New VoIP Traffic Security Scheme with Digital Watermarking

  • Wojciech Mazurczyk
  • Zbigniew Kotulski
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4166)


In this paper we propose a new, lightweight, no bandwidth consuming authentication and integrity scheme for VoIP service based on SIP as a signalling protocol. It is shared password mechanism and this solution exploits digital watermarking. Nowadays, there are many applications of this technique, such as solving copyright protection problems, but we propose to use it to secure the transmitted audio and signalling protocol that IP Telephony is based on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system’s security.


Packet Loss Hash Function Time Stamp Session Initiation Protocol Watermark Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dittmann, J., Mukherjee, A., Steinebach, M.: Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 62–67. IEEE Computer Science Society, Las Vegas (2000)CrossRefGoogle Scholar
  2. 2.
    Steinebach, M., Siebenhaar, F., Neubauer, C., Ackermann, R., Roedig, U., Dittmann, J.: Intrusion Detection Systems for IP Telephony Networks. In: Real time intrusion detection symposium. Estoril, Portugal (2002)Google Scholar
  3. 3.
    Yuan, S., Huss, S.: Audio Watermarking Algorithm for Real-time Speech Integrity and Authentication. In: International Multimedia Conference Proceedings of the 2004 Multimedia and security workshop on Multimedia and security, Magdeburg, Germany, pp. 220–226 (2004)Google Scholar
  4. 4.
    Sienebach, M., Lang, A., Dittmann, J., Neubauer, C.: Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2002), Las Vegas, pp. 100–105 (2002)Google Scholar
  5. 5.
    Mizrahi, T., Borenstein, E., Leifman, G., Cassuto, Y., Lustig, M., Mizrachi, S., Peleg, N.: Real-Time Implementation for Digital Watermarking in Audio Signals Using Perceptual Masking. In: 3rd European DSP Education and Research Conference, ESIEE, Noisy Le Grand, Paris (2000)Google Scholar
  6. 6.
    Lu, C., Liao, H., Chen, L.: Multipurpose Audio Watermarking. In: Proceedings of 15th International Conference on Pattern Recognition, Barcelona, Spain, pp. 282–285 (2000)Google Scholar
  7. 7.
    Arnold, M.: Attacks on Digital Audio Watermarks and Countermeasures. In: Third International Conference on WEB Delivering of Music (WEDELMUSIC 2003), Leeds, United Kingdom (2003)Google Scholar
  8. 8.
    Kuhn, D.R., Walsh, T.J., Fries, S.: Security Considerations for Voice Over IP Systems, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Special Publication 800-58 (January 2005)Google Scholar
  9. 9.
    Dittmann, J., Wohlmacher, P., Nahrstedt, K.: Using Cryptographic and Watermarking Algorithms. IEEE MultiMedia 8(4), 54–65 (2001)CrossRefGoogle Scholar
  10. 10.
    Steinebach, M., Dittmann, J.: Watermarking-based digital audio data authentication. EURASIP Journal on Applied Signal Processing 10, 1001–1015 (2003)Google Scholar
  11. 11.
    Dittmann, J., Nack, F., Steinmetz, A., Steinmetz, R.: Interactive Watermarking Environments. In: Proceedings of International Conference on Multimedia Computing and Systems, Austin, USA, pp. 286–294 (1998)Google Scholar
  12. 12.
    Gordy, J.D., Brutin, L.T.: Performance evaluation of digital audio watermarking algorithms. In: Proc. 43rd IEEE Midwest Symposium on Circuit and Systems (MWSCAS 2000), Lansing, USA, pp. 456–459 (August 2000)Google Scholar
  13. 13.
    Arnold, M.: Audio watermarking: Features, applications and algorithms. In: Proc. IEEE International Conference on Multimedia Expo. (ICME 2000), New York, USA, pp. 1013–1016 (July-August 2000)Google Scholar
  14. 14.
    Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.: RFC 3261 - SIP: Session Initiation Protocol, IETF (June 2002)Google Scholar
  15. 15.
    Johnston, A., Donovan, S., Sparks, R., Cunningham, C., Summers, K.: RFC 3665 - Session Initiation Protocol (SIP) Basic Call Flow Examples, IETF (December 2003)Google Scholar
  16. 16.
    ISO 7498. International Standards Organisation (ISO). Information processing systems - Open systems interconnection - Basic reference model - Part 2: Security architecture (ISO/IEC 7498-2) (1989)Google Scholar
  17. 17.
    Johnson, H.: Toward Adjustable Lightweight Authentication for Network Access Control, Ph.D thesis, Blekinge Institute of Technology (December 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Wojciech Mazurczyk
    • 1
  • Zbigniew Kotulski
    • 1
    • 2
  1. 1.Faculty of Electronics and Information, Technology, Institute of TelecommunicationsWarsaw University of TechnologyWarszawaPoland
  2. 2.Institute of Fundamental Technological ResearchPolish Academy of Sciences 

Personalised recommendations