Implementation of Confidentiality for Voice Traffic

Network security has been an area of concern and with more and more devices getting connected to the internet, security is an indispensable functionality. Statistics show that, networks are attacked every day and we need to keep protecting the data and network from different types of attacks. In our work we have considered security issues specifically for voice communication over a mobile device. The security features implemented in the proposed work differ from existing systems. Existing systems rely on the service provider for confidentiality and authentication. In our work security measures are implemented at the device. Thus this system can provide better security when the security measures provided by the service provider are compromised. Additionally the work can also be used to provide confidently in Bluetooth networks.

[1]  Tim Fingscheidt,et al.  An improved adpcm decoder by adaptively controlled quantization interval centroids , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[2]  Huan Li,et al.  Audio Scrambling Algorithm Based on Variable Dimension Space , 2009, 2009 International Conference on Industrial and Information Systems.

[3]  C. Naveen,et al.  Image encryption technique using improved A5/1 cipher on image bitplanes for wireless data security , 2016, 2016 International Conference on Microelectronics, Computing and Communications (MicroCom).

[4]  Mohan S. Kankanhalli,et al.  Progressive Audio Scrambling in Compressed Domain , 2008, IEEE Transactions on Multimedia.

[5]  Bo Han,et al.  An audio scrambling degree measure based on information criteria , 2010, 2010 2nd International Conference on Signal Processing Systems.

[6]  Gaurav R. Bagwe,et al.  Voice encryption and decryption in telecommunication , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).

[7]  F. Kitson,et al.  A real-time ADPCM encoder using variable order prediction , 1986, ICASSP '86. IEEE International Conference on Acoustics, Speech, and Signal Processing.

[8]  David Salomon Data Compression , 1998, Springer New York.

[9]  Daniel Deparateanu,et al.  Theoretical and practical implementation of scrambling algorithms for speech signals , 2015, 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[10]  Safya Belghith,et al.  A new secure and efficient scheme of ADPCM encoder based on chaotic encryption , 2014, 2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).