Abstract
In this paper, we propose a method to establish a secured authentication among the mobile devices based on the background audio. The devices will record synchronous ambient audio signals. Fingerprints from background is used to generated the shared cryptographic key between devices without sending the information from ambient audio itself. Noise in fingerprints will be detected and fixed by using Reed-Solomon error correcting code. In order to examine this approach, fuzzy commitment scheme is introduced to enable the adaption of the specific value of tolerated noise in fingerprint by altering internal parameters of error correction. Besides, we introduce the method of background classification to alter the threshold of error correction automatically. Furthermore, the silent background issue is also solved thoroughly by several approaches. The system is build and tested on iOS and indoor environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Haitsma, J., Kalker, T.: A Highly robust audio fingerprint system (2002)
Wan, W., Yu, X., Yang, W., Deng, J.: Audio fingerprints based on spectral energy structure and NMF. In: Communication Technology (ICCT), pp. 1103–1106 (September 2011)
Blum, T., Keislar, D., Wheaton, J., Wold, E.: Content-Based Classification, Search, and Retrieval of Audio. IEEE Multimedia 3, 27–36 (1996)
Schrmann, D., Sigg, S.: Secure communication based on ambient audio (February 2013)
Dinda, P., Dick, R., Memik, G., Tarzia, S.: Indoor localization withouth infrastructure using the Acoustic Background Spectrum. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys 2011, pp. 155–168 (2011)
Wikipedia: Bump, http://en.wikipedia.org/wiki/Bump_application (accessed June 6, 2013)
Mayrhofer, R., Gellersen, H.: Spontaneous mobile device authentication based on sensor data. Information Security Technical Report 13(3) (2008)
Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing 8(6) (2009)
Tuyls, P., Skoric, B., Kevenaar, T.: Security with Noisy Data. Springer (2007)
Li, Q., Chang, E.-C.: Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 56–61. ACM (2006)
Miao, F., Jiang, L., Li, Y., Zhang, Y.-T.: Biometrics based novel key distribution solution for body sensor networks. In: IEEE Engineering in Medicine and Biology Society, pp. 2458–2461 (2009)
AlwaysLearn.com Website, A DFT and FFT TUTORIAL (2012), http://www.alwayslearn.com/DFT%20and%20FFT%20Tutorial/DFTandFFT_BasicIdea.html
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: CCS 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36 (1999)
Clarke, C.K.P.: Reed Solomon Error Correction. BBC Research & Development (July 2002)
Federal Information Processing Standards Publication 197, Announcing the Advanced Encryption Standard (AES) (November 26, 2001)
Palshikar, G.K.: Simple Algorithms for Peak Detection in Time-Series (2009)
Gelfand, S., Levitt, H.: Hearing: An Introduction to Psychological and Physiological Acoustics. Marcel Dekker, New York (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Quach, Q., Nguyen, N., Dinh, T. (2014). Secure Authentication for Mobile Devices Based on Acoustic Background Fingerprint. In: Huynh, V., Denoeux, T., Tran, D., Le, A., Pham, S. (eds) Knowledge and Systems Engineering. Advances in Intelligent Systems and Computing, vol 244. Springer, Cham. https://doi.org/10.1007/978-3-319-02741-8_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-02741-8_32
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-02740-1
Online ISBN: 978-3-319-02741-8
eBook Packages: EngineeringEngineering (R0)