Parametric Prediction Model for Perceived Voice Quality in Secure VoIP

More and more sensitive information is communicated digitally and with thatcomes the demand for security and privacy on the services being used. An accurateQoS metric for these services are of inte ...

[1]  Peter Norvig,et al.  The Unreasonable Effectiveness of Data , 2009, IEEE Intelligent Systems.

[2]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[3]  Zhuoqun Sun,et al.  Voice quality prediction models and their application in VoIP networks , 2006, IEEE Transactions on Multimedia.

[4]  Kee Chaing Chua,et al.  Delay jitter performance of video traffic in a cellular wireless ATM network , 2000, WOWMOM '00.

[5]  Adi Shamir,et al.  A Practical Attack on Broadcast RC4 , 2001, FSE.

[6]  Frank Piessens,et al.  All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS , 2015, USENIX Annual Technical Conference.

[7]  Bogdan M. Wilamowski,et al.  The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.

[8]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory (2nd Edition) , 2005 .

[9]  Sebastian Möller,et al.  Speech Quality Estimation: Models and Trends , 2011, IEEE Signal Processing Magazine.

[10]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[11]  METHODS FOR SUBJECTIVE DETERMINATION OF TRANSMISSION QUALITY Summary , 2022 .

[12]  Jon Postel,et al.  Internet Protocol , 1981, RFC.

[13]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[14]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[15]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[16]  Bazara I. A. Barry,et al.  Evaluating the impact of AES encryption algorithm on Voice over Internet Protocol (VoIP) systems , 2013, 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE).

[17]  Danilo Bruschi,et al.  Voice over IPsec: analysis and solutions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[18]  Kenneth G. Paterson,et al.  Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS , 2015, USENIX Security Symposium.

[19]  Robert G. Cole,et al.  Voice over IP performance monitoring , 2001, CCRV.

[20]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[21]  Tiago H. Falk,et al.  Performance Study of Objective Speech Quality Measurement for Modern Wireless-VoIP Communications , 2009, EURASIP J. Audio Speech Music. Process..

[22]  Kenneth G. Paterson,et al.  On the Security of RC4 in TLS , 2013, USENIX Security Symposium.

[23]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[24]  Lingfen Sun,et al.  Speech quality prediction for voice over Internet protocol networks , 2004 .

[25]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[26]  Methods for objective and subjective assessment of quality Perceptual evaluation of speech quality ( PESQ ) : An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs , 2002 .

[27]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[28]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[29]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[30]  Rafik A. Goubran,et al.  Speech quality prediction in VoIP using the extended E-model , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[31]  Edward Guillen,et al.  VoIP Networks Performance Analysis with Encryption Systems , 2009 .

[32]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[33]  Alex Talevski,et al.  Impact of Encryption on Qos in Voip , 2010, 2010 IEEE Second International Conference on Social Computing.

[34]  Jason Bell,et al.  Machine Learning: Hands-On for Developers and Technical Professionals , 2014 .

[35]  Hooman Nikmehr,et al.  A New Computational Model to Evaluate the Quality of Perceptual Voice Using E-Model in VOIP Communications , 2010, NDT.

[36]  Alan Clark,et al.  Modeling the effects of burst packet loss and recency on subjective voice quality , 2001 .