SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

SECURE COMMUNICATION BASED ON AMBIENT AUDIO
ABSTRACT:

We propose to establish a secure communication channel among devices based on similar audio
patterns. Features from ambient audio are used to generate a shared cryptographic key between
devices without exchanging information about the ambient audio itself or the features utilized for
the key generation process. We explore a common audio-fingerprinting approach and account for
the noise in the derived fingerprints by employing error correcting codes. This fuzzycryptography scheme enables the adaptation of a specific value for the tolerated noise among
fingerprints based on environmental conditions by altering the parameters of the error correction
and the length of the audio samples utilized.

In this paper, we experimentally verify the feasibility of the protocol in four different realistic
settings and a laboratory experiment. The case studies include an office setting, a scenario where
an attacker is capable of reproducing parts of the audio context, a setting near a traffic loaded
road, and a crowded canteen environment. We apply statistical tests to show that the entropy of
fingerprints based on ambient audio is high. The proposed scheme constitutes a totally
unobtrusive but cryptographically strong security mechanism based on contextual information.

More Related Content

Similar to Secure communication based on ambient audio

Secure communication based on ambient audio
Secure communication based on ambient audioSecure communication based on ambient audio
Secure communication based on ambient audio
Ecway Technologies
 
Java secure communication based on ambient audio
Java  secure communication based on ambient audioJava  secure communication based on ambient audio
Java secure communication based on ambient audio
ecwayerode
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
tsysglobalsolutions
 
logo ppt.pptx
logo ppt.pptxlogo ppt.pptx
logo ppt.pptx
PG212202048POLAVARAP
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
Ecwayt
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
Ecwaytechnoz
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
Ecwaytechnoz
 
Dotnet a data fusion technique for wireless ranging performance improvement
Dotnet  a data fusion technique for wireless ranging performance improvementDotnet  a data fusion technique for wireless ranging performance improvement
Dotnet a data fusion technique for wireless ranging performance improvement
Ecwaytech
 
Dotnet a data fusion technique for wireless ranging performance improvement
Dotnet  a data fusion technique for wireless ranging performance improvementDotnet  a data fusion technique for wireless ranging performance improvement
Dotnet a data fusion technique for wireless ranging performance improvement
Ecwayt
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
Ecwaytech
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
Ecway2004
 
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualismAutotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualism
IRJET Journal
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET Journal
 
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET-  	  Hearing Loss Detection through Audiogram in Mobile DevicesIRJET-  	  Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET Journal
 
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
IRJET Journal
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
IJERA Editor
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Ecwayt
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Ecwaytech
 
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...
ecwayprojects
 
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Ecwayt
 

Similar to Secure communication based on ambient audio (20)

Secure communication based on ambient audio
Secure communication based on ambient audioSecure communication based on ambient audio
Secure communication based on ambient audio
 
Java secure communication based on ambient audio
Java  secure communication based on ambient audioJava  secure communication based on ambient audio
Java secure communication based on ambient audio
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
 
logo ppt.pptx
logo ppt.pptxlogo ppt.pptx
logo ppt.pptx
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
 
Dotnet a data fusion technique for wireless ranging performance improvement
Dotnet  a data fusion technique for wireless ranging performance improvementDotnet  a data fusion technique for wireless ranging performance improvement
Dotnet a data fusion technique for wireless ranging performance improvement
 
Dotnet a data fusion technique for wireless ranging performance improvement
Dotnet  a data fusion technique for wireless ranging performance improvementDotnet  a data fusion technique for wireless ranging performance improvement
Dotnet a data fusion technique for wireless ranging performance improvement
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
 
A data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvementA data fusion technique for wireless ranging performance improvement
A data fusion technique for wireless ranging performance improvement
 
Autotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualismAutotuned voice cloning enabling multilingualism
Autotuned voice cloning enabling multilingualism
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
IRJET-  	  Hearing Loss Detection through Audiogram in Mobile DevicesIRJET-  	  Hearing Loss Detection through Audiogram in Mobile Devices
IRJET- Hearing Loss Detection through Audiogram in Mobile Devices
 
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
 
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...
 
Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...Delay optimal broadcast for multihop wireless networks using self-interferenc...
Delay optimal broadcast for multihop wireless networks using self-interferenc...
 

More from Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
Ecwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
Ecwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
Ecwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
Ecwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Ecwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
Ecwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
Ecwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
Ecwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
Ecwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
Ecwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
Ecwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
Ecwayt
 

More from Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Secure communication based on ambient audio

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com SECURE COMMUNICATION BASED ON AMBIENT AUDIO ABSTRACT: We propose to establish a secure communication channel among devices based on similar audio patterns. Features from ambient audio are used to generate a shared cryptographic key between devices without exchanging information about the ambient audio itself or the features utilized for the key generation process. We explore a common audio-fingerprinting approach and account for the noise in the derived fingerprints by employing error correcting codes. This fuzzycryptography scheme enables the adaptation of a specific value for the tolerated noise among fingerprints based on environmental conditions by altering the parameters of the error correction and the length of the audio samples utilized. In this paper, we experimentally verify the feasibility of the protocol in four different realistic settings and a laboratory experiment. The case studies include an office setting, a scenario where an attacker is capable of reproducing parts of the audio context, a setting near a traffic loaded road, and a crowded canteen environment. We apply statistical tests to show that the entropy of fingerprints based on ambient audio is high. The proposed scheme constitutes a totally unobtrusive but cryptographically strong security mechanism based on contextual information.