SlideShare a Scribd company logo
1 of 1
Download to read offline
SECURE COMMUNICATION BASED ON AMBIENT AUDIO
ABSTRACT:
We propose to establish a secure communication channel among devices based on similar audio
patterns. Features from ambient audio are used to generate a shared cryptographic key between
devices without exchanging information about the ambient audio itself or the features utilized for
the key generation process. We explore a common audio-fingerprinting approach and account for
the noise in the derived fingerprints by employing error correcting codes. This fuzzy-
cryptography scheme enables the adaptation of a specific value for the tolerated noise among
fingerprints based on environmental conditions by altering the parameters of the error correction
and the length of the audio samples utilized.
In this paper, we experimentally verify the feasibility of the protocol in four different realistic
settings and a laboratory experiment. The case studies include an office setting, a scenario where
an attacker is capable of reproducing parts of the audio context, a setting near a traffic loaded
road, and a crowded canteen environment. We apply statistical tests to show that the entropy of
fingerprints based on ambient audio is high. The proposed scheme constitutes a totally
unobtrusive but cryptographically strong security mechanism based on contextual information.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

More Related Content

Viewers also liked (8)

Tian Tan`s CV
Tian Tan`s CVTian Tan`s CV
Tian Tan`s CV
 
Hoja de vida
Hoja de vidaHoja de vida
Hoja de vida
 
Adéntrate en la Química de MasterChef
Adéntrate en la Química de MasterChefAdéntrate en la Química de MasterChef
Adéntrate en la Química de MasterChef
 
Hoja de vida
Hoja de vidaHoja de vida
Hoja de vida
 
Prueba
PruebaPrueba
Prueba
 
EBOLC Diploma
EBOLC DiplomaEBOLC Diploma
EBOLC Diploma
 
my CV
my CVmy CV
my CV
 
Scan 9
Scan 9Scan 9
Scan 9
 

Similar to Secure communication based on ambient audio

Secure communication based on ambient audio
Secure communication based on ambient audioSecure communication based on ambient audio
Secure communication based on ambient audio
Ecwayt
 
Dotnet secure communication based on ambient audio
Dotnet  secure communication based on ambient audioDotnet  secure communication based on ambient audio
Dotnet secure communication based on ambient audio
Ecwaytech
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
CSCJournals
 

Similar to Secure communication based on ambient audio (20)

Secure communication based on ambient audio
Secure communication based on ambient audioSecure communication based on ambient audio
Secure communication based on ambient audio
 
Dotnet secure communication based on ambient audio
Dotnet  secure communication based on ambient audioDotnet  secure communication based on ambient audio
Dotnet secure communication based on ambient audio
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
 
logo ppt.pptx
logo ppt.pptxlogo ppt.pptx
logo ppt.pptx
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
Smart Sound Measurement and Control System for Smart City
Smart Sound Measurement and Control System for Smart CitySmart Sound Measurement and Control System for Smart City
Smart Sound Measurement and Control System for Smart City
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
H42045359
H42045359H42045359
H42045359
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
 
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETSSECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
Utterance based speaker identification
Utterance based speaker identificationUtterance based speaker identification
Utterance based speaker identification
 
Audio Features Based Steganography Detection in WAV File
Audio Features Based Steganography Detection in WAV FileAudio Features Based Steganography Detection in WAV File
Audio Features Based Steganography Detection in WAV File
 
A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projects
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 Projects
 

Secure communication based on ambient audio

  • 1. SECURE COMMUNICATION BASED ON AMBIENT AUDIO ABSTRACT: We propose to establish a secure communication channel among devices based on similar audio patterns. Features from ambient audio are used to generate a shared cryptographic key between devices without exchanging information about the ambient audio itself or the features utilized for the key generation process. We explore a common audio-fingerprinting approach and account for the noise in the derived fingerprints by employing error correcting codes. This fuzzy- cryptography scheme enables the adaptation of a specific value for the tolerated noise among fingerprints based on environmental conditions by altering the parameters of the error correction and the length of the audio samples utilized. In this paper, we experimentally verify the feasibility of the protocol in four different realistic settings and a laboratory experiment. The case studies include an office setting, a scenario where an attacker is capable of reproducing parts of the audio context, a setting near a traffic loaded road, and a crowded canteen environment. We apply statistical tests to show that the entropy of fingerprints based on ambient audio is high. The proposed scheme constitutes a totally unobtrusive but cryptographically strong security mechanism based on contextual information. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com