Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The paper describes the method intended to authenticate identity of a VoIP subscriber with use of the data hiding technique that is specifically implemented by means of the echo hiding method. The scope includes presentation of experimental results related to transmission of information via a hidden channel with use of the SIP/SDP signalling protocol as well as results of subjective assessment on quality of a signal with an embedded watermark.
Słowa kluczowe
Rocznik
Tom
Strony
17--21
Opis fizyczny
Bibliogr. 10 poz., rys., tab.
Twórcy
autor
autor
autor
- Military University of Technology, Kaliskiego st 2, 01-489 Warsaw, Poland, jakub.rachon@gmail.com
Bibliografia
- [1] Z. Piotrowski and P. Gajewski, “Voice spoofing as an impersonation attack and the way of protection”, J. Inf. Assur. Secur., vol. 2, iss. 3, pp. 223–225, 2007.
- [2] C. Roberts, “Voice over IP security”, Center for Critical Infrastructure Protection, Wellington, New Zealand, March 2005.
- [3] Z. Piotrowski, L. Zagoździński, P. Gajewski, and L. Nowosielski, “Handset with hidden authorization function”, in Proc. Eur. DSP Educ. Res. Symp. EDERS 2008, Texas Instruments, pp. 201–205, 2008.
- [4] Z. Piotrowski and P. Gajewski, “Novel method for watermarking system operating on the HF and VHF radio links”, in Computational Methods and Experimental Measurements XIII, CMEM XIII, C. A. Brebbia and G. M. Carlomagnowit, Eds. Southampton, Boston: Wit Press, 2007, pp. 791–800.
- [5] D. Gruhl, A. Lu, and W. Bender, “Echo hidding”, Massachusetts Institute of Technology Media Laboratory, 1996, pp. 295–311.
- [6] S. A. Chou and S. F. Hsieh, “An echo-hiding watermarking technique based on bilateral symmetric time spread kernel”, in Proc. IEEE ICASP 2006, Toulouse, France, 2006.
- [7] H. J. Kim “Audio watermarking techniques”, in Proc. Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, 2003.
- [8] M. J. Ross, H. L. Shaffer, A. Cohen, R. Freudberg and H. J. Manley, “Average magnitude difference function pitch extractor”, IEEE Trans. Acoust., Speech and Sig. Proces., vol. 22, no. 5, pp. 353–362, 1974.
- [9] B. P. Bogert, M. J. R. Healy, and J. W. Tukey, “The quefrency alanysis of time series for echoes: cepstrum, pseudo autocovariance, cross-cepstrum and saphe cracking”, in Proc. Symp. Time Series Anal., M. Rosenblatt, Ed., Chapter 15. New York: Wiley, 1963, pp. 209–243.
- [10] Li Li, Ya-Qi Song, “Experimental research on parameter selection of echo hiding in voice”, in Proc. 8th Int. Conf. Machine Learn. Cybernet. ICMLC 2009 , Baoding, China, 2009, p. 2423–2426.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0013-0036