Abstract
Audio based authentication has been proposed to be used as a second or third factor of authentication in Multi-Factor Authentication (MFA). Previous audio fingerprinting work has mostly used tonal frequencies which are not ideal in authentication as humans do not like sharp tonal frequencies as audio. This work investigates the usage of music as the audio for authentication instead of tonal frequencies. We also compare music with Dual Tone Multi Frequency (DTMF) audio. We present the results of our experimentation over source audio, feature extraction and performance under noise in this paper. The results of our experiments show that music in fact offers advantages such as better accuracy and better performance under noise in addition to sounding pleasant.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Freesound. https://freesound.org. Accessed 26 Dec 2020
Amerini, I., Becarelli, R., Caldelli, R., Melani, A., Niccolai, M.: Smartphone fingerprinting combining features of on-board sensors. IEEE Trans. Inf. Forensics Secur. 12(10), 2457–2466 (2017)
Amerini, I., Bestagini, P., Bondi, L., Caldelli, R., Casini, M., Tubaro, S.: Robust smartphone fingerprint by mixing device sensors features for mobile strong authentication. Electronic Imaging 2016(8), 1–8 (2016)
Baldini, G., Steri, G.: A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components. IEEE Commun. Surv. Tutor. 19(3), 1761–1789 (2017)
Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014)
Cano, P., Batlle, E., Kalker, T., Haitsma, J.: A review of audio fingerprinting. J. VLSI Signal Process. Syst. Signal Image Video Technol. 41(3), 271–284 (2005)
Das, A., Borisov, N., Caesar, M.: Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 441–452 (2014)
Dekker, M., Kumar, V.: Using audio characteristics for mobile device authentication, pp. 98–113 (2019). https://doi.org/10.1007/978-3-030-36938-56
Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: Accelprint: imperfections of accelerometers make smartphones trackable. In: NDSS. Citeseer (2014)
Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)
McFee, B., et al.: librosa/librosa: 0.8.0 (2020). https://doi.org/10.5281/zenodo.3955228
Nair, A.S., Thampi, S.M.: PUFloc: PUF and location based hierarchical mutual authentication protocol for surveillance drone networks. In: Wang, G., Choo, K.K.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds.) UbiSec 2021, CCIS, vol. 1557, pp. 66–89. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0468-4_6
Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
Rey, R.: Engineering and operations in the Bell system. AT &T Bell Laboratories (1983)
Sturm, B.L.: An analysis of the gtzan music genre dataset. In: Proceedings of the Second International ACM Workshop on Music Information Retrieval with User-Centered and Multimodal Strategies, pp. 7–12 (2012)
Thiemann, J., Ito, N., Vincent, E.: Demand: a collection of multi-channel recordings of acoustic noise in diverse environments. In: Proc. Meetings Acoust (2013)
Tsai, M.: Optimisation of audio-based sensor fingerprinting system for mobile device authentication. Master’s thesis, The University of Waikato (2021)
Tzanetakis, G., Essl, G., Cook, P.: Automatic musical genre classification of audio signals (2001). http://ismir2001.ismir.net/pdf/tzanetakis.pdf
VanderPlas, J.: Python Data Science Handbook: Essential Tools for Working With Data. O’Reilly Media, Inc. (2016)
Zhou, Z., Diao, W., Liu, X., Zhang, K.: Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 429–440 (2014)
Acknowledgments
This work was supported in part by Sir William Gallagher Cyber Security Scholarship at the University of Waikato.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tsai, M., Kumar, V. (2023). Listen to the Music: Evaluating the Use of Music in Audio Based Authentication. In: Wang, G., Choo, KK.R., Wu, J., Damiani, E. (eds) Ubiquitous Security. UbiSec 2022. Communications in Computer and Information Science, vol 1768. Springer, Singapore. https://doi.org/10.1007/978-981-99-0272-9_2
Download citation
DOI: https://doi.org/10.1007/978-981-99-0272-9_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0271-2
Online ISBN: 978-981-99-0272-9
eBook Packages: Computer ScienceComputer Science (R0)