A Comprehensive Solution Based on Watermarking and Encryption for Securing a Voice Over Internet Protocol System
(*) Corresponding author
Voice over Internet Protocol is an interactive service that requires less than 150 ms of delay from end-to-end to emulate what today phones perform. Implementing a security mechanism introduces further delay, and optimization has to be done to meet the Quality of service requirements. In this paper, we propose a new solution to secure Voice over Internet Protocol communication using a high capacity blind watermark based on classification and Discrete Wavelet Transform for data source authentication and tampering localization. The used algorithm can embed the mark, with up to one kilobit per second with a Signal to Noise Ratio up to 21dB. It is able to detect tampering in real time and it can resist to packet loss. Moreover, to maintain the conversation privacy, we used the encryption. Several tests were conducted to help us choose the appropriate encryption algorithm that provides the best performance and without degrading the voice quality. These tests were performed on devices with different types of hardware and software, including some devices with lower processing power. The obtained results are very satisfactory since the tradeoff between providing the Voice over Internet Protocol security and maintaining a good Quality of Service has been successfully fulfilled.
Copyright © 2016 Praise Worthy Prize - All rights reserved.
A. Azfar, K. K. R. Choo, L. Liu, Android Mobile Voip Apps: A Survey and Examination of their Security and Privacy, Springer, Vol. 16, No 1, pp 73-111
L. Tama'si, D. Orincsay, B. G. Jozsa, G. Magyar, Design of Survivable VPN Based VoIP Networks, IEEE 2005.
P. Radmand, A. Talevski, Impact of Encryption on Qos in Voip, IEEE Second International Conference on Social Computing (SOCIAL-COM), pp. 721-726, 2010.
S. K. Talha, B. I. A. Barry, Evaluating the Impact of AES Encryption Algorithm on Voice Over Internet Protocol (VoIP) Systems, 2013 International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), pp. 686-391, 2013.
Wahab, R. B. Bahaweres, M. Alaydrus, Muhaemin, R. Sarno, Performance Analysis of VoIP Client with Integrated Encryption Module, 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA), 2013.
O. P. Verma, R. Agarwal, D. Dafouti, S. Tyagi ,Peformance Analysis of Data Encryption Algorithms, IEEE, vol. 5, pp. 399-403, 2011.
D. S. A. Elminaam, H. M. A kader, M. M. Hadhoud, Evaluating The Performance of Symmetric Encryption Algorithm, International Journal of Network Security, vol. 8, No. 12, pp. 280-286
R. kajal,D. Saini,K. Grewal, Virtual Private Network, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, October 2012.
A. Nishimura, Audio Data Hiding that is Robust with Respect to Aerial Transmission and Speech Codecs, International Journal of Innovative Computing, Information and Control (ICIC), pp. 1389-1400 vol. 6, N° 3 (B), March 2010.
M. Fallahpour, D. Megías, High Capacity Robust Audio Watermarking Scheme Based on FFT And Linear Regression, International Journal on Innovative Computing Information and Control (ICIC), vol. 8, NO. 4, pp. 2477-2489.
R. Mart´inez-Noriega, M. Nakano, High Payload Audio Watermarking: Toward Channel Characterization of MP3 Compression, Journal of Information Hiding and Multimedia Signal Processing 2011, vol. 2, NO. 2, April 2011.
S. Wu, J. Huang, D. Huang, Y. Q. Shi, Efﬁciently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission, IEEE Transactions On Broadcasting, vol. 51, NO. 1, March 2005.
W.N. Lie, L.C. Chang, Robust and High-Quality Time-Domain Audio Watermarking Based on Low-Frequency Amplitude Modiﬁcation, IEEE Transactions on Multimedia, vol. 8, NO. 1, February 2006.
S. Xiang, H.J. Kim, J. Huang, Audio Watermarking Robust Against Time-Scale Modification and MP3 Compression, Signal Processing, vol.88 NO 10, pp.2372-2387, October 2008.
H. Xiang, J. Huang, Histogram-Based Audio Watermarking Against Time-Scale Modiﬁcation and Cropping Attacks, IEEE Transactions on Multimedia, vol. 9, NO. 7, November 2007.
S. Shin. O. Kim, J. Kiln, J. Choil, A Robust Audio Watermarking Algorithm Using Pitch Scaling, IEEE DSP 2002, pp.701-704. http://dx.doi.org/10.1109/ICDSP.2002.1028187
Madhavan, S., Govindarajan, Y., A Wavelet Based Scheme for Video Watermarking, (2013) International Review on Computers and Software (IRECOS), 8 (4), pp. 1023-1032.
S. A. M. Gilani, A. N. Skodras, Adaptive Image Watermarking using Multiple Transforms, (2007) International Review on Computers and Software (IRECOS), 2 (6), pp. 653 - 660.
A. O. Zaid, A. Makhloufi, A. Bouallegue, C. Olivier, A. Nait-Ali, Blind Watermarking Integrated to Wavelet Image Coding Scheme, (2008) International Review on Computers and Software (IRECOS), 3 (1), pp. 53-61.
J. N. Ellinas, Stereo Image Reversible Watermarking, (2008) International Review on Computers and Software (IRECOS), 3 (5), pp. 457-464.
A.Sabri, M. Karoud, H. Tairi, A. Aarab, A Robust Image Watermarking Based on the Empirical Mode Decomposition, (2009) International Review on Computers and Software (IRECOS), 4 (3), pp. 360-365.
Mohamed, A., Ismail, M., Zainal, N., Robust Audio Encryption Method for MPEG-2 AAC Audio Based on Module Arithmetic and Chaotic Maps, (2015) International Review on Computers and Software (IRECOS), 10 (1), pp. 80-89.
C. Bassil, A. Serhrouchni, N. Rouhana, Critical Analysis and New Perspective for Securing Voice Networks, Springer-Verlag Berlin Heidelberg 2005, pp. 810-818.
J. Dhillon, Symmetric and Asymmetric Cryptography Algorithm for Improving Data Security, International Journal of Scientific Engineering and Technology, vol.3, NO.8, pp.1123-1125.
A. Al Hasib, A. A. Md, M. Haque,A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography, Third 2008 International Conference on Convergence and Hybrid Information Technology, 2008,Vol.02, pp.505-510.
Y. Shin, S. Shin, M. Kim, H. Yoon, A Secure Self-Encryption Scheme for Resource Limited Mobile Devices, IT Convergence and Security 2012 , Springer Science+Business Media Dordrecht 2013.
B. Schneier, Applied Cryptography Second Edition (John Wiley & Sons 1994, ISBN 978-1-119-09672-6).
ISO 226:2003 www.iso.org
P. Zimmermann, An Introduction to Cryptography, Network Associate ,1998 pp 54.
J. Viega, M. Messier, P. Chandra, Network Security with OpenSSL, O'Reilly Media ,(2002).
Hu, Y. and Loizou, P. (2007). Subjective evaluation and comparison of speech enhancement algorithms, Speech Communication, 49, 588-601.
S. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4, Selected Areas in Cryptography, Volume 2259 of the series Lecture Notes in Computer Science, pp 1-24.
M. Khelf, M. Ouslim, M. Hamoudi M. Masmoudi, QoS Evaluation in VoIP Software with and without Blowﬁsh Encryption Module, IEEE conference ICIET Tlemcen Algeria.
T. Nie, T. Zhang, A Study of DES and Blowfish Encryption Algorithm, IEEE Region 10 Conference (TENCON 2009), Singapore.
- There are currently no refbacks.
Please send any question about this web site to email@example.com
Copyright © 2005-2022 Praise Worthy Prize