Privacy Sanitization In Data Transmission

Authors

  • Nidhi Sethi dept. of Computer Science, Dehradun Institute of Technology (DIT), Dehradun, INDIA
  • Garima Saini Dept. ofInformation Technology, Dehradun Institute of Technology (DIT), Dehradun, INDIA

Keywords:

VoIP, Speech Recognition, HMM, RTP, Si lence Suppression

Abstract

Voice over Internet Protocol (VoIP) is a technology that  enables one to make and receive calls through the Internet  instead of using the traditional analog PSTN (Public  Switched Telephone Network) lines. Although, VoIP is  widely used technology but VoIP calls may also bring  security problems such as cyber crime issues. To solve the  security problems the contents of a VoIPsession should be  encrypted. Thispaper focuseson authenticationissues anduser ID detection as Security is an essential part of  human life depending on the voice signature of the  incoming VoIP calls. Our approach defines the speech  communication over the internet by detecting adversary to  avoid eavesdropping. HMM )Hidden Markov Model( is used to recognize the speaker on the basis of extracted  features. For this it first train the voice sample into wave  file. And then, to detect the speakers of encrypted speech  communications, we are proposing a new way of traffic  attacks using RTP (Realtime Transport Protocol). The  proposed traffic attacksarebasedonpackettiming informationonly. Thispaper shows that the proposed traffic analysis attacks can detect speakers of encrypted  speech communications with high detection rates based  on speech communication traces. While transmitting voice  over network naive tracing technique support for alternate  network to increase sanitization. 

 

References

]1[ Ye Zhu, Yuanchao Lu, and Anil Vikram, “On Privacy of Encrypted Speech Communication” IEEE transaction on dependable and secure computing. July 2012. ]2[ A. Srinivasan, “Speech Recognition Using Hidden

Markov Model” Applied Mathmatical science, 2011. [3] Xuan wang, Jiancheng Lin, “Applying Speaker Recognition on VoIp Auditing” Proc. Sixth Int'l Conf., on Machine Learning and Cybernetics, August 2007. ]4[ Abdelkader Lahmadi, Olivier Festor, “A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services” IEEE Transactions on network and service management, June 2012.

]5[ R. Rabiner, “A tutorial on Hidden Markov model and selected applications in Speech recognition” proc. IEEE, Feb.1989.

]6[ Kaustubh Lohiya, Narendra Shekokar, Satish R. Devane, “End to End Encryption Architecture for Voice over Internet Protocol” Int'l Journal Computer Application, March 2012.

]7[ P. Zimmermann, A. Johnston, and J. Callas, “Zrtp: Media PathKey Agreement for Secure rtp Draft Zimmermann-Avt-Zrtp-11,” RFC, United States, 2008.

]8[ M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman, “The Secure Real-Time Transport Protocol (srtp),” 2004.

]9[ Ibrahim Patel. Dr. Y. Srinivas Rao, “Speech Recognition Using HMM With MFCC” Signal & Image Processing, Int'l Journal (SIPIJ), December 2010.

B.N. Levine, M.K. Reiter, C. Wang, and M.K. Wright, “Timing Attacks in Low-Latency Mix-Based Systems,” Proc. Eighth Int'l Financial Cryptography (FC '04) Conf., pp. 251-265, Feb. 2004.

]Ü11[ S.J. Murdoch and G. Danezis, “Low-Cost Traffic Analysis of Tor,” Proc. IEEE Symp. Security and Privacy. May2005.

]12[ Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, “Correlation- Based Traffic Analysis Attacks on Anonymity Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 7, pp. 954-9Ü67, July .2010

]13[ C.V. Wright, L. Ballard, F. Monrose, and G.M. Masson, “Language Identification of Encrypted Voip Traffic: Alejandra y Roberto or Alice and Bob?,” Proc. 16th USENIX Security Symp. USENIX Security Symp., pp. 4:1-4:12, http://portal.acm.org/citation.

Published

2013-12-20

How to Cite

Privacy Sanitization In Data Transmission . (2013). Trinity Journal of Management, IT & Media (TJMITM), 4(1), 33–36. Retrieved from https://acspublisher.com/journals/index.php/tjmitm/article/view/1326