An efficient and secure VoIP communication system with chaotic mapping and message digest

Jiang, Yijing and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Systems, 24 (3). ISSN 0942-4962

[thumbnail of R2_An Efficient and Secure VoIP Communication System.pdf]
Preview
PDF
R2_An Efficient and Secure VoIP Communication System.pdf - Accepted Version

Download (601kB) | Preview

Abstract

As one of the most popular real-time services on the Internet, Voice over Internet Protocol (VoIP) has attracted researchers’ attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly by using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.

Item Type: Article
Identifier: 10.1007/s00530-017-0565-6
Additional Information: © Springer Verlag 2017. The final publication is available at Springer via https://doi.org/10.1007/s00530-017-0565-6
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 28 Jul 2017 17:44
Last Modified: 06 Feb 2024 15:53
URI: https://repository.uwl.ac.uk/id/eprint/3647

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu