http://ijset.com/ijset/publication/v3s8/IJSET_2014_831.pdf

A. Al Hasib, A. A. Md, M. Haque,A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography, Third 2008 International Conference on Convergence and Hybrid Information Technology, 2008,Vol.02, pp.505-510.
http://dx.doi.org/10.1109/iccit.2008.179

Y. Shin, S. Shin, M. Kim, H. Yoon, A Secure Self-Encryption Scheme for Resource Limited Mobile Devices, IT Convergence and Security 2012 , Springer Science+Business Media Dordrecht 2013.
http://dx.doi.org/10.1007/978-94-007-5860-5_15

B. Schneier, Applied Cryptography Second Edition (John Wiley & Sons 1994, ISBN 978-1-119-09672-6).
http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1119096723.html

ISO 226:2003 www.iso.org

P. Zimmermann, An Introduction to Cryptography, Network Associate ,1998 pp 54.
http://courses.cs.vt.edu/cs5204/fall09-kafura/Papers/Security/IntroToCryptography.pdf

J. Viega, M. Messier, P. Chandra, Network Security with OpenSSL, O'Reilly Media ,(2002).
http://shop.oreilly.com/product/9780596002701.do

Hu, Y. and Loizou, P. (2007). Subjective evaluation and comparison of speech enhancement algorithms, Speech Communication, 49, 588-601.
http://dx.doi.org/10.1016/j.specom.2006.12.006

S. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4, Selected Areas in Cryptography, Volume 2259 of the series Lecture Notes in Computer Science, pp 1-24.
http://dx.doi.org/10.1007/3-540-45537-x_1

M. Khelf, M. Ouslim, M. Hamoudi M. Masmoudi, QoS Evaluation in VoIP Software with and without Blowfish Encryption Module, IEEE conference ICIET Tlemcen Algeria.
http://dx.doi.org/10.1109/ceit.2015.7233024

T. Nie, T. Zhang, A Study of DES and Blowfish Encryption Algorithm, IEEE Region 10 Conference (TENCON 2009), Singapore.
http://dx.doi.org/10.1109/tencon.2009.5396115


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2019 Praise Worthy Prize