An Evaluation of Entropy Measures for Microphone Identification

Research findings have shown that microphones can be uniquely identified by audio recordings since physical features of the microphone components leave repeatable and distinguishable traces on the audio stream. This property can be exploited in security applications to perform the identification of a mobile phone through the built-in microphone. The problem is to determine an accurate but also efficient representation of the physical characteristics, which is not known a priori. Usually there is a trade-off between the identification accuracy and the time requested to perform the classification. Various approaches have been used in literature to deal with it, ranging from the application of handcrafted statistical features to the recent application of deep learning techniques. This paper evaluates the application of different entropy measures (Shannon Entropy, Permutation Entropy, Dispersion Entropy, Approximate Entropy, Sample Entropy, and Fuzzy Entropy) and their suitability for microphone classification. The analysis is validated against an experimental dataset of built-in microphones of 34 mobile phones, stimulated by three different audio signals. The findings show that selected entropy measures can provide a very high identification accuracy in comparison to other statistical features and that they can be robust against the presence of noise. This paper performs an extensive analysis based on filter features selection methods to identify the most discriminating entropy measures and the related hyper-parameters (e.g., embedding dimension). Results on the trade-off between accuracy and classification time are also presented.

[1]  Alexander Marshak,et al.  Approximate Entropy and Sample Entropy: A Comprehensive Tutorial , 2019, Entropy.

[2]  Gary Steri,et al.  A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components , 2017, IEEE Communications Surveys & Tutorials.

[3]  José Luis Rodríguez-Sotelo,et al.  Automatic Sleep Stages Classification Using EEG Entropy Features and Unsupervised Pattern Analysis Techniques , 2014, Entropy.

[4]  B. Pompe,et al.  Permutation entropy: a natural complexity measure for time series. , 2002, Physical review letters.

[5]  Marko Robnik-Sikonja,et al.  Theoretical and Empirical Analysis of ReliefF and RReliefF , 2003, Machine Learning.

[6]  Gianmarco Baldini,et al.  Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network , 2019, IEEE Access.

[7]  Michael A. Temple,et al.  Intrinsic Physical-Layer Authentication of Integrated Circuits , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Nick S. Jones,et al.  Automatic time-series phenotyping using massive feature extraction , 2016, bioRxiv.

[9]  Hamed Azami,et al.  Application of dispersion entropy to status characterization of rotary machines , 2019, Journal of Sound and Vibration.

[10]  Xiang Wang,et al.  Radio Frequency Fingerprint Extraction Based on Multidimension Permutation Entropy , 2017 .

[11]  Hamed Azami,et al.  Refined multiscale fuzzy entropy based on standard deviation for biomedical signal analysis , 2016, Medical & Biological Engineering & Computing.

[12]  Chao Wu,et al.  Identification of Multiple Faults in Gearbox Based on Multipoint Optional Minimum Entropy Deconvolution Adjusted and Permutation Entropy , 2018, Entropy.

[13]  Xiang Wang,et al.  Specific Emitter Identification Based on Nonlinear Dynamical Characteristics , 2016, Canadian Journal of Electrical and Computer Engineering.

[14]  Roberto Caldelli,et al.  Smartphone Fingerprinting Combining Features of On-Board Sensors , 2017, IEEE Transactions on Information Forensics and Security.

[15]  Sheldon A. Munns,et al.  RF-DNA Fingerprinting for Airport WiMax Communications Security , 2010, 2010 Fourth International Conference on Network and System Security.

[16]  Jiwu Huang,et al.  Band Energy Difference for Source Attribution in Audio Forensics , 2018, IEEE Transactions on Information Forensics and Security.

[17]  Ning Zhang,et al.  S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol , 2017, IEEE Internet of Things Journal.

[18]  Hamed Azami,et al.  Dispersion Entropy: A Measure for Time-Series Analysis , 2016, IEEE Signal Processing Letters.

[19]  Dawu Gu,et al.  A Survey on Lightweight Entity Authentication with Strong PUFs , 2015, ACM Comput. Surv..

[20]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[21]  Tomi Kinnunen,et al.  Source cell-phone recognition from recorded speech using non-speech segments , 2014, Digit. Signal Process..

[22]  Onur Günlü,et al.  Secure and Reliable Key Agreement with Physical Unclonable Functions † , 2018, IACR Cryptol. ePrint Arch..

[23]  J. Richman,et al.  Physiological time-series analysis using approximate entropy and sample entropy. , 2000, American journal of physiology. Heart and circulatory physiology.

[24]  S M Pincus,et al.  Approximate entropy as a measure of system complexity. , 1991, Proceedings of the National Academy of Sciences of the United States of America.

[25]  Weiting Chen,et al.  Measuring complexity using FuzzyEn, ApEn, and SampEn. , 2009, Medical engineering & physics.

[26]  Dae-Woon Lim,et al.  A Multiple Rényi Entropy Based Intrusion Detection System for Connected Vehicles , 2020, Entropy.

[27]  Hamed Azami,et al.  Refined Composite Multiscale Dispersion Entropy and its Application to Biomedical Signals , 2016, IEEE Transactions on Biomedical Engineering.

[28]  Rangding Wang,et al.  Source Cell-Phone Identification in the Presence of Additive Noise from CQT Domain , 2018, Inf..

[29]  U. Rajendra Acharya,et al.  Application of Entropy Measures on Intrinsic Mode Functions for the Automated Identification of Focal Electroencephalogram Signals , 2015, Entropy.

[30]  Max A. Little,et al.  Highly comparative time-series analysis: the empirical structure of time series and their methods , 2013, Journal of The Royal Society Interface.

[31]  J. Mohanalin,et al.  Voice Activity Detection Using Fuzzy Entropy and Support Vector Machine , 2016, Entropy.

[32]  Gary Steri,et al.  Comparison of techniques for radiometric identification based on deep convolutional neural networks , 2019, Electronics Letters.