Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound (original) (raw)
Related papers
This paper details the research into using audio signal processing methods to provide authentication and identification services for the purpose of enhancing cyber security in voice applications. Audio is a growing domain for cyber security technology. It is envisaged that over the next decade, the primary interface for issuing commands to consumer internet-enabled devices will be voice. Increasingly, devices such as desktop computers, smart speakers, cars, TV's, phones and Internet of Things (IOT) devices all have built in voice assistants and voice activated features. This research outlines an approach to securely identify and authenticate users of audio and voice operated systems that utilises audio steganography in a method comparable to a PKI for sound and existing cryptography methods whilst retaining the usability associated with audio and voice driven systems.
Securing Voice Communications Using Audio Steganography
International Journal of Computer Network and Information Security(IJCNIS), 2022
Although authentication of users of digital voice-based systems has been addressed by much research and many commercially available products, there are very few that perform well in terms of both usability and security in the audio domain. In addition, the use of voice biometrics has been shown to have limitations and relatively poor performance when compared to other authentication methods. We propose using audio steganography as a method of placing authentication key material into sound, such that an authentication factor can be achieved within an audio channel to supplement other methods, thus providing a multi factor authentication opportunity that retains the usability associated with voice channels. In this research we outline the challenges and threats to audio and voice-based systems in the form of an original threat model focusing on audio and voice-based systems, we outline a novel architectural model that utilises audio steganography to mitigate the threats in various authentication scenarios and finally, we conduct experimentation into hiding authentication materials into an audible sound. The experimentation focused on creating and testing a new steganographic technique which is robust to noise, resilient to steganalysis and has sufficient capacity to hold cryptographic material such as a 2048 bit RSA key in a short audio music clip of just a few seconds achieving a signal to noise ratio of over 70 dB in some scenarios. The method developed was seen to be very robust using digital transmission which has applications beyond this research. With acoustic transmission, despite the progress demonstrated in this research some challenges remain to ensure the approach achieves its full potential in noisy real-world applications and therefore the future research direction required is outlined and discussed.
Cryptographic Approach Using Audio for Data Security
Citation/Export MLA Anuja Phapale, “Cryptographic Approach Using Audio for Data Security”, February 15 Volume 3 Issue 2 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 825 - 827, DOI: 10.17762/ijritcc2321-8169.150285 APA Anuja Phapale, February 15 Volume 3 Issue 2, “Cryptographic Approach Using Audio for Data Security”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 825 - 827, DOI: 10.17762/ijritcc2321-8169.150285
Your Password Is Music To My Ears: Cloud Based Authentication Using Sound
CONFLUENCE2021, 2021
This paper details the research in progress into identifying and addressing the threats faced by voice assistants and audio based digital systems. The popularity of these systems continues to grow as does the number of applications and scenarios they are used in. Smart speakers, smart home devices, mobile phones, telephone banking and even vehicle controls all benefit from being able to be controlled to some extend by voice without diverting the attention of the user to a screen or having to use an input device such as a screen or keyboard. Whilst this removes barriers to use for those with accessibility challenges like visual impairment or motor skills issues and opens up a much more convenient user experience, a number of cyber security threats remain unanswered. This paper details a threat modelling exercise and suggests a model to address the key threats whilst retaining the usability associated with voice driven systems, by using an additional sound based authentication factor.
An Efficient Sound and Data Steganography Based Secure Authentication System
Computers, Materials & Continua
The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins' manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into a wave file, after which it gets transmitted in a short burst via the device's speakers. Subsequently, the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing. Besides, this model requires two devices/gadgets with speakers and a microphone, and no extra hardware such as a camera, for reading the QR code is required. The first module is tested with realtime data and generates high scores for the widely accepted accuracy metrics, including precision, Recall, F1 score, entropy, and mutual information (MI). Additionally, this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files. This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file. Several encryption algorithms and their combinations are taken for this system to compare the This work is licensed under a Creative Commons Attribution 4.
PREVENTING UNAUTHORIZED ACCESS TO SPECIAL APPLICATIONS USING SIGNED AUDIO
IAEME PUBLICATION, 2019
Due to the massive use of multimedia in communications and accessing businesses and banks accounts, authorization has become a necessity. Media like image, audio and video have been used frequently in secure and confidential access to accounts and special business pages. Voices are used as a signature to identify individuals to get permission to special processes. In this paper an authorization method is proposed to sign the voices used for accessing special applications by encrypting, compressing and hiding confidential data within the individuals’ voices in selected locations. The proposed method has large SNR and PSNR while it has very small BER and MSR.
A Survey Paper on Audio Security
2018
The quick advancement in mixed media and web considers wide circulation of computerized media information. It is very easier to edit, duplicate digital information. Other than that, advanced media is additionally simple to duplicate and disperse, in this way it has confronted numerous dangers. It is a big security and privacy issue; it has become necessary to find appropriate security solutions because of the sensitivity of the information. Steganography and cryptography are considered as one of the methods which are utilized to secure the imperative data, yet the two strategies have their focal points and burdens. Security of audio files in terms of digital music for its distribution over the network is a major issue that risks the revenue of various music artists. However, it poses risks to end users unless the audio is encrypted for security. With the end goal to maintain a strategic distance from unapproved access to sound documents, specific encryption method is connected to in...
IJERT-SECURE COMMUNICATION THROUGH AUDIO SIGNALS
International Journal of Engineering Research and Technology (IJERT), 2012
https://www.ijert.org/secure-communication-through-audio-signals https://www.ijert.org/research/secure-communication-through-audio-signals-IJERTV1IS8454.pdf The issue of network security of information has gained special significances with the development of computer and the expansion of its use in different areas of life and work. Today's large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation. Steganography is an attractive solution to this problem. In steganography prevents an unintended recipient from suspecting that the data exists. It adds another layer of security since it is much more difficult to decrypt a message if it is not known that there is a message. This paper proposes the basic idea of hiding information (audio, image or text) in cover audio signal. This method is characterized by perfect transparency, robustness, high bit rate, low processing load and high security.
Loud and clear: Human-verifiable authentication based on audio
2006
Secure pairing of electronic devices that lack any previous association is a challenging problem which has been considered in many contexts and in various flavors. In this paper, we investigate the use of the audio channel for human-assisted authentication of previously un-associated devices. We develop and evaluate a system we call Loud-and-Clear (L&C) which places very little demand on the human user. L&C involves the use of a text-to-speech (TTS) engine for vocalizing a robust-sounding and syntactically-correct (English-like) sentence derived from the hash of a device's public key. By coupling vocalization on one device with the display of the same information on another device, we demonstrate that L&C is suitable for secure device pairing (e.g., key exchange) and similar tasks. We also describe several common use cases, provide some performance data for our prototype implementation and discuss the security properties of L&C.
Cryptographic Key Generation from Voice (Extended Abstract)
IEEE Symposium on Security and Privacy, 2001
We propose a technique to reliably generate a crypto- graphic key from a user's voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regener- ate the key by uttering her password