Journal of Telecommunications and Information Technology (Jun 2023)
Authentication in VoIP Telephony with Use of the Echo Hiding Method
Abstract
The paper describes the method intended to authenticate identity of a VoIP subscriber with use of the data hiding technique that is specifically implemented by means of the echo hiding method. The scope includes presentation of experimental results related to transmission of information via a hidden channel with use of the SIP/SDP signalling protocol as well as results of subjective assessment on quality of a signal with an embedded watermark.
Keywords