The Community for Technology Leaders
RSS Icon
Issue No.02 - Feb. (2013 vol.12)
pp: 358-370
Dominik Schürmann , Tech. Univ. Braunschweig, Braunschweig, Germany
S. Sigg , Inf. Syst. Archit. Sci. Res. Div., Nat. Inst. of Inf. (NII), Tokyo, Japan
We propose to establish a secure communication channel among devices based on similar audio patterns. Features from ambient audio are used to generate a shared cryptographic key between devices without exchanging information about the ambient audio itself or the features utilized for the key generation process. We explore a common audio-fingerprinting approach and account for the noise in the derived fingerprints by employing error correcting codes. This fuzzy-cryptography scheme enables the adaptation of a specific value for the tolerated noise among fingerprints based on environmental conditions by altering the parameters of the error correction and the length of the audio samples utilized. In this paper, we experimentally verify the feasibility of the protocol in four different realistic settings and a laboratory experiment. The case studies include an office setting, a scenario where an attacker is capable of reproducing parts of the audio context, a setting near a traffic loaded road, and a crowded canteen environment. We apply statistical tests to show that the entropy of fingerprints based on ambient audio is high. The proposed scheme constitutes a totally unobtrusive but cryptographically strong security mechanism based on contextual information.
fuzzy set theory, audio coding, cryptographic protocols, error correction codes, cryptographic protocol, ambient audio, secure communication channel, shared cryptographic key, key generation process, audio-fingerprinting approach, error correcting codes, fuzzy-cryptography scheme, entropy, cryptographically strong security mechanism, Context, Noise, Protocols, Synchronization, Error correction codes, Authentication, location-dependent and sensitive, Pervasive computing, data encryption, random number generation, signal analysis, synthesis, and processing, signal processing
Dominik Schürmann, S. Sigg, "Secure Communication Based on Ambient Audio", IEEE Transactions on Mobile Computing, vol.12, no. 2, pp. 358-370, Feb. 2013, doi:10.1109/TMC.2011.271
[1] C. Dupuy and A. Torre, Local Clusters, Trust, Confidence and Proximity, Series Clusters and Globalisation: The Development of Urban and Regional Eco nomies, pp. 175-195, Edward Elgar, 2006.
[2] R. Mayrhofer and H. Gellersen, "Spontaneous Mobile Device Authentication Based on Sensor Data," Information Security Technical Report, vol. 13, no. 3, pp. 136-150, 2008.
[3] D. Bichler, G. Stromberg, M. Huemer, and M. Loew, "Key Generation Based on Acceleration Data of Shaking Processes," Proc. Ninth Int'l Conf. Ubiquitous Computing, J. Krumm, ed., 2007.
[4] L.E. Holmquist, F. Mattern, B. Schiele, P. Schiele, P. Alahuhta, M. Beigl, and H.W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections Between Smart Artefacts," Proc. Third Int'l Conf. Ubiquitous Computing, 2001.
[5] A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara, "Amigo: Proximity-Based Authentication of Mobile Devices," Int'l J. Security and Networks, vol. 4, pp. 4-16, 2009.
[6] H.-W. Gellersen, G. Kortuem, A. Schmidt, and M. Beigl, "Physical Prototyping with Smart-Its," IEEE Pervasive Computing, vol. 4, pp. 10-18, 2004.
[7] R. Mayrhofer and H. Gellersen, "Shake Well Before Use: Authentication Based on Accelerometer Data," Proc. Fifth Int'l Conf. Pervasive Computing, pp. 144-161, 2007.
[8] R. Mayrhofer, "The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams," Proc. Fourth European Conf. Security and Privacy in Ad-Hoc and Sensor Networks, pp. 1-15, 2007.
[9] D. Bichler, G. Stromberg, and M. Huemer, "Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks," Proc. IEEE GlobeCom, 2007.
[10] J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management," IEEE Trans. Comm., vol. 43, no. 1, pp. 3-6, Jan. 1995.
[11] G. Smith, "A Direct Derivation of a Single-Antenna Reciprocity Relation for the Time Domain," IEEE Trans. Antennas and Propagation, vol. 52, no. 6, pp. 1568-1577, June 2004.
[12] M.G. Madiseh, M.L. McGuire, S.S. Neville, L. Cai, and M. Horie, "Secret key Generation and Agreement in Uwb Communication Channels," Proc. IEEE GlobeCom, 2008.
[13] S.T.B. Hamida, J.-B. Pierrot, and C. Castelluccia, "An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements," Proc. Third Int'l Conf. New Technologies, Mobility and Security, 2009.
[14] K. Kunze and P. Lukowicz, "Symbolic Object Localization Through Active Sampling of Acceleration and Sound signatures," Proc.Ninth Int'l Conf. Ubiquitous Computing, 2007.
[15] P. Tuyls, B. Skoric, and T. Kevenaar, Security with Noisy Data. Springer-Verlag, 2007.
[16] Q. Li and E.-C. Chang, "Robust, Short and Sensitive Authentication Tags Using Secure Sketch," Proc. Eighth Workshop Multimedia and Security, pp. 56-61, 2006.
[17] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Proc. Int'l Conf. the Theory and Applications of Cryptographic Techniques (EUROCRYPT '04), pp. 79-100, 2004.
[18] F. Miao, L. Jiang, Y. Li, and Y.-T. Zhang, "Biometrics Based Novel Key Distribution Solution for Body Sensor Networks," Proc. IEEE Ann. Int'l Conf. Eng. in Medicine and Biology Soc. (EMBC '09), pp. 2458-2461, 2009.
[19] A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Proc. IEEE Int'l Symp. Information Theory, p. 408, 2002.
[20] Y. Dodis, J. Katz, L. Reyzin, and A. Smith, "Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets," Proc. 26th Ann. Int'l Conf. Advances in Cryptology (CRYPTO '06), pp. 232-250, 2006.
[21] P. Cano, E. Batlle, T. Kalker, and J. Haitsma, "A Review of Algorithms for Audio Fingerprinting," The J. VLSI Signal Processing, vol. 41, no. 3, pp. 271-284, 2005.
[22] S. Baluja and M. Covell, "Waveprint: Efficient Wavelet-Based Audio Fingerprinting," Pattern Recognition, vol. 41, no. 11, pp. 3467-3480, 2008.
[23] L. Ghouti and A. Bouridane, "A Robust Perceptual Audio Hashing Using Balanced Multiwavelets," Proc. IEEE Fifth Int'l Conf. Acoustics, Speech, and Signal Processing, 2006.
[24] S. Sukittanon and L. Atlas, "Modulation Frequency Features for Audio Fingerprinting," Proc. IEEE Second Int'l Conf. Acoustics, Speech, and Signal Processing, 2002.
[25] J. Haitsma and T. Kalker, "A Highly Robust Audio Fingerprinting System," Proc. Third Int'l Conf. Music Information Retrieval, Oct. 2002.
[26] C. Burges, D. Plastina, J. Platt, E. Renshaw, and H. Malvar, "Using Audio Fingerprinting for Duplicate Detection and Thumbnail Generation," Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal Processing (ICASSP '05), vol. 3, pp. iii/9-iii12, Mar. 2005.
[27] C. Bellettini and G. Mazzini, "A Framework for Robust Audio Fingerprinting," J. Comm., vol. 5, no. 5, pp. 409-424, 2010.
[28] A. Ghias, J. Logan, D. Chamberlin, and B.C. Smith, "Query by Humming," Proc. ACM Multimedia, 1995.
[29] D. Parsons, The Directory of Tunes and Musical Themes. Cambridge Univ., 1975.
[30] R.A. Baeza-Yates and C.H. Perleberg, "Fast and Practical Approximate String Matching," Proc. Third Ann. Symp. Combinatorial Pattern Matching, 1992.
[31] R.J. McNab, L.A. Smith, I.H. Witten, C.L. Henderson, and S.J. Cunningham, "Towards the Digital Music Library: Tune Retrieval from Acoustic Iinput," Proc. ACM Int'l Conf. Digital Libraries, 1996.
[32] L. Prechelt and R. Typke, "An Interface for Melody Input," ACM Trans. Computer Human Interactions, vol. 8, pp. 133-149, 2001.
[33] W. Chai and B. Vercoe, "Melody Retrieval on the Web," Proc. ACM/SPIE Conf. Multimedia Computing and Networking, 2002.
[34] L. Shifrin, B. Pardo, and W. Birmingham, "HMM-Based Musical Query Retrieval," Proc. Joint Conf. Digital Libraries, 2002.
[35] L. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
[36] Y. Zhu and D. Shasha, "Warping Indexes with Envelope Transforms for Query by Humming," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2003.
[37] J. Haitsma and T. Kalker, "Robust Audio Hashing for Content Identification," Proc. Int'l Workshop Content-Based Multimedia Indexing (CBMI), 2001.
[38] J. Lebossé, L. Brun, and J.-C. Pailles, "A Robust Audio Fingerprint's Based Identification Method," Proc. Third Iberian Conf. Pattern Recognition and Image Analysis, Part I (IbPRIA '07), pp. 185-192, 2007.
[39] C. Burges, J. Platt, and S. Jana, "Distortion Discriminant Analysis for Audio Fingerprinting," IEEE Trans. Speech and Audio Processing, vol. 11, no. 3, pp. 165-174, May 2003.
[40] J. Herre, E. Allamanche, and O. Hellmuth, "Robust Matching of Audio Signals Using Spectral Flatness Features," Proc. IEEE Workshop Applications of Signal Processing to Audio and Acoustics, pp. 127-130, 2001.
[41] C. Yang, "MACS: Music Audio Characteristic Sequence Indexing for Similarity Retrieval," Proc. IEEE Workshop Applications of Signal Processing to Audio and Acoustics, pp. 123-126, 2001.
[42] C. Yang, "Efficient Acoustic Index for Music Retrieval with Various Degrees of Similarity," Proc. 10th ACM Int'l Conf. Multimedia (MULTIMEDIA '02), pp. 584-591, 10.1145641007.641125 , 2002.
[43] A. Wang, "The Shazam Music Recognition Service," Comm. ACM, vol. 49, no. 8, pp. 44-48, 2006.
[44] A. Wang, "An Industrial Strength Audio Search Algorithm," Proc. Int'l Conf. Music Information Retrieval (ISMIR), 2003.
[45] F. Hao, "On Using Fuzzy Data in Security Mechanisms," PhD dissertation, Queens College, Cambridge, Apr. 2007.
[46] A.C. Ibarrola and E. Chavez, "A Robust Entropy-Based Audio-Fingerprint," Proc. Int'l Conf. Multimedia and Expo (ICME '06), 2006.
[47] B. Schneider, Applied Cryptography: Protocols, Algorithms, and Source Code in C, second ed. John Wiley and Sons, 1996.
[48] I. Reed and G. Solomon, "Polynomial Codes over Certain Finite Fields," J. Soc. for Industrial and Applied Math., vol. 8, pp. 300-304, 1960.
[49] A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proc. Sixth ACM Conf. Computer and Comm. Security, pp. 28-36, 1999.
[50] Secure Hash Standard (SHS), FIPS PUB 180-4, National Institute of Standards and Tech nology, Oct. 2008.
[51] Advanced Encryption Standard (AES), FIPS PUBS 197, National Institute of Standards and Tech nology, 2001.
[52] D. Mills, J. Martin, J. Burbank, and W. Kasch, "Network Time Protocol Version 4: Protocol and Algorithms Specification," IETF RFC 5905,, June 2010.
[53] D.L. Mills, "Improved Algorithms for Synchronising Computer Network Clocks," IEEE/ACM Trans. Networking, vol. 3, no. 3, pp. 245-254, June 1995.
[54] S. Meier, H. Weibel, and K. Weber, "IEEE 1588 Syntonization and Synchronization Functions Completely Realized in Hardware," Proc. IEEE Symp. Int'l Precision Clock Synchronization for Measurement, Control and Comm. (ISPCS '08), 2008.
[55] D.L. Mills, "Precision Synchronisation of Computer Network Clocks," ACM Computer Comm. Rev., vol. 24, no. 2, pp. 28-43, Apr. 1994.
[56] "GStreamer Documentation," http://gstreamer.freedesktop.orgdocumentation , Oct. 2010.
[57] W.J. Scheirer and T.E. Boult, "Cracking Fuzzy Vaults and Biometric Encryption," Proc. Biometrics Symp., 2007.
[58] T. Ignatenko and F.M.J. Willems, "Information Leakage in Fuzzy Commitment Schemes," IEEE Trans. Information Forensics and Security, vol. 5, no. 2, pp. 337-348, June 2010.
[59] K. Fenzi and D. Wreski, "Linux Security HOWTO," other-formats/pdfSecurity-HOWTO.pdf , Jan. 2004.
[60] R.G. Brown, "Dieharder: A Random Number Test Suite," , 2011.
[61] N. Kuiper, "Tests Concerning Random Points on a Circle," Proc. Koinklijke Nederlandse Akademie van Wetenschappen, vol. 63, pp. 38-47, 1962.
[62] M. Stephens, "The Goodness-of-Fit Statistic $v\_n$ : Distribution and Significance Points," Biometrika, vol. 52, pp. 309-321, 1965.
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool