data steganography on voip through combination of residue number system and dna sequences

نویسندگان

azin azizifard

mohamad qermezkon

tahereh postizadeh

hamid barati

چکیده

today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when  there is a connection between user a and b, user a should be assured of the identity of user b, and vice versa. the authentication of identity is one of so important information that could guarantee the security and integrity of information [1]. in this study, the security of voip and data steganography through the protocol has been investigated. finally, a technique for data steganography4 over this protocol will be proposed using the method of residue number system3. also, using the combination of rns, dna sequences, and huffman compressing algorithm, an algorithm is proposed for data steganography through voip. the algorithm improves security of the process of transmission of hidden text and can use the bandwidth effectively.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Conversion in Residue Number System

This thesis tackles the problem of data conversion in the Residue Number System (RNS). The RNS has been considered as an interesting theoretical topic for researchers in recent years. Its importance stems from the absence of carry propagation between its arithmetic units. This facilitates the realization of high-speed, low-power arithmetic. This advantage is of paramount importance in embedded ...

متن کامل

Steganography of VoIP Streams

The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols’ fields and is known for IP, UDP or TCP protoc...

متن کامل

Steganography harnesses VoIP networks

Covert channels may be dangerous to company networks as they can lead to the leakage of confidential information. However, it is hard to assess what bandwidth of a covert channel poses a serious threat. Generally, it depends on the security policy that is implemented by the organisation concerned. The ideal case will be to eliminate all possibilities of hidden communication, but practically it ...

متن کامل

Multi-Layer Data Encryption using Residue Number System in DNA Sequence

In this paper, we will merge between the usages of DNA sequences and Residue number system in encryption systems. The message which is coded will be secretly impeded inside the DNA sequence. This merge will be leaded to perform multilayer encryption with different keys that can be used as a hash function versatile alternatively to increase the security and more flexibility, with less complexity...

متن کامل

The Steganography In Inactive Frames Of Voip

This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which isused extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the st...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of advances in computer research

ناشر: sari branch, islamic azad university

ISSN 2345-606X

دوره 5

شماره 2 2014

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023