IEEE Access (Jan 2024)

Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques

  • Albertus Anugerah Pekerti,
  • Arif Sasongko,
  • Adi Indrayanto

DOI
https://doi.org/10.1109/ACCESS.2024.3405317
Journal volume & issue
Vol. 12
pp. 75146 – 75168

Abstract

Read online

Secure end-to-end voice communication is crucial, but it has several issues. Researchers in this field can benefit from a review paper with broader evaluation parameters than existing literature and from a coverage of security algorithms for voice communication. This paper provides a comprehensive overview of end-to-end secure voice communication and evaluation of various methods for securing voice transmissions over communication networks. The evaluation parameters include System Throughput Capacity, Transmission Error Rate, Recovered Speech Quality, and Security of the System. The analysis results show that Steganography category is the most popular technique in recent years and the most promising category to implement high system throughput capacity. Modem-based Cryptography category is the most promising category to implement standard security algorithms with low system throughput capacity. Meanwhile, chaotic Cryptography provide suitable cryptography for voice security. Furthermore, the results reveal gaps in proposed solutions, including the evaluation and improvement of speech quality, the need for further development of compatible method to implement standard security algorithms, and the extensive development space for Artificial Intelligent based method.

Keywords