Abstract
Context-based authentication methods enable the unobtrusive establishment of authentication or even secure keys. While several context-based authentication methods have been proposed recently, often the entropy of the seed for the cryptographic keys is not exploited. We study the entropy of audio fingerprints which can be utilized to pair devices in close proximity. In this work, for 600 audio fingerprints from five distinct audio classes recorded at three different locations, we applied 7490 statistical tests from the dieHarder battery of statistical tests.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Mayrhofer, R., Gellersen, H.: Spontaneous mobile device authentication based on sensor data. Information Security Technical Report 13(3), 136–150 (2008)
Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing 8(6) (2009)
Mayrhofer, R.: The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 1–15. Springer, Heidelberg (2007)
Mayrhofer, R., Gellersen, H.: Shake well before use: Authentication based on accelerometer data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 144–161. Springer, Heidelberg (2007)
Bichler, D., Stromberg, G., Huemer, M., Loew, M.: Key generation based on acceleration data of shaking processes. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 304–317. Springer, Heidelberg (2007)
Wang, A.: An Industrial Strength Audio Search Algorithm. In: International Conference on Music Information Retrieval, ISMIR (2003)
Wang, A.: The Shazam music recognition service. Communications of the ACMÂ 49(8), 48 (2006)
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Sixth ACM Conference on Computer and Communications Security, pp. 28–36 (1999)
Reed, I., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 300–304 (1960)
Brown, R.G.: Dieharder: A random number test suite (2011), http://www.phy.duke.edu/~rgb/General/dieharder.php
Kuiper, N.: Tests concerning random points on a circle. In: Proceedings of the Koinklijke Nederlandse Akademie van Wetenschappen, vol. Series a 63, pp. 38–47 (1962)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sigg, S., Budde, M., Ji, Y., Beigl, M. (2011). Entropy of Audio Fingerprints for Unobtrusive Device Authentication. In: Beigl, M., Christiansen, H., Roth-Berghofer, T.R., Kofod-Petersen, A., Coventry, K.R., Schmidtke, H.R. (eds) Modeling and Using Context. CONTEXT 2011. Lecture Notes in Computer Science(), vol 6967. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24279-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-24279-3_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24278-6
Online ISBN: 978-3-642-24279-3
eBook Packages: Computer ScienceComputer Science (R0)