Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Security in VoIP


     

   Subscribe/Renew Journal


In recent years, because of the significant in the field of information technology, secure communication techniques have increased widely and unexpectedly, Specially with VoIP network. In order to establish reliable communication technology and to ensure that voice reaches its intended end and to be accessible to all through the shared network, there is a need to secure communication in VoIP networks and encrypt the transmitted voice “VOICE MAIL”. The proposed system is performed in two stages, the first stage includes cryptosystem with Chaotic Encryption of voice. The second stage using fingerprint authentication.

Keywords

VoIP, Fingerprint Authentication, Chaotic Encryption, Cryptosystem.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 224

PDF Views: 2




  • Security in VoIP

Abstract Views: 224  |  PDF Views: 2

Authors

Abstract


In recent years, because of the significant in the field of information technology, secure communication techniques have increased widely and unexpectedly, Specially with VoIP network. In order to establish reliable communication technology and to ensure that voice reaches its intended end and to be accessible to all through the shared network, there is a need to secure communication in VoIP networks and encrypt the transmitted voice “VOICE MAIL”. The proposed system is performed in two stages, the first stage includes cryptosystem with Chaotic Encryption of voice. The second stage using fingerprint authentication.

Keywords


VoIP, Fingerprint Authentication, Chaotic Encryption, Cryptosystem.