Skip to main content

New VoIP Traffic Security Scheme with Digital Watermarking

  • Conference paper
Book cover Computer Safety, Reliability, and Security (SAFECOMP 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4166))

Included in the following conference series:

Abstract

In this paper we propose a new, lightweight, no bandwidth consuming authentication and integrity scheme for VoIP service based on SIP as a signalling protocol. It is shared password mechanism and this solution exploits digital watermarking. Nowadays, there are many applications of this technique, such as solving copyright protection problems, but we propose to use it to secure the transmitted audio and signalling protocol that IP Telephony is based on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system’s security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dittmann, J., Mukherjee, A., Steinebach, M.: Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 62–67. IEEE Computer Science Society, Las Vegas (2000)

    Chapter  Google Scholar 

  2. Steinebach, M., Siebenhaar, F., Neubauer, C., Ackermann, R., Roedig, U., Dittmann, J.: Intrusion Detection Systems for IP Telephony Networks. In: Real time intrusion detection symposium. Estoril, Portugal (2002)

    Google Scholar 

  3. Yuan, S., Huss, S.: Audio Watermarking Algorithm for Real-time Speech Integrity and Authentication. In: International Multimedia Conference Proceedings of the 2004 Multimedia and security workshop on Multimedia and security, Magdeburg, Germany, pp. 220–226 (2004)

    Google Scholar 

  4. Sienebach, M., Lang, A., Dittmann, J., Neubauer, C.: Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2002), Las Vegas, pp. 100–105 (2002)

    Google Scholar 

  5. Mizrahi, T., Borenstein, E., Leifman, G., Cassuto, Y., Lustig, M., Mizrachi, S., Peleg, N.: Real-Time Implementation for Digital Watermarking in Audio Signals Using Perceptual Masking. In: 3rd European DSP Education and Research Conference, ESIEE, Noisy Le Grand, Paris (2000)

    Google Scholar 

  6. Lu, C., Liao, H., Chen, L.: Multipurpose Audio Watermarking. In: Proceedings of 15th International Conference on Pattern Recognition, Barcelona, Spain, pp. 282–285 (2000)

    Google Scholar 

  7. Arnold, M.: Attacks on Digital Audio Watermarks and Countermeasures. In: Third International Conference on WEB Delivering of Music (WEDELMUSIC 2003), Leeds, United Kingdom (2003)

    Google Scholar 

  8. Kuhn, D.R., Walsh, T.J., Fries, S.: Security Considerations for Voice Over IP Systems, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Special Publication 800-58 (January 2005)

    Google Scholar 

  9. Dittmann, J., Wohlmacher, P., Nahrstedt, K.: Using Cryptographic and Watermarking Algorithms. IEEE MultiMedia 8(4), 54–65 (2001)

    Article  Google Scholar 

  10. Steinebach, M., Dittmann, J.: Watermarking-based digital audio data authentication. EURASIP Journal on Applied Signal Processing 10, 1001–1015 (2003)

    Google Scholar 

  11. Dittmann, J., Nack, F., Steinmetz, A., Steinmetz, R.: Interactive Watermarking Environments. In: Proceedings of International Conference on Multimedia Computing and Systems, Austin, USA, pp. 286–294 (1998)

    Google Scholar 

  12. Gordy, J.D., Brutin, L.T.: Performance evaluation of digital audio watermarking algorithms. In: Proc. 43rd IEEE Midwest Symposium on Circuit and Systems (MWSCAS 2000), Lansing, USA, pp. 456–459 (August 2000)

    Google Scholar 

  13. Arnold, M.: Audio watermarking: Features, applications and algorithms. In: Proc. IEEE International Conference on Multimedia Expo. (ICME 2000), New York, USA, pp. 1013–1016 (July-August 2000)

    Google Scholar 

  14. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.: RFC 3261 - SIP: Session Initiation Protocol, IETF (June 2002)

    Google Scholar 

  15. Johnston, A., Donovan, S., Sparks, R., Cunningham, C., Summers, K.: RFC 3665 - Session Initiation Protocol (SIP) Basic Call Flow Examples, IETF (December 2003)

    Google Scholar 

  16. ISO 7498. International Standards Organisation (ISO). Information processing systems - Open systems interconnection - Basic reference model - Part 2: Security architecture (ISO/IEC 7498-2) (1989)

    Google Scholar 

  17. Johnson, H.: Toward Adjustable Lightweight Authentication for Network Access Control, Ph.D thesis, Blekinge Institute of Technology (December 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mazurczyk, W., Kotulski, Z. (2006). New VoIP Traffic Security Scheme with Digital Watermarking. In: Górski, J. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2006. Lecture Notes in Computer Science, vol 4166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875567_13

Download citation

  • DOI: https://doi.org/10.1007/11875567_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45762-6

  • Online ISBN: 978-3-540-45763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics