Do you want to publish a course? Click here

Implementation of a Proposal Encryption Algorithm for Voice over Internet Protocol (VoIP)

تطبيق خوارزمية تشفير مقترحة لتشفير الصوت عبر بروتوكول الانترنت

1136   7   0   0.0 ( 0 )
 Publication date 2021
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

The process of transfer a speech signal by high confidentially and as quickly as possible through the Internet needs to develop compression and encryption technology for a speech signal, so as, to reduce its size and make it understandable to persons not authorized to listen to. A system was designed to encrypt the voice over Internet Protocol (VoIP) and use compression technique for the purpose of reducing the size of data and send it over the network, (A_law PCM) algorithm was used the to compress audio data. Then algorithms of Triple Data Encryption Standard (TDES) and Advanced. Encryption Standard (AES) were applied. A new encryption algorithm was proposed based in its work on the block cipher encryption system called the Direct and Reverse algorithm, which based on three basic steps, firstly expand the initial key, secondly direct the encryption of each round in one direction, and finally substitute (Bytes) as used in the Compensation Box in AES algorithm by making it moving. In general compression ratio was calculated and it was (50%) and the results of the correlation coefficient for the proposed algorithm was compared with the results of (AES, TDES) algorithms.


Artificial intelligence review:
Research summary
تتناول هذه الورقة البحثية تصميم وتطبيق خوارزمية تشفير جديدة لنقل الصوت عبر بروتوكول الإنترنت (VoIP). يهدف البحث إلى تحقيق سرية عالية وسرعة في نقل إشارات الكلام عبر الإنترنت من خلال تطوير تقنيات ضغط وتشفير الإشارة الصوتية. تم استخدام خوارزمية A-law PCM لضغط بيانات الصوت، ثم تطبيق خوارزميتي التشفير Triple DES (TDES) وAdvanced Encryption Standard (AES). الخوارزمية الجديدة المقترحة تعتمد على نظام التشفير الكتلي وتسمى 'المباشر والمعكوس'. تتكون الخوارزمية من ثلاث خطوات أساسية: توسيع المفتاح الأولي، توجيه التشفير لكل دورة باتجاه معين، وتبديل البايتات باستخدام صندوق التعويض المتحرك. تم حساب نسبة الضغط العامة وكانت 50%، وتمت مقارنة نتائج معامل الارتباط للخوارزمية المقترحة مع نتائج خوارزميتي AES وTDES. أظهرت النتائج أن الخوارزمية المقترحة تحقق سرية عالية وكفاءة في نقل الصوت عبر الإنترنت.
Critical review
دراسة نقدية: تقدم الورقة البحثية حلاً مبتكراً لتشفير الصوت عبر بروتوكول الإنترنت، مما يعزز من سرية البيانات وسرعة نقلها. ومع ذلك، هناك بعض النقاط التي يمكن تحسينها. أولاً، لم يتم التطرق بشكل كافٍ إلى تأثير الخوارزمية الجديدة على جودة الصوت المسترجع، وهو جانب مهم في تطبيقات VoIP. ثانياً، كان من الممكن تقديم مقارنة أكثر تفصيلاً بين الخوارزمية المقترحة والخوارزميات التقليدية من حيث الأداء والكفاءة الزمنية. أخيراً، كان من المفيد تضمين تجارب عملية أكثر تنوعاً لاختبار الخوارزمية في بيئات مختلفة وظروف تشغيل متعددة.
Questions related to the research
  1. ما هي الخوارزمية المستخدمة لضغط بيانات الصوت في هذا البحث؟

    تم استخدام خوارزمية A-law PCM لضغط بيانات الصوت.

  2. ما هي الخوارزميات التي تم مقارنتها مع الخوارزمية المقترحة في البحث؟

    تمت مقارنة الخوارزمية المقترحة مع خوارزميتي AES وTDES.

  3. ما هي نسبة الضغط التي تم تحقيقها باستخدام الخوارزمية المقترحة؟

    تم تحقيق نسبة ضغط عامة بلغت 50%.

  4. ما هي الخطوات الأساسية التي تتكون منها الخوارزمية المقترحة؟

    تتكون الخوارزمية من ثلاث خطوات أساسية: توسيع المفتاح الأولي، توجيه التشفير لكل دورة باتجاه معين، وتبديل البايتات باستخدام صندوق التعويض المتحرك.


References used
.الغريري، شهد عبد الرحمن حسّو، 2003، "تصميم نظام حماية هجين وتطبيقه على النصوص"، رسالة ماجستير، كلية علوم الحاسبات والرياضيات، جامعة الموصل.
حليم، علياء موفق عبد المجيد، 2003، "تشفير إشارة الكلام بطريقة البعثرة"، رسالة ماجستير، كلية علوم الحاسبات والرياضيات، جامعة الموصل. .[3 قدو، سجى جاسم محمد، 2004، "كبس إشارة الكلام بواسطة استخلاص الخواص" ، رسالة ماجستير، كلية علوم الحاسبات والرياضيات، جامعة الموصل.
Ali. Dia Mohamad, 2007, “Analysis and Design of Voice over Internet Protocol (VoIP) Accelerato”, PH.D. Thesis, College of Engineering, University of Mosul.
rate research

Read More

There is a need for a standard protocol that provides safe and reliable commands transportation to devices over Internet/ Intranet. Thus, we propose in this paper an Automatic Remote Control Protocol ARCP that helps designers and programmers to es tablish the connection and data transport between circuits/devices over the networks which control them safely and easily. The protocol allows sharing the circuits under control, where they can send or respond to commands over the Internet. We also provide a practical implementations and tests for this protocol using different devices interfaces and controlling then remotely by building a website with an easy and flexibly user interface.
In this paper, we assess the Voice Over Internet Protocol performance by comparing the performance of two protocols used in VOIP such as SIP and H.323. Moreover, we evaluate the quality indicators such as delay and packets loss. For this purpose OPNET simulator is used as suitable simulation technology.
Right to privacy is considered one of the closest rights to the human being, and it has been the most controversial right among jurists for a long time. Also the sacredness and saintliness of the private life were preserved in ancient civilizations , heavenly religions, constitutions and legislations in most of the world countries. The concept of privacy is considered a relatively flexible concept, which means that this concept changes among societies, cultures and the cultural heritage of the countries fromone time to another. Probably the advent of computer, the information revolution and the internet gave this right a special momentum; particularly after the wide spread of information banks in the eighties of the last century, which was called the hysteria of the social communication over the internet. This hysteria was spread through websites, chat rooms and social networks where people, whether kids or adults, are putting a lot of personal information, photos and videos on line. This thing constitutes a considerable threat on the sacredness of their private lives from the violation of information, which justifies the legislated interference in many countries all over the world to pass legislations for computers and internet crimes, such as the Syrian legislator. Passing the legislative decree /17/ on 08 February 2012 in regard to organizing the communication over the internet and the internet crimes came in time to respond to the urgent need of reducing the computer and internet crimes. As such, we will highlight what was mentioned in the aforementioned decree which gave importance to the private life in the information domain, when it defined the privacy concept in its first article and dedicated article /23/ to criminalize the violation of the private life over the internet or any information system. We will try to respond to many questions about these crimes and provide some suggestions and recommendations regarding the legislative decree /17/. We hope that it attracts the necessary attention for the sake of avoiding any gaps in this decree. . ...
Services that demanded by users via internet network are classified in two main kinds, Services work in real time such as video and voice in real time and use UDP protocol, and other services that work in non-real time such as web browsing (HTTP) a nd file transfer (FTP) which use TCP Protocol. In this research, we study and analyze algorithms that enhance the quality of service for various applications. For real time application, we use queues disciplines, which gives high priority for these services and achieves minimum delay. For non-real time application, we study congestion control algorithms, which achieve best performance for reliable transfer process with existing the congestion in the network. We used OPNET 14.5 program for simulating various services via internet network. Simulation results show achieving minimum delay for voice service, and achieving high transmission rate for FTP application with existing of packets loss in the network.
This paper introduces a new algorithm to solve some problems that data clustering algorithms such as K-Means suffer from. This new algorithm by itself is able to cluster data without the need of other clustering algorithms.

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا