{"title":"数字音频水印技术在VOIP通信中的安全性比较","authors":"Füsun Er, E. Gul","doi":"10.1109/ISIAS.2011.6122787","DOIUrl":null,"url":null,"abstract":"In this paper, the authors present digital audio watermarking techniques that can be used for source origin authentication in real-time Session Initiation Protocol (SIP) Communications, such as Voice over IP (VoIP). The watermark-enabled VoIP mechanism utilizes audio watermarking techniques as a covert channel between calling parties to send source origin indicator information during the transportation phase of VoIP. The effects of audio watermarking were measured using the Signal-to-Noise Ratio, watermark extract durations and the effects of a-law, u-law and GSM encoding during the transportation phase of VoIP. Moreover, various audio watermarking algorithms were implemented to demonstrate the applicability of aforementioned security solution in terms of certain parameters: robustness, evaluation times, complexity and capacity. The experimental results suggest that some watermarking algorithms are applicable in VoIP, while others are not suitable for source origin authentication.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Comparison of digital audio watermarking techniques for the security of VOIP communications\",\"authors\":\"Füsun Er, E. Gul\",\"doi\":\"10.1109/ISIAS.2011.6122787\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, the authors present digital audio watermarking techniques that can be used for source origin authentication in real-time Session Initiation Protocol (SIP) Communications, such as Voice over IP (VoIP). The watermark-enabled VoIP mechanism utilizes audio watermarking techniques as a covert channel between calling parties to send source origin indicator information during the transportation phase of VoIP. The effects of audio watermarking were measured using the Signal-to-Noise Ratio, watermark extract durations and the effects of a-law, u-law and GSM encoding during the transportation phase of VoIP. Moreover, various audio watermarking algorithms were implemented to demonstrate the applicability of aforementioned security solution in terms of certain parameters: robustness, evaluation times, complexity and capacity. The experimental results suggest that some watermarking algorithms are applicable in VoIP, while others are not suitable for source origin authentication.\",\"PeriodicalId\":139268,\"journal\":{\"name\":\"2011 7th International Conference on Information Assurance and Security (IAS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 7th International Conference on Information Assurance and Security (IAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIAS.2011.6122787\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 7th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2011.6122787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparison of digital audio watermarking techniques for the security of VOIP communications
In this paper, the authors present digital audio watermarking techniques that can be used for source origin authentication in real-time Session Initiation Protocol (SIP) Communications, such as Voice over IP (VoIP). The watermark-enabled VoIP mechanism utilizes audio watermarking techniques as a covert channel between calling parties to send source origin indicator information during the transportation phase of VoIP. The effects of audio watermarking were measured using the Signal-to-Noise Ratio, watermark extract durations and the effects of a-law, u-law and GSM encoding during the transportation phase of VoIP. Moreover, various audio watermarking algorithms were implemented to demonstrate the applicability of aforementioned security solution in terms of certain parameters: robustness, evaluation times, complexity and capacity. The experimental results suggest that some watermarking algorithms are applicable in VoIP, while others are not suitable for source origin authentication.