Skip to main content
Log in

Efficient signal and protocol level security for network communication

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

Data communication over networks is of vital importance, nowadays. Different types of networks exist such as computer networks and Wireless Sensor Networks (WSNs). So, there is a need for data security tools and efficient routing protocols for the networks. Images represent the most important type of data used over networks. So, there is a need for image security tools such as image encryption, watermarking, steganography, and forgery detection. This paper presents efficient algorithms for securing image communication over networks including algorithms for watermarking of encrypted images, steganography of images, and forgery detection if some sort of tampering has been performed on the images. In addition, two routing protocols are considered in this paper to address the bandwidth utilization problems in the Internet Service Provider (ISP) networks: the Multi-Protocol Label Switching-Traffic Engineering (MPLS-TE) and the DiffServ Quality of Service (QoS). The objective of studying the performance of these protocols is to set up high-efficiency network topologies to guarantee the flexible transfer of secure data, especially images, over the networks of interest. The MPLS controls the path of the data by utilizing the unused bandwidth, and the DiffServ QoS controls the traffic produced by different users in the network. Hence, the data which is labled as “important” can be routed in a more secure path with less congestion to make sure that the data is delivered flexibly and securely. Multiple experiments are presented with different variations using one or more of the DiffServ-aware MPLS TE, Low Latency Queuing (LLQ), Russian Dolls Model (RDM) and Maximum Allocation Model (MAM) on data, which may be image data. The best results for both IPv4 and IPv6 were obtained using DiffServ-aware TE in RDM model in conjunction with LLQ.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33

Similar content being viewed by others

References

  • Aziz, M., & Islam, M. S. (2011). Performance evaluation of real-time applications over DiffServ/MPLS in IPv4/IPv6 networks.

  • C. S. Inc, Implementing Cisco MPLS, Cisco Systems Inc, 2003.

  • Cheddad, A., et al. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.

    Article  Google Scholar 

  • Chen, B., Zhu, W., & Yaping, Z. (2008). Internet service control based on customer choice. In 2008 7th world congress on intelligent control and automation. IEEE.

  • Cheng, A., Yao, X., & Duan, L. (2008). Design and implementation of integrated services switch simulation model based on ATM-MPLS. In 2008 International conference on computer science and Software engineering. Vol. 2. IEEE.

  • Czerny, D. (2011). MPLS traffic engineering-Diffserv aware (DS-TE).

  • Dong, S., Li, J., & Liu, S. (2016). Frequency domain digital watermark algorithm implemented in spatial domain based on correlation coefficient and quadratic DCT transform. In 2016 International conference on progress in informatics and computing (PIC). IEEE.

  • Eggers, J. J., et al. (2003). Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing, 51(4), 1003–1019.

    Article  MathSciNet  Google Scholar 

  • Ghein, L. D. (2006). MPLS Fundamentals. Cisco Press.

  • Hartung, F., & Girod, B. (1998) Watermarking of uncompressed and compressed video. Signal Processing, 66(3), 283–301.

    Article  Google Scholar 

  • Hartung, F. H., Su, J. K., & Girod, B. (1999). Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and watermarking of multimedia contents. Vol. 3657. International Society for Optics and Photonics.

  • Hassani, R., Fazely, A., & Luksch, P. (2012). Optimizing bandwidth by employing MPLS AToM with QoS support. In 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage. IEEE.

  • Hussain, M., et al. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66.

    Google Scholar 

  • Juarez-Sandoval, O., et al. (2016). Image-adaptive steganalysis for LSB matching steganography. In 39th International Conference on Telecommunications and Signal Processing (TSP). IEEE.

  • Koucheryavy, Y., et al. (2006). The public packet-switched network with guaranteed QoS based on DiffServ domains hierarchy. In 8th International Conference Advanced Communication Technology. Vol. 1. IEEE.

  • Larijani, H. H., & Rad, G. R. (2008). A new spatial domain algorithm for gray scale images watermarking. In International Conference on Computer and Communication Engineering. IEEE.

  • Lemeshko, O. V., Hailan, A. M., & Starkova, O. V. (2011). Multi-level traffic management in the MPLS-TE DiffServ network. In 11th International Conference the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM). IEEE.

  • Li, Y., & Wang, X. (2008). A watermarking method combined with Radon transform and 2D-wavelet transform. In 2008 7th World Congress on Intelligent Control and Automation. IEEE.

  • Li, Z., et al. (2007). Constructing secure content-dependent watermarking scheme using homomorphic encryption. In 2007 IEEE International Conference on Multimedia and Expo. IEEE.

  • Malathi, P., & Gireeshkumar, T. (2016). Relating the embedding efficiency of LSB steganography techniques in spatial and transform domains. Procedia Computer Science, 93, 878–885.

    Article  Google Scholar 

  • Masruroh, S. U., Fiade, A., & Iman, M. F. (2017). Performance evaluation of routing protocol RIPv2, OSPF, EIGRP with BGP. In 2017 International Conference on Innovative and Creative Information Technology (ICITech). IEEE.

  • Memon, N., & Wong, P. W. (2001). A buyer-seller watermarking protocol. IEEE Transactions on Image Processing, 10(4), 643–649.

    Article  Google Scholar 

  • Networks, J. (2010). JunOS Class of Service, Juniper Networks.

  • Networks, J. (2010). JunOS MPLS and VPNs volume 1, Juniper Networks.

  • Peterson, L. L., & Davie, B. S. (2007). Computer networks: A systems approach. Elsevier.

  • Prabakaran, G., & Bhavani, R. (2012). A modified secure digital image steganography based on Discrete Wavelet Transform. In International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE.

  • Pérez-González, F., et al. (2005). Rational dither modulation: A high-rate data-hiding method invariant to gain attacks. IEEE Transactions on Signal Processing, 53(10), 3960–3975.

    Article  MathSciNet  Google Scholar 

  • Sarsembagieva, K., et al. (2012) A fast route planning algorithm for MPLS-TE. In 2012 International Conference on Telecommunications and Multimedia (TEMU). IEEE.

  • Sheidaee, A., & Farzinvash, L. (2017). A novel image steganography method based on DCT and LSB. In 2017 9th International Conference on Information and Knowledge Technology (IKT). IEEE.

  • Strelkovskaya, I., Solovskaya, I., & Paskalenko, S. (2015). Solution to a problem of routing in MPLS-TE network with additional directions of traffic transmission. In Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T). IEEE.

  • Trappe, W., et al. (2003). Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing, 51(4), 1069–1087.

    Article  MathSciNet  Google Scholar 

  • Winter, R. (2011). The coming of age of MPLS. IEEE Communications Magazine, 49(4), 78–81.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fathi E. Abd El-Samie.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naeem, E.A., Abdelaal, A.E.A., Eyssa, A.A. et al. Efficient signal and protocol level security for network communication. Int J Speech Technol 23, 399–424 (2020). https://doi.org/10.1007/s10772-019-09607-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-019-09607-8

Keywords

Navigation