Secure Authentication for Mobile Devices Based on Acoustic Background Fingerprint

  • Quan QuachEmail author
  • Ngu Nguyen
  • Tien Dinh
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 244)


In this paper, we propose a method to establish a secured authentication among the mobile devices based on the background audio. The devices will record synchronous ambient audio signals. Fingerprints from background is used to generated the shared cryptographic key between devices without sending the information from ambient audio itself. Noise in fingerprints will be detected and fixed by using Reed-Solomon error correcting code. In order to examine this approach, fuzzy commitment scheme is introduced to enable the adaption of the specific value of tolerated noise in fingerprint by altering internal parameters of error correction. Besides, we introduce the method of background classification to alter the threshold of error correction automatically. Furthermore, the silent background issue is also solved thoroughly by several approaches. The system is build and tested on iOS and indoor environment.


Mobile Device Medium Access Control Receive Signal Strength Indicator Advanced Encryption Standard Medium Access Control Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Haitsma, J., Kalker, T.: A Highly robust audio fingerprint system (2002)Google Scholar
  2. 2.
    Wan, W., Yu, X., Yang, W., Deng, J.: Audio fingerprints based on spectral energy structure and NMF. In: Communication Technology (ICCT), pp. 1103–1106 (September 2011)Google Scholar
  3. 3.
    Blum, T., Keislar, D., Wheaton, J., Wold, E.: Content-Based Classification, Search, and Retrieval of Audio. IEEE Multimedia 3, 27–36 (1996)CrossRefGoogle Scholar
  4. 4.
    Schrmann, D., Sigg, S.: Secure communication based on ambient audio (February 2013)Google Scholar
  5. 5.
    Dinda, P., Dick, R., Memik, G., Tarzia, S.: Indoor localization withouth infrastructure using the Acoustic Background Spectrum. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, pp. 155–168 (2011)Google Scholar
  6. 6.
    Wikipedia: Bump, (accessed June 6, 2013)
  7. 7.
    Mayrhofer, R., Gellersen, H.: Spontaneous mobile device authentication based on sensor data. Information Security Technical Report 13(3) (2008)Google Scholar
  8. 8.
    Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing 8(6) (2009)Google Scholar
  9. 9.
    Tuyls, P., Skoric, B., Kevenaar, T.: Security with Noisy Data. Springer (2007)Google Scholar
  10. 10.
    Li, Q., Chang, E.-C.: Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 56–61. ACM (2006)Google Scholar
  11. 11.
    Miao, F., Jiang, L., Li, Y., Zhang, Y.-T.: Biometrics based novel key distribution solution for body sensor networks. In: IEEE Engineering in Medicine and Biology Society, pp. 2458–2461 (2009)Google Scholar
  12. 12. Website, A DFT and FFT TUTORIAL (2012),
  13. 13.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: CCS 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999)Google Scholar
  14. 14.
    Clarke, C.K.P.: Reed Solomon Error Correction. BBC Research & Development (July 2002)Google Scholar
  15. 15.
    Federal Information Processing Standards Publication 197, Announcing the Advanced Encryption Standard (AES) (November 26, 2001)Google Scholar
  16. 16.
    Palshikar, G.K.: Simple Algorithms for Peak Detection in Time-Series (2009)Google Scholar
  17. 17.
    Gelfand, S., Levitt, H.: Hearing: An Introduction to Psychological and Physiological Acoustics. Marcel Dekker, New York (2004)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Advanced Program in Computer Science, Faculty of Information TechnologyVNU - University of ScienceHo Chi Minh CityVietnam

Personalised recommendations