Skip to main content

Entropy of Audio Fingerprints for Unobtrusive Device Authentication

  • Conference paper
Modeling and Using Context (CONTEXT 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6967))

Abstract

Context-based authentication methods enable the unobtrusive establishment of authentication or even secure keys. While several context-based authentication methods have been proposed recently, often the entropy of the seed for the cryptographic keys is not exploited. We study the entropy of audio fingerprints which can be utilized to pair devices in close proximity. In this work, for 600 audio fingerprints from five distinct audio classes recorded at three different locations, we applied 7490 statistical tests from the dieHarder battery of statistical tests.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mayrhofer, R., Gellersen, H.: Spontaneous mobile device authentication based on sensor data. Information Security Technical Report 13(3), 136–150 (2008)

    Article  Google Scholar 

  2. Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing 8(6) (2009)

    Google Scholar 

  3. Mayrhofer, R.: The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 1–15. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Mayrhofer, R., Gellersen, H.: Shake well before use: Authentication based on accelerometer data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 144–161. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Bichler, D., Stromberg, G., Huemer, M., Loew, M.: Key generation based on acceleration data of shaking processes. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 304–317. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Wang, A.: An Industrial Strength Audio Search Algorithm. In: International Conference on Music Information Retrieval, ISMIR (2003)

    Google Scholar 

  7. Wang, A.: The Shazam music recognition service. Communications of the ACM 49(8), 48 (2006)

    Article  Google Scholar 

  8. Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Sixth ACM Conference on Computer and Communications Security, pp. 28–36 (1999)

    Google Scholar 

  9. Reed, I., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 300–304 (1960)

    Google Scholar 

  10. Brown, R.G.: Dieharder: A random number test suite (2011), http://www.phy.duke.edu/~rgb/General/dieharder.php

  11. Kuiper, N.: Tests concerning random points on a circle. In: Proceedings of the Koinklijke Nederlandse Akademie van Wetenschappen, vol. Series a 63, pp. 38–47 (1962)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sigg, S., Budde, M., Ji, Y., Beigl, M. (2011). Entropy of Audio Fingerprints for Unobtrusive Device Authentication. In: Beigl, M., Christiansen, H., Roth-Berghofer, T.R., Kofod-Petersen, A., Coventry, K.R., Schmidtke, H.R. (eds) Modeling and Using Context. CONTEXT 2011. Lecture Notes in Computer Science(), vol 6967. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24279-3_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24279-3_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24278-6

  • Online ISBN: 978-3-642-24279-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics