Journal of Telecommunications and Information Technology (Jun 2023)

Authentication in VoIP Telephony with Use of the Echo Hiding Method

  • Jakub Rachoń,
  • Zbigniew Piotrowski,
  • Piotr Gajewski

DOI
https://doi.org/10.26636/jtit.2011.1.1127
Journal volume & issue
no. 1

Abstract

Read online

The paper describes the method intended to authenticate identity of a VoIP subscriber with use of the data hiding technique that is specifically implemented by means of the echo hiding method. The scope includes presentation of experimental results related to transmission of information via a hidden channel with use of the SIP/SDP signalling protocol as well as results of subjective assessment on quality of a signal with an embedded watermark.

Keywords