Skip to main content

Listen to the Music: Evaluating the Use of Music in Audio Based Authentication

  • Conference paper
  • First Online:
Ubiquitous Security (UbiSec 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1768))

Included in the following conference series:

  • 624 Accesses

Abstract

Audio based authentication has been proposed to be used as a second or third factor of authentication in Multi-Factor Authentication (MFA). Previous audio fingerprinting work has mostly used tonal frequencies which are not ideal in authentication as humans do not like sharp tonal frequencies as audio. This work investigates the usage of music as the audio for authentication instead of tonal frequencies. We also compare music with Dual Tone Multi Frequency (DTMF) audio. We present the results of our experimentation over source audio, feature extraction and performance under noise in this paper. The results of our experiments show that music in fact offers advantages such as better accuracy and better performance under noise in addition to sounding pleasant.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Freesound. https://freesound.org. Accessed 26 Dec 2020

  2. Amerini, I., Becarelli, R., Caldelli, R., Melani, A., Niccolai, M.: Smartphone fingerprinting combining features of on-board sensors. IEEE Trans. Inf. Forensics Secur. 12(10), 2457–2466 (2017)

    Article  Google Scholar 

  3. Amerini, I., Bestagini, P., Bondi, L., Caldelli, R., Casini, M., Tubaro, S.: Robust smartphone fingerprint by mixing device sensors features for mobile strong authentication. Electronic Imaging 2016(8), 1–8 (2016)

    Article  Google Scholar 

  4. Baldini, G., Steri, G.: A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components. IEEE Commun. Surv. Tutor. 19(3), 1761–1789 (2017)

    Article  Google Scholar 

  5. Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014)

  6. Cano, P., Batlle, E., Kalker, T., Haitsma, J.: A review of audio fingerprinting. J. VLSI Signal Process. Syst. Signal Image Video Technol. 41(3), 271–284 (2005)

    Article  Google Scholar 

  7. Das, A., Borisov, N., Caesar, M.: Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 441–452 (2014)

    Google Scholar 

  8. Dekker, M., Kumar, V.: Using audio characteristics for mobile device authentication, pp. 98–113 (2019). https://doi.org/10.1007/978-3-030-36938-56

  9. Dey, S., Roy, N., Xu, W., Choudhury, R.R., Nelakuditi, S.: Accelprint: imperfections of accelerometers make smartphones trackable. In: NDSS. Citeseer (2014)

    Google Scholar 

  10. Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)

    Article  Google Scholar 

  11. McFee, B., et al.: librosa/librosa: 0.8.0 (2020). https://doi.org/10.5281/zenodo.3955228

  12. Nair, A.S., Thampi, S.M.: PUFloc: PUF and location based hierarchical mutual authentication protocol for surveillance drone networks. In: Wang, G., Choo, K.K.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds.) UbiSec 2021, CCIS, vol. 1557, pp. 66–89. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0468-4_6

  13. Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)

    MathSciNet  MATH  Google Scholar 

  14. Rey, R.: Engineering and operations in the Bell system. AT &T Bell Laboratories (1983)

    Google Scholar 

  15. Sturm, B.L.: An analysis of the gtzan music genre dataset. In: Proceedings of the Second International ACM Workshop on Music Information Retrieval with User-Centered and Multimodal Strategies, pp. 7–12 (2012)

    Google Scholar 

  16. Thiemann, J., Ito, N., Vincent, E.: Demand: a collection of multi-channel recordings of acoustic noise in diverse environments. In: Proc. Meetings Acoust (2013)

    Google Scholar 

  17. Tsai, M.: Optimisation of audio-based sensor fingerprinting system for mobile device authentication. Master’s thesis, The University of Waikato (2021)

    Google Scholar 

  18. Tzanetakis, G., Essl, G., Cook, P.: Automatic musical genre classification of audio signals (2001). http://ismir2001.ismir.net/pdf/tzanetakis.pdf

  19. VanderPlas, J.: Python Data Science Handbook: Essential Tools for Working With Data. O’Reilly Media, Inc. (2016)

    Google Scholar 

  20. Zhou, Z., Diao, W., Liu, X., Zhang, K.: Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 429–440 (2014)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by Sir William Gallagher Cyber Security Scholarship at the University of Waikato.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vimal Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tsai, M., Kumar, V. (2023). Listen to the Music: Evaluating the Use of Music in Audio Based Authentication. In: Wang, G., Choo, KK.R., Wu, J., Damiani, E. (eds) Ubiquitous Security. UbiSec 2022. Communications in Computer and Information Science, vol 1768. Springer, Singapore. https://doi.org/10.1007/978-981-99-0272-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-0272-9_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-0271-2

  • Online ISBN: 978-981-99-0272-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics