Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new eff

  • PDF / 1,638,656 Bytes
  • 17 Pages / 439.37 x 666.142 pts Page_size
  • 37 Downloads / 160 Views

DOWNLOAD

REPORT


Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem Elsayed M. Elshamy 1 & Aziza I. Hussein 2,3 & Hesham F. A. Hamed 2,4 & M. A. Abdelghany 2,5 & Hamdy M. Kelash 1 Received: 30 November 2019 / Revised: 10 August 2020 / Accepted: 24 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

New hybrid cryptosystems represent a highly effective method for increasing security levels of Voice over Internet Protocol (VoIP) systems. In this paper, a dual-security cryptosystem for VoIP voicemail is proposed based on two-factor authentication, followed by Baker Map and RC6 encryption. Two security system models are proposed: the first involves biometric voiceprint encryption with pin code, and the second involves dual-biometric encryption via voiceprint with fingerprint. Parameters were selected to assess the proposed security systems for both quality of function and real-life practicality. An experiment was conducted with a true VoIP call manager, VoIP terminals and fingerprint reader. In addition, Visual Basic and MATLAB were utilized for development and testing of the new cryptosystems. Behind this orthogonal frequency division multiplexing (OFDM) simulation system was developed to ensure efficiency with different signal-to-noise ratio (SNR). Comparative analysis among both encryption methods determined that the first scenario is more cost-effective than the second owing to the lack of fingerprint-reading device, but the second is more secure due to combined biometric print requirements. A comparison with techniques used by other, recently developed voice cryptosystems demonstrated lower correlation coefficient (25% improvement) and encryption processing time by the presented hybrid cryptosystem. Collectively, this paper presents a VoIP system with high security and immunity vis-à-vis image encryption noise. Keywords VoIP . Cryptosystem . Authentication . Baker map . RC6 . Encryption . Security systems

* Elsayed M. Elshamy [email protected] Extended author information available on the last page of the article

Multimedia Tools and Applications

1 Introduction VoIP is a technology embedded into new IP phone systems with the functionality for allowing callers to leave voicemails over IP networks. This system functions in a similar manner to the older answering machine tools where voice messages can be transmitted and saved on the receiving device. Consequently, the receiver is able to reply. In addition, the storage providers call managers save a copy of the message, and thus facilitating the process. This is not so different from email systems, although in this instance the caller does not handle the text; the caller simply sends a voice message [12, 29]. VoIP has its limits in that it is potentially prone to attackers and hackers. However, the addition of a two-factor authentication system significantly limits undesirables from accessing voicemails. This is in contrast to the most comm