Novel end-to-end voice encryption method in GSM system

被引:0
|
作者
Qi, H. F. [1 ]
Yang, X. H. [1 ]
Jiang, R. [1 ]
Liang, B. [1 ]
Zhou, S. J. [1 ]
机构
[1] SE Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the GSM security mechanism cannot assure end-to-end secure communications, this paper presents a novel voice encryption method based on current voice channel, which overcomes data channel's shortages and solves the problem of voice encryption penetrating the RPE-LTP vocoder. The proposed method realizes the end-to-end secure communications in the GSM system with short time delay, good compatibility to all GSM networks, and easy implementation without any modification in current GSM signaling system.
引用
收藏
页码:217 / 220
页数:4
相关论文
共 50 条
  • [31] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [32] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [33] An Encryption Protocol for End-to-end Secure Transmission of SMS
    Thomas, Minta
    Panchami, V
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [34] Secure End-to-End Communication over GSM and PSTN Networks
    Islam, Saad
    Ajmal, Fatima
    Ali, Salman
    Zahid, Jawad
    Rashdi, Adnan
    2009 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2009, : 321 - 324
  • [35] Secure End-to-End SMS Communication over GSM Networks
    Islam, Saad
    Ul Haq, Inam
    Saeed, Amna
    2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 286 - 292
  • [36] A Novel End-To-End Approach For Offline Signature Verification System
    Thakare, Bhushan S.
    Deshmukh, Hemant R.
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [37] Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network
    Inam, Saba
    Kanwal, Shamsa
    Anwar, Anousha
    Mirza, Noor Fatima
    Alfraihi, Hessa
    EGYPTIAN INFORMATICS JOURNAL, 2024, 28
  • [38] Speaker voice normalization for end-to-end speech translation
    Xue, Zhengshan
    Shi, Tingxun
    Zhang, Xiaolei
    Xiong, Deyi
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 248
  • [39] END-TO-END TRAINING OF A LARGE VOCABULARY END-TO-END SPEECH RECOGNITION SYSTEM
    Kim, Chanwoo
    Kim, Sungsoo
    Kim, Kwangyoun
    Kumar, Mehul
    Kim, Jiyeon
    Lee, Kyungmin
    Han, Changwoo
    Garg, Abhinav
    Kim, Eunhyang
    Shin, Minkyoo
    Singh, Shatrughan
    Heck, Larry
    Gowda, Dhananjaya
    2019 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU 2019), 2019, : 562 - 569
  • [40] Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 249 - 268