24 research outputs found

    Měření Triple play služeb v hybridní síti

    Get PDF
    The master's thesis deals with a project regarding the implementation, design and the quality of IPTV, VoIP and Data services within the Triple Play services. In heterostructural networks made up of GEPON and xDSL technologies. Different lengths of the optical and metallic paths were used for the measurements. The first part of the thesis is theoretically analyzed the development and trend of optical and metallic networks. The second part deals with the measurement of typical optical and metallic parameters on the constructed experimental network, where its integrity was tested. Another part of the thesis is the evaluation of Triple play results, regarding the test where the network was variously tasked/burdened with data traffic and evaluated according to defined standards. The last part is concerned with the Optiwave Software simulation environment.Diplomová práce se zabývá návrhem, realizací a kvalitou služeb IPTV, VoIP a Data v rámci Triple play služeb v heterostrukturní sítí tvořené GEPON a xDSL technologiemi. Pro měření byli využity různé délky optické a metalické trasy. První části diplomové práce je teoreticky rozebrán vývoj a trend optických a metalických sítí. Druhá část se zaměřuje na měření typických optických a metalických parametrů na vybudované experimentální síti, kde byla následně testována její integrita. Dalším bodem práce je vyhodnocení výsledků Triple play, kde síť je různě zatěžována datovým provozem a následně vyhodnocována podle definovaných norem. Závěr práce je věnovaný simulačnímu prostředí Optiwave.440 - Katedra telekomunikační technikyvýborn

    Secure covert communications over streaming media using dynamic steganography

    Get PDF
    Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out. A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance. The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process. A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel. The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms

    Improved Performance of Secured VoIP Via Enhanced Blowfish Encryption Algorithm

    Get PDF
    Both the development and the integration of efficient network, open source technology, and Voice over Internet Protocol (VoIP) applications have been increasingly important and gained quick popularity due to new rapidly emerging IP-based network technology. Nonetheless, security and privacy concerns have emerged as issues that need to be addressed. The privacy process ensures that encryption and decryption methods protect the data from being alternate and intercept, a privacy VoIP call will contribute to private and confidential conversation purposes such as telebanking, telepsychiatry, health, safety issues and many more. Hence, this study had quantified VoIP performance and voice quality under security implementation with the technique of IPSec and the enhancement of the Blowfish encryption algorithm. In fact, the primary objective of this study is to improve the performance of Blowfish encryption algorithm. The proposed algorithm was tested with varying network topologies and a variety of audio codecs, which contributed to the impact upon VoIP network. A network testbed with seven experiments and network configurations had been set up in two labs to determine its effects on network performance. Besides, an experimental work using OPNET simulations under 54 experiments of network scenarios were compared with the network testbed for validation and verification purposes. Next, an enhanced Blowfish algorithm for VoIP services had been designed and executed throughout this research. From the stance of VoIP session and services performance, the redesign of the Blowfish algorithm displayed several significant effects that improved both the performance of VoIP network and the quality of voice. This finding indicates some available opportunities that could enhance encrypted algorithm, data privacy, and integrity; where the balance between Quality of Services (QoS) and security techniques can be applied to boost network throughput, performance, and voice quality of existing VoIP services. With that, this study had executed and contributed to a threefold aspect, which refers to the redesign of the Blowfish algorithm that could minimize computational resources. In addition, the VoIP network performance was analysed and compared in terms of end-to-end delay, jitter, packet loss, and finally, sought improvement for voice quality in VoIP services, as well as the effect of the designed enhanced Blowfish algorithm upon voice quality, which had been quantified by using a variety of voice codecs

    Digital Watermarking for Verification of Perception-based Integrity of Audio Data

    Get PDF
    In certain application fields digital audio recordings contain sensitive content. Examples are historical archival material in public archives that preserve our cultural heritage, or digital evidence in the context of law enforcement and civil proceedings. Because of the powerful capabilities of modern editing tools for multimedia such material is vulnerable to doctoring of the content and forgery of its origin with malicious intent. Also inadvertent data modification and mistaken origin can be caused by human error. Hence, the credibility and provenience in terms of an unadulterated and genuine state of such audio content and the confidence about its origin are critical factors. To address this issue, this PhD thesis proposes a mechanism for verifying the integrity and authenticity of digital sound recordings. It is designed and implemented to be insensitive to common post-processing operations of the audio data that influence the subjective acoustic perception only marginally (if at all). Examples of such operations include lossy compression that maintains a high sound quality of the audio media, or lossless format conversions. It is the objective to avoid de facto false alarms that would be expectedly observable in standard crypto-based authentication protocols in the presence of these legitimate post-processing. For achieving this, a feasible combination of the techniques of digital watermarking and audio-specific hashing is investigated. At first, a suitable secret-key dependent audio hashing algorithm is developed. It incorporates and enhances so-called audio fingerprinting technology from the state of the art in contentbased audio identification. The presented algorithm (denoted as ”rMAC” message authentication code) allows ”perception-based” verification of integrity. This means classifying integrity breaches as such not before they become audible. As another objective, this rMAC is embedded and stored silently inside the audio media by means of audio watermarking technology. This approach allows maintaining the authentication code across the above-mentioned admissible post-processing operations and making it available for integrity verification at a later date. For this, an existent secret-key ependent audio watermarking algorithm is used and enhanced in this thesis work. To some extent, the dependency of the rMAC and of the watermarking processing from a secret key also allows authenticating the origin of a protected audio. To elaborate on this security aspect, this work also estimates the brute-force efforts of an adversary attacking this combined rMAC-watermarking approach. The experimental results show that the proposed method provides a good distinction and classification performance of authentic versus doctored audio content. It also allows the temporal localization of audible data modification within a protected audio file. The experimental evaluation finally provides recommendations about technical configuration settings of the combined watermarking-hashing approach. Beyond the main topic of perception-based data integrity and data authenticity for audio, this PhD work provides new general findings in the fields of audio fingerprinting and digital watermarking. The main contributions of this PhD were published and presented mainly at conferences about multimedia security. These publications were cited by a number of other authors and hence had some impact on their works

    Development of a 3G Authentication Based Mobile Access of Health Records: A Mobile Telemedicine Application

    Get PDF
    As our country progresses in its aim to be a developed country by the Year 2020, the field of Information and Communications Technology or ICT is fast becoming the forerunner for the vision. The Internet is used in almost all aspects of life. As for the communications sector, according to Global Mobile Subscriber Database December 2002 report, there are 8,814,700 mobile subscribers in Malaysia with an Annual Growth of 16.6%. Withthe adoption of 3G-communication technology in the coming years, compelling high speed services, reaching up to 2 Mb/s together with improved security features would soon be possible. Through these years in the mobile industry, the health sector has always been neglected. Reason being, the technology could not support the application and it is not so much of a revenue generating business compared to mobile games or sports news. With globalization where the society is always on the move across borders, together with degrading environment conditions and the need for time, instant health services are becoming crucial. Looking into these conditions of mobile adoption and health status, the author intends to develop a solution for a mobile telemedicine application. Kevin Hung (2003) defines telemedicine as the utilization of telecommunication technology for medical diagnosis, treatment and patient care. Thus, the main aim of this project was to develop an application that could be used for medical purposes. This project integrates the latest mobile telecommunication technologies together with medical services with the idea of providing a highly secured personalize medical system and database query as mobile handsets are becoming a necessity to individuals. This would make updating and retrieving medical health records hassle free, anytime and anywhere. This project has also laid the groundwork for future expansion by incorporating the basic audio and video streaming features. This report accounts for all the concepts, design works and results of the mobile telemedicine application that has been developed successfully

    Secure VoIP Performance Measurement

    Get PDF
    This project presents a mechanism for instrumentation of secure VoIP calls. The experiments were run under different network conditions and security systems. VoIP services such as Google Talk, Express Talk and Skype were under test. The project allowed analysis of the voice quality of the VoIP services based on the Mean Opinion Score (MOS) values generated by Perceptual valuation of Speech Quality (PESQ). The quality of the audio streams produced were subjected to end-to-end delay, jitter, packet loss and extra processing in the networking hardware and end devices due to Internetworking Layer security or Transport Layer security implementations. The MOS values were mapped to Perceptual Evaluation of Speech Quality for wideband (PESQ-WB) scores. From these PESQ-WB scores, the graphs of the mean of 10 runs and box and whisker plots for each parameter were drawn. Analysis on the graphs was performed in order to deduce the quality of each VoIP service. The E-model was used to predict the network readiness and Common vulnerability Scoring System (CVSS) was used to predict the network vulnerabilities. The project also provided the mechanism to measure the throughput for each test case. The overall performance of each VoIP service was determined by PESQ-WB scores, CVSS scores and the throughput. The experiment demonstrated the relationship among VoIP performance, VoIP security and VoIP service type. The experiment also suggested that, when compared to an unsecure IPIP tunnel, Internetworking Layer security like IPSec ESP or Transport Layer security like OpenVPN TLS would improve a VoIP security by reducing the vulnerabilities of the media part of the VoIP signal. Morever, adding a security layer has little impact on the VoIP voice quality

    The Effect Of Acoustic Variability On Automatic Speaker Recognition Systems

    Get PDF
    This thesis examines the influence of acoustic variability on automatic speaker recognition systems (ASRs) with three aims. i. To measure ASR performance under 5 commonly encountered acoustic conditions; ii. To contribute towards ASR system development with the provision of new research data; iii. To assess ASR suitability for forensic speaker comparison (FSC) application and investigative/pre-forensic use. The thesis begins with a literature review and explanation of relevant technical terms. Five categories of research experiments then examine ASR performance, reflective of conditions influencing speech quantity (inhibitors) and speech quality (contaminants), acknowledging quality often influences quantity. Experiments pertain to: net speech duration, signal to noise ratio (SNR), reverberation, frequency bandwidth and transcoding (codecs). The ASR system is placed under scrutiny with examination of settings and optimum conditions (e.g. matched/unmatched test audio and speaker models). Output is examined in relation to baseline performance and metrics assist in informing if ASRs should be applied to suboptimal audio recordings. Results indicate that modern ASRs are relatively resilient to low and moderate levels of the acoustic contaminants and inhibitors examined, whilst remaining sensitive to higher levels. The thesis provides discussion on issues such as the complexity and fragility of the speech signal path, speaker variability, difficulty in measuring conditions and mitigation (thresholds and settings). The application of ASRs to casework is discussed with recommendations, acknowledging the different modes of operation (e.g. investigative usage) and current UK limitations regarding presenting ASR output as evidence in criminal trials. In summary, and in the context of acoustic variability, the thesis recommends that ASRs could be applied to pre-forensic cases, accepting extraneous issues endure which require governance such as validation of method (ASR standardisation) and population data selection. However, ASRs remain unsuitable for broad forensic application with many acoustic conditions causing irrecoverable speech data loss contributing to high error rates

    Development of a 3G Authentication Based Mobile Access of Health Records: A Mobile Telemedicine Application

    Get PDF
    As our country progresses in its aim to be a developed country by the Year 2020, the field of Information and Communications Technology or ICT is fast becoming the forerunner for the vision. The Internet is used in almost all aspects of life. As for the communications sector, according to Global Mobile Subscriber Database December 2002 report, there are 8,814,700 mobile subscribers in Malaysia with an Annual Growth of 16.6%. Withthe adoption of 3G-communication technology in the coming years, compelling high speed services, reaching up to 2 Mb/s together with improved security features would soon be possible. Through these years in the mobile industry, the health sector has always been neglected. Reason being, the technology could not support the application and it is not so much of a revenue generating business compared to mobile games or sports news. With globalization where the society is always on the move across borders, together with degrading environment conditions and the need for time, instant health services are becoming crucial. Looking into these conditions of mobile adoption and health status, the author intends to develop a solution for a mobile telemedicine application. Kevin Hung (2003) defines telemedicine as the utilization of telecommunication technology for medical diagnosis, treatment and patient care. Thus, the main aim of this project was to develop an application that could be used for medical purposes. This project integrates the latest mobile telecommunication technologies together with medical services with the idea of providing a highly secured personalize medical system and database query as mobile handsets are becoming a necessity to individuals. This would make updating and retrieving medical health records hassle free, anytime and anywhere. This project has also laid the groundwork for future expansion by incorporating the basic audio and video streaming features. This report accounts for all the concepts, design works and results of the mobile telemedicine application that has been developed successfully
    corecore