Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques

AA Pekerti, A Sasongko, A Indrayanto - IEEE Access, 2024 - ieeexplore.ieee.org
Secure end-to-end voice communication is crucial, but it has several issues. Researchers in
this field can benefit from a review paper with broader evaluation parameters than existing …

Cognitive radio networks for Internet of Things: Applications, challenges and future

MA Shah, S Zhang, C Maple - 2013 19th International …, 2013 - ieeexplore.ieee.org
Cognitive Radio (CR) has emerged as an intelligent technology to address the spectrum
scarcity issues. CR aims to use the unoccupied spectrum band when it is not used by the …

{AuthLoop}:{End-to-End} cryptographic authentication for telephony over voice channels

B Reaves, L Blue, P Traynor - 25th USENIX Security Symposium …, 2016 - usenix.org
Telephones remain a trusted platform for conducting some of our most sensitive exchanges.
From banking to taxes, wide swathes of industry and government rely on telephony as a …

Towards security of GSM voice communication

FI Abro, F Rauf, BS Chowdhry, M Rajarajan - Wireless Personal …, 2019 - Springer
Global system for mobile communication (GSM) is widely used digital mobile service around
the world. Although GSM was designed as a secure wireless system, it is now vulnerable to …

A survey of voice and communication protection solutions against wiretapping

C Ntantogian, E Veroni, G Karopoulos… - Computers & Electrical …, 2019 - Elsevier
This paper categorizes, presents and evaluates a set of schemes and solutions that provide
end-to-end encryption for voice communications. First, we analyze the research works that …

Capacity bounds and detection schemes for data over voice

R Kazemi, M Boloursaz, SM Etemadi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Cellular networks provide widespread and reliable voice communications among
subscribers through mobile voice channels. These channels benefit from superior priority …

Data transmission via GSM voice channel for end to end security

MA Özkan, SB Örs - 2015 IEEE 5th International Conference on …, 2015 - ieeexplore.ieee.org
Global System for Mobile Communications (GSM) technology still plays a key role because
of its availability, reliability and robustness. Recently, additional consumer applications are …

Effective model for real time end to end secure communication over gsm voice channel

MU Rehman, M Adnan, M Batool, LA Khan… - Wireless Personal …, 2021 - Springer
Due to the availability, robustness and reliability; Global System for Mobile Communications
(GSM) plays a vital role in our daily life. GSM security is not so strong and is susceptible to …

A speech privacy protection method based on sound masking and speech corpus

D Qi, N Longmei - Procedia computer science, 2018 - Elsevier
In this paper a new speech privacy protection method based on sound masking and speech
corpus is proposed. Frames in the speech corpus are selected according to secret keys and …