Design and implementation of the hybrid system for encryption and hiding the text file in the Voice over Internet Protocols.
|
|
- Abraham Jefferson
- 5 years ago
- Views:
Transcription
1 حص يى وحنفيذ نظاو هجين نخشفيز وإخفاء ان هف االنخزنج اننصي في بزوحىكىالث انصىث عبز هذا البحث (TDES) Session Initial Protocol(SIP) Real-Time Transport Protocol Real-Time Transport Control Protocol(RTCP) (DES) BMP Session Description Protocol(SDP) (RTP) Pixel Visual C Matlab7.6 (R008a) Design and implementation of the hybrid system for encryption and hiding the text file in the Voice over Internet Protocols. Dr.Manar Y. Kashmola Assistant Prof. Computer Science College of Computer Sciences and Mathematics Rasha Awad Hasan M.Sc./ ABSUTRACT The immense development in the communication network has opened new spheres that threaten the data security transferred via the communication networks. As a consequence the techniques of encryption and information hiding and merging them to increase the security of data sent.
2 The paper present suggestion and design for a system to send data secretly by merging encryption technique and information hiding using steganography technique and covert channels to hide the data. The secret data needed to be sent encoded by using Data Encryption Standard (DES) algorithm or by Triple Data Encryption Standard (TDES) algorithm. Then the encoded data were hided in a form of colored image of BMP type using Least Significant Bit technique (LSB). The covert channels of Voice Over Internet Protocol used its type value based spatial channel and active behavior to send the stego-image or text file using Session Initial Protocol(SIP) Session Description Protocol(SDP) Real-Time Transport Protocol (RTP) Real-Time Transport Control Protocol(RTCP). The results have been retrieved hidden information properly for all the protocols. The hiding in image was done by using one slide or three slides of image in one bit or two bits or three bits where the transfer taken place from one pixel to another either by using one key or two key or three key. It is concluded that the hiding in one bit given less error value but with longer execution time that is the value of depends on the number of bits were changed and by using multiple keys to increase the secrecy with the guarantee of not losing the data. Visual C and Matlab7.6 (R008a)were used in the programming. Encryption Steganography
3 [] Voice Over IP traffic volume Conversation Phase Signaling Phase traffic DES BMP TDES LSB VOIP TCP/IP Handel Sandfordr 996 TOS IP reversed TCP [8] Watanabe Gomez Cauich 004 Fragment Identification IP [7] Offset
4 Cubuk Bordly Shields IP 5 Llamas Server proxy Identification IP [0] 005 chauhan TimeStamp TCP TCP 6 Murdoch Lwies identification IP Sequence number TCP Linux [] 006 Zander Armitage Branch Time To Live (TTL) IP [6] Kwecka HTTP [9] 008 Mazurezyk Szczypiorski RTP RTCP [] SIP SDP [] 009 Anguraj Balamurugand RTP RTP 4 IP UDP, TCP, ICMP 00 TDES) (AES) Direct and Reverse
5 DES 8 TDES 4 -LSB -LSB -LSB Pixel 4 5 Mean Squared Error(): pixel فه نا يزسنا حاخف نا يزسنا حاخفي ءافخلإا فه نا يزسنا كف زيفشح عاجزخسا فه نا زفش نا ني ةرىصنا ةرىص ءاطغنا فه نا زفش نا زيفشخنا ءافخلإا يف ةرىصنا حاخفي ءافخلإا فه نا زفش نا حاخف نا يزسنا فه نا يزسنا Covert Channel تهج لاسرلإا تهج ولاخسلاا يرىص فهي وا يصن
6 m n mn x 0 y 0 stego _ im( x, y) cov er _ im( x, y) m,n stego _ im cover _ im Signal to Noise Ratio() x, y cov er _ im( x, y) cov er _ im( x, y) stego _ im( x, y). x, y Peak Signal to Noise Ratio(P) P db P [4] Undetectabililty P 0. log 0 Max value of Gray level 5 BMP *480 P P P P
7 / / P / / P , ,
8
9 5 6 7
10 6 source port voice over IP is one of UDP file RTCP RR RTCP SR RTP SDP SIP most popular services in IP networks Ethereal UDP source port RTP SDP SIP file SIP voice over IP is one of popular services in IP Max-Forwards Via branch CSeq From SIP RTCP 8 6 networks Tag
11 SDP voice over IP is one of popular services in IP Owner Ver SDP 6 networks CSeq RTP voice over IP is one of popular services in IP 8 RTP padding data Padding NTP TimeStamp padding data 6 networks RTP انشكم) 8 ( RTCP RTCP SR voice over IP is one of popular services in IP Report Block 9 NTP TimeStamp 4 6 networks
12 RTCP Sender Report RTCP RR voice over IP is one of popular services in IP Report Block Report Block RTCP Receiver Report 0 help 5 5 RTP 9 BMP 7 networks 0 0 انشكم) ( RTCP
13 أ- ب- ) ي ثم صىرة اإلخفاء انشكم) أ- ) ي ثم صىرة انغطاء وانشكم ) ب- 7 8 RTP RTCP RR RTCP SR
14 Anguraj S. and Balamurugand D.,009, "Implementation of Audio Steganography in Real-Time Protocol(RTP) and Hypothesis of RTP Features" National conference on Intelligent Electrical System(NCIES). 5- Cabuk, Serdar, Brodley, Carla and Shields, Clay (004), "IP Covert Timing Channels: An Initial Exploration", Washington, USA. 6- Chauhan, Sweety, 005, "Analysis and Detection of Network Covert Channels" Department of Computer Science and Electrical Engineering University of Maryland Baltimore County. 7- Cauich, Enrique, Gómez, Roberto and Watanabe, Ryouske (004), "Data Hiding in Identification and Offset IP Fields", University of California, Irvine USA. 8- Handel, T. and Sandford,M., 996 Hiding data in the OSI network model, in Proceedings of the First International Workshop on Information Hiding pp Kwecka, Zbigniew, (006), "Application Layer Covert Channel Analysis and Detection", University for the degree of Bachelor of Science with Honours in Networked Computing, Napier University, Edinburgh. 0- Llamas, David, (004), "Covert Channel Analysis and Data Hiding in TCP/IP", University for the degree of Bachelor of Science with Honours in Software Technology, Napier University, Edinburgh. - Mazurczyk, Wojciech and Szczypiorski, Krzysziof, 008, "Steganography of VoIP Streams", Warsaw University of Technology, Faculty of Electronics and Information Technology Institute of Telecommunication.
15 - Mazurczyk, Wojciech and Szczypiorski, Krzysziof, 008, "Covert Channel in SIP for VoIP Signalling", Warsaw University of Technology, Faculty of Electronics and Information Technology Institute of Telecommunication. - Murdoch, Steven J. And Lewis, Stephen, (005), "Embedding Covert Channels into TCP/IP", University of Cambridge, United Kingdom 4- Rana, Rita and Singh, Er.Dheerendra,00, "Steganography- Cocealing Messages in Images using LSB Replacement Technique with Pre determined Random Pixel and Segmentation Image", International Journal of Computer Science & Communication, Vol., No., PP Saffor, Amhamed and Ramli, Abdul Rahman, (00), "A Comparative Study of Image Compression between JPEG and Wavelet", University Putra Malaysia, vol. 4, no., 00, pp. 9-45, Selangor, Malaysia. 6- Zander, Sebastian, Armitage, Grenville and Branch, Philip (006), "Covert Channels in the IP Time To Live Field", Swinburne University of Technology Australia.
Packet Length Based Steganography Detection in Transport Layer
International Journal of Scientific and Research Publications, Volume 2, Issue 2, December 202 Packet Length Based Steganography Detection in Transport Layer Rajeshwari Goudar, Anjali Patil Department
More informationCovert Channels in the IP Time To Live TTL Field Sebastian Zander, Grenville Armitage, Philip Branch {szander,garmitage,pbranch}@swin.edu.au http://caia.swin.edu.au ATNAC 2006 Outline What are covert channels?
More informationCHAPTER 3. Digital Carriers of Steganography
CHAPTER 3 Digital Carriers of Steganography 3.1 Introduction It has been observed that all digital file formats can be used as digital carrier for steganography, but the formats those are with a high degree
More informationINFORMATION HIDING IN COMMUNICATION NETWORKS
0.8125 in Describes information hiding in communication networks, and highlights its important issues, challenges, trends, and applications. Highlights development trends and potential future directions
More informationTransporting Voice by Using IP
Transporting Voice by Using IP Voice over UDP, not TCP Speech Small packets, 10 40 ms Occasional packet loss is not a catastrophe Delay-sensitive TCP: connection set-up, ack, retransmit delays 5 % packet
More informationProtocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012
Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationNew Approach towards Covert Communication using TCP-SQN Reference Model
ISSN 2278 0211 (Online) New Approach towards Covert Communication using TCP-SQN Reference Model Dhananjay M. Dakhane Department of Computer science & Engineering Sipna College of Engineering & Technology,
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationInternational Journal of Computer Engineering and Applications,
International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationCovert channels in TCP/IP: attack and defence
Covert channels in TCP/IP: attack and defence The creation and detection of TCP/IP steganography for covert channels and device fingerprinting Steven J. Murdoch and Stephen Lewis http://www.cl.cam.ac.uk/users/{sjm217,
More informationReal Time Protocols. Overview. Introduction. Tarik Cicic University of Oslo December IETF-suite of real-time protocols data transport:
Real Time Protocols Tarik Cicic University of Oslo December 2001 Overview IETF-suite of real-time protocols data transport: Real-time Transport Protocol (RTP) connection establishment and control: Real
More informationIntroduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video
Preface p. xi Acknowledgments p. xvii Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Experiments p. 4 Audio
More informationInternet Streaming Media. Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2007
Internet Streaming Media Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2007 Multimedia Streaming UDP preferred for streaming System Overview Protocol stack Protocols RTP + RTCP SDP RTSP SIP
More informationChapter 28. Multimedia
Chapter 28. Multimedia 28-1 Internet Audio/Video Streaming stored audio/video refers to on-demand requests for compressed audio/video files Streaming live audio/video refers to the broadcasting of radio
More informationInternet Streaming Media. Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006
Internet Streaming Media Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 Multimedia Streaming UDP preferred for streaming System Overview Protocol stack Protocols RTP + RTCP SDP RTSP SIP
More informationEfficient Image Steganography Using Integer Wavelet Transform
Efficient Image Steganography Using Integer Wavelet Transform DHIVYA DHARSHINI. K 1, Dr. K. ANUSDHA 2 1 M.Tech, Department of Electronics Engineering, Pondicherry University, Puducherry, India. 2 Assistant
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationL1/L2 NETWORK PROTOCOL TESTING
L1/L2 NETWORK PROTOCOL TESTING MODULE 1 : BASIC OF NETWORKING OSI Model TCP/IP Layers Service data unit & protocol data unit Protocols and standards Network What is network & Internet Network core circuit
More informationReLACK: A Reliable VoIP Steganography Approach
2011 Fifth International Conference on Secure Software Integration and Reliability Improvement ReLACK: A Reliable VoIP Steganography Approach Mohammad Hamdaqa, Ladan Tahvildari Software Technologies Applied
More informationProvide a generic transport capabilities for real-time multimedia applications Supports both conversational and streaming applications
Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP Performance Tests Build-out Delay
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationA common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert
A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationLecture 14: Multimedia Communications
Lecture 14: Multimedia Communications Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 14-1 Multimedia Characteristics Bandwidth Media has natural bitrate, not very flexible. Packet
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationQR-Code Image Steganography
M. Ramesh 1,,G.Prabakaran 2 and R. Bhavani 3 1 Department of CSE, Assistant Professor, AVS college of Engineering & Technology, Nellore 524 111, India. 2,3 Department of CSE, Faculty of Engineering & Technology,
More informationMultimedia Applications. Classification of Applications. Transport and Network Layer
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
More informationReal-time Services BUPT/QMUL
Real-time Services BUPT/QMUL 2017-05-27 Agenda Real-time services over Internet Real-time transport protocols RTP (Real-time Transport Protocol) RTCP (RTP Control Protocol) Multimedia signaling protocols
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationNetwork Forensics and Covert Channels Analysis in Internet Protocols
School of Computer Science North Haugh KY16 9SX Scotland, UK Network Forensics and Covert Channels Analysis in Internet Protocols #1 Covert Channels in Internet Protocols PhD Student Email david@dcs.st-andrews.ac.uk
More informationDetect Covert Channels in TCP/IP Header using Naive Bayes
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.881
More informationNetworking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services
More informationRTP. Prof. C. Noronha RTP. Real-Time Transport Protocol RFC 1889
RTP Real-Time Transport Protocol RFC 1889 1 What is RTP? Primary objective: stream continuous media over a best-effort packet-switched network in an interoperable way. Protocol requirements: Payload Type
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationReal-time Services BUPT/QMUL
Real-time Services BUPT/QMUL 2015-06-02 Agenda Real-time services over Internet Real-time transport protocols RTP (Real-time Transport Protocol) RTCP (RTP Control Protocol) Multimedia signaling protocols
More informationText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More informationImplementation of a Covert Channel in the Header
Implementation of a Covert Channel in the 802.11 Header Lilia Frikha 1, Zouheir Trabelsi 2, and Wassim El-Hajj 2 1 Ecole Supérieure des Communications de Tunis (SupCom), Al Ghazala, Ariana, Tunisia 2 UAE
More informationTransporting Voice by Using IP
Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone
More informationLecture 7: Internet Streaming Media. Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2007
Lecture 7: Internet Streaming Media Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2007 Notes on Previous Lecture RTCP Packets SR and RR can be used for independent network management Payload
More informationLecture 7: Internet Streaming Media
Lecture 7: Internet Streaming Media Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2007 Notes on Previous Lecture RTCP Packets SR and RR can be used for independent network management Payload
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationRTP: A Transport Protocol for Real-Time Applications
RTP: A Transport Protocol for Real-Time Applications Provides end-to-end delivery services for data with real-time characteristics, such as interactive audio and video. Those services include payload type
More informationTRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY James Collins, Sos Agaian Department of Electrical and Computer Engineering The University of Texas at San Antonio, San Antonio, Texas, USA james.collins@utsa.edu,
More informationMultimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic!
Part 3: Lecture 3 Content and multimedia Internet traffic Multimedia How can multimedia be transmitted? Interactive/real-time Streaming 1 Voice over IP Interactive multimedia Voice and multimedia sessions
More informationPart 3: Lecture 3! Content and multimedia!
Part 3: Lecture 3! Content and multimedia! Internet traffic! Multimedia! How can multimedia be transmitted?! Interactive/real-time! Streaming! Interactive multimedia! Voice over IP! Voice and multimedia
More informationMultimedia networks. Additional references. Jargon. Analog to Digital (S5 4.3) KR: Kurose and Ross chapter 7 (KR3: 3 rd ed)
Additional references Multimedia networks KR: Kurose and Ross chapter 7 (KR3: 3 rd ed) C4: Douglas Comer, Internetworking with TCP/IP Vol 1: Principles, Protocols and Architecture 4 th ed, Prentice-Hall
More informationCS519: Computer Networks. Lecture 9: May 03, 2004 Media over Internet
: Computer Networks Lecture 9: May 03, 2004 Media over Internet Media over the Internet Media = Voice and Video Key characteristic of media: Realtime Which we ve chosen to define in terms of playback,
More informationRTP/RTCP protocols. Introduction: What are RTP and RTCP?
RTP/RTCP protocols Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher connection speeds have
More information陳懷恩博士助理教授兼所長國立宜蘭大學資訊工程研究所 TEL: # 255
Introduction ti to VoIP 陳懷恩博士助理教授兼所長國立宜蘭大學資訊工程研究所 Email: wechen@niu.edu.tw TEL: 3-93574 # 55 Outline Introduction VoIP Call Tpyes VoIP Equipments Speech and Codecs Transport Protocols Real-time Transport
More informationApproaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches
Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches Dr. Elmabruk M Laias * Department of Computer, Omar Al-mukhtar
More information4 rd class Department of Network College of IT- University of Babylon
1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen
More informationImplementation of Random Byte Hiding algorithm in Video Steganography
Implementation of Random Byte Hiding algorithm in Video Steganography S.Aswath 1, K.Akshara 2, P.Pavithra 2, D.S.Abinaya 2 Asssisant Professor 1, Student 2 (IV Year) Department of Electronics and Communication
More informationABSTRACT. that it avoids the tolls charged by ordinary telephone service
ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet
More informationMultimedia Protocols. Foreleser: Carsten Griwodz Mai INF-3190: Multimedia Protocols
Multimedia Protocols Foreleser: Carsten Griwodz Email: griff@ifi.uio.no 11. Mai 2006 1 INF-3190: Multimedia Protocols Media! Medium: "Thing in the middle! here: means to distribute and present information!
More informationInternet Streaming Media
Multimedia Streaming Internet Streaming Media Reji Mathew NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 preferred for streaming System Overview Protocol stack Protocols + SDP SIP Encoder Side Issues
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationDepartment of Computer Science. Burapha University 6 SIP (I)
Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationImage Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm
Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm Monika Gunjal #1, Jasmine Jha *2 # M.E, CE Dept, L.J.Engg College, India * M.E, I.T.Dept, L.J.EnggCollege,India Abstract - Steganography
More informationMultimedia networking: outline
Multimedia networking: outline 7.1 multimedia networking applications 7.2 streaming stored video 7.3 voice-over-ip 7.4 protocols for real-time conversational applications: RTP, SIP 7.5 network support
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationInternet protocols, TCP/IP suite
Internet protocols, TCP/IP suite S-72.353 March 20, 2000 L353_8.shw Slide 1 of 23 Layered structure of TCP/IP /D\HU 6HUYL FHV 6073 '16 KWWS )73 7(/1(7 7 &3 8 '3 193,3,& 03,3 $53 5$53 &60$&' 7RNHQ ULQJ
More informationROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING
ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ABSTRACT: Video data hiding is still an important research topic due to the design complexities involved. We propose a
More informationIntroduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices
Preface p. xv Acknowledgments p. xvii Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices p. 6 Firewall
More informationAdaptive data hiding based on VQ compressed images
Adaptive data hiding based on VQ compressed images W.-C. Du and W.-J. Hsu Vision, Image and Signal Processing, IEE Proceedings 22 Aug. 2003 Volume: 150, Issue: 4 Page(s): 233-238 Presented by Benjamin
More informationAppendix A. Definition of Terms
Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationKommunikationssysteme [KS]
Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationA Packet Loss Tolerant Algorithm for Information Hiding in Voice over IP
A Packet Loss Tolerant Algorithm for Information Hiding in Voice over IP Harrison Neal and Hala ElAarag Department of Mathematics and Computer Science Stetson University DeLand, FL, USA {hneal,helaarag@stetson.edu
More informationAN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE
AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE 1 SITI DHALILA MOHD SATAR, 1 NAZIRAH ABD HAMID, 1 FATIMAH GHAZALI, 1 ROSLINDA MUDA, 1 MOHAMAD AFENDEE MOHAMED 1 Faculty of Informatics and Computing,
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationCSCD 433/533 Advanced Networks Fall Lecture 14 RTSP and Transport Protocols/ RTP
CSCD 433/533 Advanced Networks Fall 2012 Lecture 14 RTSP and Transport Protocols/ RTP 1 Topics Multimedia Player RTSP Review RTP Real Time Protocol Requirements for RTP RTP Details Applications that use
More informationNathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers
Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Introduction to steganography org.steganography library principles Hide & Reveal screenshots 14/05/2010 Steganography made
More informationEDA095 Audio and Video Streaming
EDA095 Audio and Video Streaming Pierre Nugues Lund University http://cs.lth.se/pierre_nugues/ May 15, 2013 Pierre Nugues EDA095 Audio and Video Streaming May 15, 2013 1 / 33 What is Streaming Streaming
More informationHigh Assurance Evaluations Challenges in Formal Security Policy Modeling & Covert Channel Analysis. Sai Pulugurtha September 24, 2008
High Assurance Evaluations Challenges in Formal Security Policy Modeling & Covert Channel Analysis Sai Pulugurtha September 24, 2008 Overview Introduction and Goals SPM and CCA Requirements in Common Criteria
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationMultimedia in the Internet
Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationSecurity and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California
Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in
More informationPilsung Taegyun A Fathur Afif A Hari A Gary A Dhika April Mulya Yusuf Anin A Rizka B Dion Siska Mirel Hani Airita Voice over Internet Protocol Course Number : TTH2A3 CLO : 2 Week : 7 ext Circuit Switch
More informationThe Steganography In Inactive Frames Of Voip
The Steganography In Inactive Frames Of Voip This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1
More informationVoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint
More informationDr. Nasseer M. Basheer, Lecturer, Technical Engineering College/Mosul Northern Technical University/Iraq
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Arduino Based Text
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More information