Authentication in VoIP Telephony with Use of the Echo Hiding Method

Authors

  • Jakub Rachoń
  • Zbigniew Piotrowski
  • Piotr Gajewski

DOI:

https://doi.org/10.26636/jtit.2011.1.1127

Keywords:

authentication, BS 1116-1 test, digital watermarking, echo hiding

Abstract

The paper describes the method intended to authenticate identity of a VoIP subscriber with use of the data hiding technique that is specifically implemented by means of the echo hiding method. The scope includes presentation of experimental results related to transmission of information via a hidden channel with use of the SIP/SDP signalling protocol as well as results of subjective assessment on quality of a signal with an embedded watermark.

Downloads

Download data is not yet available.

Downloads

Published

2011-03-30

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
J. Rachoń, Z. Piotrowski, and P. Gajewski, “Authentication in VoIP Telephony with Use of the Echo Hiding Method”, JTIT, vol. 43, no. 1, pp. 17–21, Mar. 2011, doi: 10.26636/jtit.2011.1.1127.