![]() The process involves video encryption, data embedding, and data extraction. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. It is necessary to perform data hiding in these encrypted videos for the purpose of content notation and/or tampering detection. Perceptual Evaluation of Speech Quality (PESQ) as a speech-specific quality evaluation technique is used in this paper, then it will be mapped to the most common metric in opinion rating Mean Opinion Score (MOS) values to test the quality of the received voice stream.įor providing privacy and security digital video want to be processed and stored in encrypted domain. In this paper, several experiments have been conducted to assess the effect of encryption, speech coding and packet loss on speech quality. Encryption techniques could be used before or after speech coding. Also, the type of speech coder has also implications as different speech coders have different accumulation and algorithmic delays. Applying encryption techniques to VoIP traffic should take into consideration strict delay requirement for real-time traffic. The most common security enforcer applied to achieve confidentiality is encryption. ![]() Currently, there is a great interest in securing VoIP calls especially after many recent leaks and eavesdropping cases. Multimedia streaming sessions in general and Voice over Internet Protocol (VoIP) calls in specific are more vulnerable to security attacks than traditional telephone calls due to the vulnerability of the IP network itself. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |