2012
DOI: 10.1007/s11042-011-0956-1
|View full text |Cite
|
Sign up to set email alerts
|

VoIP encryption module for securing privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…1 MC-CH: Matrix coding and chaos theory 2 HOOK: HOOK mechanism, 3 ME: matrix embedding technique, 4 MCD-STC: cepstrum distortion cost function and Syndrome Trellis Codes, 5 NPP-QIM: quantization-indexmodulation based on the replacement of the nearest-neighbor projection point, 6 PDM: pulse distribution model, 7 OAET: optimized audio embedding technique. 8 B-G: bit-grading.…”
Section: Workmentioning
confidence: 99%
See 1 more Smart Citation
“…1 MC-CH: Matrix coding and chaos theory 2 HOOK: HOOK mechanism, 3 ME: matrix embedding technique, 4 MCD-STC: cepstrum distortion cost function and Syndrome Trellis Codes, 5 NPP-QIM: quantization-indexmodulation based on the replacement of the nearest-neighbor projection point, 6 PDM: pulse distribution model, 7 OAET: optimized audio embedding technique. 8 B-G: bit-grading.…”
Section: Workmentioning
confidence: 99%
“…Once discovered, the attacker can use various approaches and tools such as brute force cracking to destroy the cipher text, which greatly increases the risks with secret communication. In short, encryption technology hides the content of covert communication [7,8], while steganography technology hides the "behavior" of covert communication, so steganography technology is able to provide better concealment and security [9,10]. Table 1 compares the differences between steganography and encryption in five aspects [11].…”
Section: Introductionmentioning
confidence: 99%
“…This kind of solutions cannot be generalized as usually VoIP communications are performed through the internet, and therefore, the effects of security applications are more critical than those in local networks. One recent interesting approach for Son et al has tested the Advanced Encryption Standard (AES) encryption and PKI by using RSA Rivest Shamir and Adelman algorithm on VoIP communications quality, but they only consider the delay factor. Moreover, Wanga and Liu also tested the AES and elliptic curve Diffie鈥揌ellman for key exchange on VoIP quality.…”
Section: Related Workmentioning
confidence: 99%
“…In many cases, congestion on IP and internet networks prevents service providers and users from delivering an excellent quality for VoIP communications. It is worth to note that there exist considerable research proposals and solutions tackling the quality of service issues in VoIP networks . However, there is a paucity of research on VoIP security threats.…”
Section: Introductionmentioning
confidence: 99%
“…Authentication and confidentiality are the main requirements inorder to secure any environment, For resource constrained environments many authentication schemes [1, 5-7, 12, 13, 16, 25, 26] and encryption schemes [8,21,23] are proposed, but unfortunately all these schemes are not well suited for future advanced wireless and mobile networks and its applications in multimedia, as the distinct authentication and encryption schemes double fold the resource requirements, Therefore a single process which combines both authenticion and encryption is of indespensible need. Fortunately Signcryption is the desired process which carries out encryption and digital signatures in one step not only to decrease computation cost but also communication cost and storage requirements.…”
Section: Introductionmentioning
confidence: 99%