data steganography on voip through combination of residue number system and dna sequences
نویسندگان
چکیده
today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when there is a connection between user a and b, user a should be assured of the identity of user b, and vice versa. the authentication of identity is one of so important information that could guarantee the security and integrity of information [1]. in this study, the security of voip and data steganography through the protocol has been investigated. finally, a technique for data steganography4 over this protocol will be proposed using the method of residue number system3. also, using the combination of rns, dna sequences, and huffman compressing algorithm, an algorithm is proposed for data steganography through voip. the algorithm improves security of the process of transmission of hidden text and can use the bandwidth effectively.
منابع مشابه
Data Conversion in Residue Number System
This thesis tackles the problem of data conversion in the Residue Number System (RNS). The RNS has been considered as an interesting theoretical topic for researchers in recent years. Its importance stems from the absence of carry propagation between its arithmetic units. This facilitates the realization of high-speed, low-power arithmetic. This advantage is of paramount importance in embedded ...
متن کاملthe effect of vocabulary instruction through semantic mapping on learning and recall of efl learners
چکیده ندارد.
15 صفحه اولSteganography of VoIP Streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols’ fields and is known for IP, UDP or TCP protoc...
متن کاملSteganography harnesses VoIP networks
Covert channels may be dangerous to company networks as they can lead to the leakage of confidential information. However, it is hard to assess what bandwidth of a covert channel poses a serious threat. Generally, it depends on the security policy that is implemented by the organisation concerned. The ideal case will be to eliminate all possibilities of hidden communication, but practically it ...
متن کاملMulti-Layer Data Encryption using Residue Number System in DNA Sequence
In this paper, we will merge between the usages of DNA sequences and Residue number system in encryption systems. The message which is coded will be secretly impeded inside the DNA sequence. This merge will be leaded to perform multilayer encryption with different keys that can be used as a hash function versatile alternatively to increase the security and more flexibility, with less complexity...
متن کاملThe Steganography In Inactive Frames Of Voip
This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which isused extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the st...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
journal of advances in computer researchناشر: sari branch, islamic azad university
ISSN 2345-606X
دوره 5
شماره 2 2014
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023