New VoIP Traffic Security Scheme with Digital Watermarking

In this paper we propose a new, lightweight, no bandwidth consuming authentication and integrity scheme for VoIP service based on SIP as a signalling protocol. It is shared password mechanism and this solution exploits digital watermarking. Nowadays, there are many applications of this technique, such as solving copyright protection problems, but we propose to use it to secure the transmitted audio and signalling protocol that IP Telephony is based on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system's security.

[1]  Leonard T. Bruton,et al.  Performance evaluation of digital audio watermarking algorithms , 2000, Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems (Cat.No.CH37144).

[2]  Jana Dittmann,et al.  Audio watermarking quality evaluation: robustness to DA/AD processes , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.

[3]  Utz Roedig,et al.  Intrusion detection systems for IP telephony networks , 2002 .

[4]  Ralf Steinmetz,et al.  Interactive watermarking environments , 1998, Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241).

[5]  Jana Dittmann,et al.  EURASIP Journal on Applied Signal Processing 2003:10, 1001–1015 c ○ 2003 Hindawi Publishing Corporation Watermarking-Based Digital Audio Data Authentication , 2003 .

[6]  Michael Arnold Audio watermarking: features, applications and algorithms , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[7]  Sorin A. Huss,et al.  Audio watermarking algorithm for real-time speech integrity and authentication , 2004, MM&Sec '04.

[8]  Paolo Nesi,et al.  Proceedings : third International Conference on Web Delivering of Music WEDELMUSIC 2003 : Leeds, United Kingdom 15-17 September 2003 , 2003 .

[9]  Chun-Shien Lu,et al.  Multipurpose audio watermarking , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[11]  Michael Arnold,et al.  Attacks on digital audio watermarks and countermeasures , 2003, Proceedings Third International Conference on WEB Delivering of Music.

[12]  Klara Nahrstedt,et al.  Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..

[13]  Thomas J. Walsh,et al.  Security Considerations for Voice Over IP Systems , 2005 .

[14]  Henric Johnson,et al.  Toward Adjustable Lightweight Authentication for Network Access Control , 2005 .

[15]  Anirban Mukherjee,et al.  Media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[16]  M. Lustig,et al.  Real-Time Implementation for Digital Watermarking in Audio Signals Using Perceptual Masking , 2000 .