New security and control protocol for VoIP based on steganography and digital watermarking

In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic. Additionally this solution offers authentication and integrity of voice send and it is capable of exchanging and verifying QoS and security parameters. It is based on two information hiding techniques: digital watermarking and steganography. That is why it does not consume additional bandwidth and the data transmitted is inseparably bound to the voice content.

[1]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[2]  Anirban Mukherjee,et al.  Media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[3]  Guillermo Morales-Luna,et al.  Information Hiding through Noisy Channels , 2001, Information Hiding.

[4]  Jessica Staddon,et al.  Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[5]  Ramarathnam Venkatesan,et al.  A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.

[6]  Deepa Kundur,et al.  Practical Data Hiding in TCP/IP , 2002 .

[7]  Utz Roedig,et al.  Intrusion detection systems for IP telephony networks , 2002 .

[8]  Ramón Cáceres,et al.  RTP Control Protocol Extended Reports (RTCP XR) , 2003, RFC.

[9]  KRZYSZTOF SZCZYPIORSKI HICCUPS : Hidden Communication System for Corrupted Networks , 2003 .

[10]  Sorin A. Huss,et al.  Audio watermarking algorithm for real-time speech integrity and authentication , 2004, MM&Sec '04.

[11]  Colin Allison,et al.  Covert Channels in Internet Protocols: A Survey , 2005 .

[12]  Steven J. Murdoch,et al.  Embedding Covert Channels into TCP/IP , 2005, Information Hiding.

[13]  Thomas J. Walsh,et al.  Security Considerations for Voice Over IP Systems , 2005 .

[14]  Wojciech Mazurczyk,et al.  New VoIP Traffic Security Scheme with Digital Watermarking , 2006, SAFECOMP.