Skip to main content

Secure Authentication for Mobile Devices Based on Acoustic Background Fingerprint

  • Conference paper
Knowledge and Systems Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 244))

Abstract

In this paper, we propose a method to establish a secured authentication among the mobile devices based on the background audio. The devices will record synchronous ambient audio signals. Fingerprints from background is used to generated the shared cryptographic key between devices without sending the information from ambient audio itself. Noise in fingerprints will be detected and fixed by using Reed-Solomon error correcting code. In order to examine this approach, fuzzy commitment scheme is introduced to enable the adaption of the specific value of tolerated noise in fingerprint by altering internal parameters of error correction. Besides, we introduce the method of background classification to alter the threshold of error correction automatically. Furthermore, the silent background issue is also solved thoroughly by several approaches. The system is build and tested on iOS and indoor environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Haitsma, J., Kalker, T.: A Highly robust audio fingerprint system (2002)

    Google Scholar 

  2. Wan, W., Yu, X., Yang, W., Deng, J.: Audio fingerprints based on spectral energy structure and NMF. In: Communication Technology (ICCT), pp. 1103–1106 (September 2011)

    Google Scholar 

  3. Blum, T., Keislar, D., Wheaton, J., Wold, E.: Content-Based Classification, Search, and Retrieval of Audio. IEEE Multimedia 3, 27–36 (1996)

    Article  Google Scholar 

  4. Schrmann, D., Sigg, S.: Secure communication based on ambient audio (February 2013)

    Google Scholar 

  5. Dinda, P., Dick, R., Memik, G., Tarzia, S.: Indoor localization withouth infrastructure using the Acoustic Background Spectrum. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, pp. 155–168 (2011)

    Google Scholar 

  6. Wikipedia: Bump, http://en.wikipedia.org/wiki/Bump_application (accessed June 6, 2013)

  7. Mayrhofer, R., Gellersen, H.: Spontaneous mobile device authentication based on sensor data. Information Security Technical Report 13(3) (2008)

    Google Scholar 

  8. Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing 8(6) (2009)

    Google Scholar 

  9. Tuyls, P., Skoric, B., Kevenaar, T.: Security with Noisy Data. Springer (2007)

    Google Scholar 

  10. Li, Q., Chang, E.-C.: Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 56–61. ACM (2006)

    Google Scholar 

  11. Miao, F., Jiang, L., Li, Y., Zhang, Y.-T.: Biometrics based novel key distribution solution for body sensor networks. In: IEEE Engineering in Medicine and Biology Society, pp. 2458–2461 (2009)

    Google Scholar 

  12. AlwaysLearn.com Website, A DFT and FFT TUTORIAL (2012), http://www.alwayslearn.com/DFT%20and%20FFT%20Tutorial/DFTandFFT_BasicIdea.html

  13. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: CCS 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999)

    Google Scholar 

  14. Clarke, C.K.P.: Reed Solomon Error Correction. BBC Research & Development (July 2002)

    Google Scholar 

  15. Federal Information Processing Standards Publication 197, Announcing the Advanced Encryption Standard (AES) (November 26, 2001)

    Google Scholar 

  16. Palshikar, G.K.: Simple Algorithms for Peak Detection in Time-Series (2009)

    Google Scholar 

  17. Gelfand, S., Levitt, H.: Hearing: An Introduction to Psychological and Physiological Acoustics. Marcel Dekker, New York (2004)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quan Quach .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Quach, Q., Nguyen, N., Dinh, T. (2014). Secure Authentication for Mobile Devices Based on Acoustic Background Fingerprint. In: Huynh, V., Denoeux, T., Tran, D., Le, A., Pham, S. (eds) Knowledge and Systems Engineering. Advances in Intelligent Systems and Computing, vol 244. Springer, Cham. https://doi.org/10.1007/978-3-319-02741-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02741-8_32

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02740-1

  • Online ISBN: 978-3-319-02741-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics