Open Access Open Access  Restricted Access Subscription or Fee Access

Security in VoIP

Elsayed M. Elshamy, Osama S. Faragalla, Sayed El-Rabaie, Osama Elshakankiry, Fathi Sayed

Abstract


In recent years, because of the significant in the field of information technology, secure communication techniques have increased widely and unexpectedly, Specially with VoIP network. In order to establish reliable communication technology and to ensure that voice reaches its intended end and to be accessible to all through the shared network, there is a need to secure communication in VoIP networks and encrypt the transmitted voice “VOICE MAIL”. The proposed system is performed in two stages, the first stage includes cryptosystem with Chaotic Encryption of voice. The second stage using fingerprint authentication.


Keywords


VoIP, Fingerprint Authentication, Chaotic Encryption, Cryptosystem.

Full Text:

PDF

References


Chris Roberts, “Voice Over IP”, March 2005.

Liancheng Shan, Ning Jiang “Research on security Mechanism of SIPbased VoIP system” Ninth International Conference on Hybrid Intelligent Systems, 2009.

Jakimoski, G. and L. Kocarev, "Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps", IEEE Transactions On Circuits And Systems-I: Fundamental Theory And Applications, vol. 48, no. 2, pp. 163-169, 2001.

Xin Zhang, Weibin Chen, "New Chaotic Algorithm for Image Encryption", IEEE ICALIP2008, pp. 889-892, 2008.

Xiping He Qionghua Zhang, "Image Encryption Based on Chaotic Modulation of Wavelet Coefficients", Congress on IEEE Image and Signal Processing (CISP'08), Sanya, Hainan, Vol. 1, pp. 622-626, May 2008.

Daniel Harris, “Fingerprint Authentication”, Jun 2007.

A. K. Jain and S. Pankanti: "Automated Fingerprint Identification and Imaging Systems" Advances in Fingerprint Technology, 2nd Edition, H. C. Lee and R. E. Gaensslen (eds.), Elsevier Science, 2001.Elsevier Science, 2001. URL: www.research.ibm.com/ecvg/pubs/sharatforensic.

pdf

American National Standard for Information Systems. Data format for the interchange of fingerprint information URL:

http://www.itl.nist.gov/iad/894.03/fing/slides/IAFIS_Overview/

http://biometrics.cse.msu.edu/j2033.pdf

http://www.upek.com/promlit/pdf/fltcs3a-0903.pdf

SANS Security Essentials Version 2.2. Defense-In-Depth. Page 160.

http://www.biometrics.org/html/bc2002_sept_program/Grother_9_02.pdf

UPEK: “PerfectMatch -- Fingerprint template extraction and matching” URL:http://www.upek.com/techno/techpm.htm

UPEK: “The two processes of a typical biometric application” URL:http://www.upek.com/techno/biom.htm

P. Hedelin, F. Norden, F and J. Skoglund, "SD optimization of spectral coders", IEEE Workshop on Speech Coding Proceedings, pp. 28 – 30, 1999.

W. Yang, M. Benbouchta, R. Yantorno, "Performance of the Modified bark Spectral Distortion as an Objective Speech Quality Measure", Proc. IEEE International Conference on Acoustic, Speech and Signal

Processing, vol. 1, Washington, USA , pp. 541-544. 1998.

P. Hedelin, F. Norden, F and J. Skoglund, "SD optimization of spectral coders", IEEE Workshop on Speech Coding Proceedings, pp. 28 – 30, 1999.

Y. Wu and B. P. Ng, "Speech scrambling with Hadamard transform in frequency domain", Proc. 6th Int. Conf. on Signal Processing, vol. 2, pp. 1560-1563, 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.