Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication
Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, w...
Ausführliche Beschreibung
Autor*in: |
Guo, Yunxi [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer 2017 |
---|
Übergeordnetes Werk: |
Enthalten in: Journal of hardware and systems security - [Cham] : Springer International Publishing, 2017, 1(2017), 1 vom: März, Seite 18-37 |
---|---|
Übergeordnetes Werk: |
volume:1 ; year:2017 ; number:1 ; month:03 ; pages:18-37 |
Links: |
---|
DOI / URN: |
10.1007/s41635-017-0003-4 |
---|
Katalog-ID: |
SPR038255774 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR038255774 | ||
003 | DE-627 | ||
005 | 20230328195935.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201007s2017 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s41635-017-0003-4 |2 doi | |
035 | |a (DE-627)SPR038255774 | ||
035 | |a (SPR)s41635-017-0003-4-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Guo, Yunxi |e verfasserin |4 aut | |
245 | 1 | 0 | |a Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication |
264 | 1 | |c 2017 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a © Springer 2017 | ||
520 | |a Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. | ||
650 | 4 | |a Physical unclonable functions |7 (dpeaa)DE-He213 | |
650 | 4 | |a Mobile authentication |7 (dpeaa)DE-He213 | |
650 | 4 | |a Speech processing |7 (dpeaa)DE-He213 | |
700 | 1 | |a Tyagi, Akhilesh |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Journal of hardware and systems security |d [Cham] : Springer International Publishing, 2017 |g 1(2017), 1 vom: März, Seite 18-37 |w (DE-627)885200780 |w (DE-600)2892763-1 |x 2509-3436 |7 nnns |
773 | 1 | 8 | |g volume:1 |g year:2017 |g number:1 |g month:03 |g pages:18-37 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s41635-017-0003-4 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_101 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_120 | ||
912 | |a GBV_ILN_138 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_171 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_250 | ||
912 | |a GBV_ILN_266 | ||
912 | |a GBV_ILN_281 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_636 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2004 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a GBV_ILN_2008 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2010 | ||
912 | |a GBV_ILN_2011 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a GBV_ILN_2031 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2037 | ||
912 | |a GBV_ILN_2038 | ||
912 | |a GBV_ILN_2039 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2048 | ||
912 | |a GBV_ILN_2049 | ||
912 | |a GBV_ILN_2050 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2057 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_2064 | ||
912 | |a GBV_ILN_2065 | ||
912 | |a GBV_ILN_2068 | ||
912 | |a GBV_ILN_2070 | ||
912 | |a GBV_ILN_2086 | ||
912 | |a GBV_ILN_2088 | ||
912 | |a GBV_ILN_2093 | ||
912 | |a GBV_ILN_2106 | ||
912 | |a GBV_ILN_2107 | ||
912 | |a GBV_ILN_2108 | ||
912 | |a GBV_ILN_2110 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2112 | ||
912 | |a GBV_ILN_2113 | ||
912 | |a GBV_ILN_2116 | ||
912 | |a GBV_ILN_2118 | ||
912 | |a GBV_ILN_2119 | ||
912 | |a GBV_ILN_2122 | ||
912 | |a GBV_ILN_2129 | ||
912 | |a GBV_ILN_2143 | ||
912 | |a GBV_ILN_2144 | ||
912 | |a GBV_ILN_2147 | ||
912 | |a GBV_ILN_2148 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a GBV_ILN_2188 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2232 | ||
912 | |a GBV_ILN_2336 | ||
912 | |a GBV_ILN_2446 | ||
912 | |a GBV_ILN_2470 | ||
912 | |a GBV_ILN_2472 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_2522 | ||
912 | |a GBV_ILN_2548 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4046 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4242 | ||
912 | |a GBV_ILN_4246 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4251 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4333 | ||
912 | |a GBV_ILN_4334 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4336 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4393 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 1 |j 2017 |e 1 |c 03 |h 18-37 |
author_variant |
y g yg a t at |
---|---|
matchkey_str |
article:25093436:2017----::ocbsdsreiehsclnlnbeucinfroie |
hierarchy_sort_str |
2017 |
publishDate |
2017 |
allfields |
10.1007/s41635-017-0003-4 doi (DE-627)SPR038255774 (SPR)s41635-017-0003-4-e DE-627 ger DE-627 rakwb eng Guo, Yunxi verfasserin aut Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer 2017 Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. Physical unclonable functions (dpeaa)DE-He213 Mobile authentication (dpeaa)DE-He213 Speech processing (dpeaa)DE-He213 Tyagi, Akhilesh aut Enthalten in Journal of hardware and systems security [Cham] : Springer International Publishing, 2017 1(2017), 1 vom: März, Seite 18-37 (DE-627)885200780 (DE-600)2892763-1 2509-3436 nnns volume:1 year:2017 number:1 month:03 pages:18-37 https://dx.doi.org/10.1007/s41635-017-0003-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_266 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 1 2017 1 03 18-37 |
spelling |
10.1007/s41635-017-0003-4 doi (DE-627)SPR038255774 (SPR)s41635-017-0003-4-e DE-627 ger DE-627 rakwb eng Guo, Yunxi verfasserin aut Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer 2017 Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. Physical unclonable functions (dpeaa)DE-He213 Mobile authentication (dpeaa)DE-He213 Speech processing (dpeaa)DE-He213 Tyagi, Akhilesh aut Enthalten in Journal of hardware and systems security [Cham] : Springer International Publishing, 2017 1(2017), 1 vom: März, Seite 18-37 (DE-627)885200780 (DE-600)2892763-1 2509-3436 nnns volume:1 year:2017 number:1 month:03 pages:18-37 https://dx.doi.org/10.1007/s41635-017-0003-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_266 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 1 2017 1 03 18-37 |
allfields_unstemmed |
10.1007/s41635-017-0003-4 doi (DE-627)SPR038255774 (SPR)s41635-017-0003-4-e DE-627 ger DE-627 rakwb eng Guo, Yunxi verfasserin aut Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer 2017 Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. Physical unclonable functions (dpeaa)DE-He213 Mobile authentication (dpeaa)DE-He213 Speech processing (dpeaa)DE-He213 Tyagi, Akhilesh aut Enthalten in Journal of hardware and systems security [Cham] : Springer International Publishing, 2017 1(2017), 1 vom: März, Seite 18-37 (DE-627)885200780 (DE-600)2892763-1 2509-3436 nnns volume:1 year:2017 number:1 month:03 pages:18-37 https://dx.doi.org/10.1007/s41635-017-0003-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_266 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 1 2017 1 03 18-37 |
allfieldsGer |
10.1007/s41635-017-0003-4 doi (DE-627)SPR038255774 (SPR)s41635-017-0003-4-e DE-627 ger DE-627 rakwb eng Guo, Yunxi verfasserin aut Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer 2017 Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. Physical unclonable functions (dpeaa)DE-He213 Mobile authentication (dpeaa)DE-He213 Speech processing (dpeaa)DE-He213 Tyagi, Akhilesh aut Enthalten in Journal of hardware and systems security [Cham] : Springer International Publishing, 2017 1(2017), 1 vom: März, Seite 18-37 (DE-627)885200780 (DE-600)2892763-1 2509-3436 nnns volume:1 year:2017 number:1 month:03 pages:18-37 https://dx.doi.org/10.1007/s41635-017-0003-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_266 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 1 2017 1 03 18-37 |
allfieldsSound |
10.1007/s41635-017-0003-4 doi (DE-627)SPR038255774 (SPR)s41635-017-0003-4-e DE-627 ger DE-627 rakwb eng Guo, Yunxi verfasserin aut Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication 2017 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer 2017 Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. Physical unclonable functions (dpeaa)DE-He213 Mobile authentication (dpeaa)DE-He213 Speech processing (dpeaa)DE-He213 Tyagi, Akhilesh aut Enthalten in Journal of hardware and systems security [Cham] : Springer International Publishing, 2017 1(2017), 1 vom: März, Seite 18-37 (DE-627)885200780 (DE-600)2892763-1 2509-3436 nnns volume:1 year:2017 number:1 month:03 pages:18-37 https://dx.doi.org/10.1007/s41635-017-0003-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_266 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 1 2017 1 03 18-37 |
language |
English |
source |
Enthalten in Journal of hardware and systems security 1(2017), 1 vom: März, Seite 18-37 volume:1 year:2017 number:1 month:03 pages:18-37 |
sourceStr |
Enthalten in Journal of hardware and systems security 1(2017), 1 vom: März, Seite 18-37 volume:1 year:2017 number:1 month:03 pages:18-37 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Physical unclonable functions Mobile authentication Speech processing |
isfreeaccess_bool |
false |
container_title |
Journal of hardware and systems security |
authorswithroles_txt_mv |
Guo, Yunxi @@aut@@ Tyagi, Akhilesh @@aut@@ |
publishDateDaySort_date |
2017-03-01T00:00:00Z |
hierarchy_top_id |
885200780 |
id |
SPR038255774 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR038255774</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230328195935.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201007s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s41635-017-0003-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR038255774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s41635-017-0003-4-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Guo, Yunxi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer 2017</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Physical unclonable functions</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile authentication</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Speech processing</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tyagi, Akhilesh</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of hardware and systems security</subfield><subfield code="d">[Cham] : Springer International Publishing, 2017</subfield><subfield code="g">1(2017), 1 vom: März, Seite 18-37</subfield><subfield code="w">(DE-627)885200780</subfield><subfield code="w">(DE-600)2892763-1</subfield><subfield code="x">2509-3436</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:1</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:1</subfield><subfield code="g">month:03</subfield><subfield code="g">pages:18-37</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s41635-017-0003-4</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_266</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_636</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2070</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2188</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2446</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">1</subfield><subfield code="j">2017</subfield><subfield code="e">1</subfield><subfield code="c">03</subfield><subfield code="h">18-37</subfield></datafield></record></collection>
|
author |
Guo, Yunxi |
spellingShingle |
Guo, Yunxi misc Physical unclonable functions misc Mobile authentication misc Speech processing Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication |
authorStr |
Guo, Yunxi |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)885200780 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
2509-3436 |
topic_title |
Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication Physical unclonable functions (dpeaa)DE-He213 Mobile authentication (dpeaa)DE-He213 Speech processing (dpeaa)DE-He213 |
topic |
misc Physical unclonable functions misc Mobile authentication misc Speech processing |
topic_unstemmed |
misc Physical unclonable functions misc Mobile authentication misc Speech processing |
topic_browse |
misc Physical unclonable functions misc Mobile authentication misc Speech processing |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Journal of hardware and systems security |
hierarchy_parent_id |
885200780 |
hierarchy_top_title |
Journal of hardware and systems security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)885200780 (DE-600)2892763-1 |
title |
Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication |
ctrlnum |
(DE-627)SPR038255774 (SPR)s41635-017-0003-4-e |
title_full |
Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication |
author_sort |
Guo, Yunxi |
journal |
Journal of hardware and systems security |
journalStr |
Journal of hardware and systems security |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
txt |
container_start_page |
18 |
author_browse |
Guo, Yunxi Tyagi, Akhilesh |
container_volume |
1 |
format_se |
Elektronische Aufsätze |
author-letter |
Guo, Yunxi |
doi_str_mv |
10.1007/s41635-017-0003-4 |
title_sort |
voice-based user-device physical unclonable functions for mobile device authentication |
title_auth |
Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication |
abstract |
Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. © Springer 2017 |
abstractGer |
Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. © Springer 2017 |
abstract_unstemmed |
Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests. © Springer 2017 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_266 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 |
container_issue |
1 |
title_short |
Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication |
url |
https://dx.doi.org/10.1007/s41635-017-0003-4 |
remote_bool |
true |
author2 |
Tyagi, Akhilesh |
author2Str |
Tyagi, Akhilesh |
ppnlink |
885200780 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s41635-017-0003-4 |
up_date |
2024-07-03T17:01:59.135Z |
_version_ |
1803578107898101760 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR038255774</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230328195935.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201007s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s41635-017-0003-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR038255774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s41635-017-0003-4-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Guo, Yunxi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer 2017</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Physical unclonable functions</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile authentication</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Speech processing</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tyagi, Akhilesh</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of hardware and systems security</subfield><subfield code="d">[Cham] : Springer International Publishing, 2017</subfield><subfield code="g">1(2017), 1 vom: März, Seite 18-37</subfield><subfield code="w">(DE-627)885200780</subfield><subfield code="w">(DE-600)2892763-1</subfield><subfield code="x">2509-3436</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:1</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:1</subfield><subfield code="g">month:03</subfield><subfield code="g">pages:18-37</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s41635-017-0003-4</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_266</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_636</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2070</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2188</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2446</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">1</subfield><subfield code="j">2017</subfield><subfield code="e">1</subfield><subfield code="c">03</subfield><subfield code="h">18-37</subfield></datafield></record></collection>
|
score |
7.400094 |