{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T22:59:35Z","timestamp":1773701975005,"version":"3.50.1"},"reference-count":141,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["NPRP11S-0109-180242"],"award-info":[{"award-number":["NPRP11S-0109-180242"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["UREP23-065-1-014"],"award-info":[{"award-number":["UREP23-065-1-014"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["NPRP X-063-1-014"],"award-info":[{"award-number":["NPRP X-063-1-014"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2020.2969030","type":"journal-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T21:15:40Z","timestamp":1579814140000},"page":"311-340","source":"Crossref","is-referenced-by-count":12,"title":["Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8237-0539","authenticated-orcid":false,"given":"Maurantonio","family":"Caprolu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0974-3639","authenticated-orcid":false,"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2297998"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00026-5"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502606"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2009.2025827"},{"key":"ref31","author":"stallings","year":"2017","journal-title":"Cryptography and Network Security Principles and Practice"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1997.596192"},{"key":"ref37","first-page":"1065","article-title":"A survey of convolutive blind source separation methods","author":"pedersen","year":"2007","journal-title":"Springer Handbook of Speech Processing"},{"key":"ref36","author":"comon","year":"2010","journal-title":"Handbook of Blind Source Separation Independent Component Analysis and Applications"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1162\/0899766054322964"},{"key":"ref34","first-page":"174","article-title":"Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time","author":"shen","year":"2013","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/0470011815.b2a15018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"ref29","author":"gerhard","year":"2003","journal-title":"Audio signal classification History and current techniques"},{"key":"ref20","author":"camastra","year":"2015","journal-title":"Machine Learning for Audio Image and Video Analysis Theory and Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref24","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","volume":"14","author":"kohavi","year":"1995","journal-title":"Proc IJCAI"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.14"},{"key":"ref26","first-page":"1","author":"benesty","year":"2009","journal-title":"Pearson Correlation Coefficient"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41383-4_3"},{"key":"ref25","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","volume":"160","author":"kotsiantis","year":"2007","journal-title":"Emerg Artif Intell Appl Comput Eng"},{"key":"ref50","year":"2019","journal-title":"Duo Secure Two-Factor Authentication Application"},{"key":"ref51","year":"2019","journal-title":"Google 2-step verification"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212501"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978328"},{"key":"ref57","first-page":"483","article-title":"Sound-proof: Usable two-factor authentication based on ambient sound","author":"karapanos","year":"2015","journal-title":"Proc 24th USENIX Security Symp (USENIX Security"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.09.012"},{"key":"ref55","year":"2019","journal-title":"Yubikey Neo"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382240"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.001"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.008"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2873767"},{"key":"ref3","article-title":"Wireless audio market by product, technology (Bluetooth, Wi-Fi, Airplay, RF), application (home audio, consumer, commercial, automotive), and region&#x2014;Global forecast to 2023","year":"2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176341"},{"key":"ref5","first-page":"20","article-title":"Acoustic side-channel attacks on printers","author":"backes","year":"2010","journal-title":"Proc 19th USENIX Conf Security (USENIX Security)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.009"},{"key":"ref49","year":"2019","journal-title":"EncapSecurity"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818005"},{"key":"ref9","author":"conti","year":"2018","journal-title":"A survey on context-based co-presence detection techniques"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3002170"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987475"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1458-5"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.96"},{"key":"ref42","author":"mahafza","year":"2013","journal-title":"Radar Systems Analysis and Design Using MATLAB"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322265"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8644633"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2018.09.019"},{"key":"ref127","article-title":"Pitfalls in designing zero-effort deauthentication: Opportunistic human observation attacks","author":"huhta","year":"2015","journal-title":"Proc NDSS"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.51"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098259"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_21"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_27"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.111413.00196"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486037"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2850524"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866319"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433216"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_20"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2748278"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2691578"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978294"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555831"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_22"},{"key":"ref79","first-page":"77","article-title":"Secure device pairing using audio","author":"claycomb","year":"2009","journal-title":"Proc 43rd Annu Int Carnahan Conf Security Technol"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2429117"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2839604"},{"key":"ref137","volume":"20","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433202"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2018.8630304"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1935974"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2019.8767404"},{"key":"ref63","first-page":"87","article-title":"Distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"Proc 16th USENIX Security Symp (USENIX)"},{"key":"ref64","first-page":"3332","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEE.2018.8646089"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241574"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSPEC.2019.8635813","article-title":"VR for your ears: Dynamic 3D audio is key to the immersive experience","volume":"56","author":"johansson","year":"2019","journal-title":"IEEE Spectr"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2619679"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.10.005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICCC.2017.20"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3314397"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2895742"},{"key":"ref109","first-page":"513","article-title":"Hidden voice commands","author":"carlini","year":"2016","journal-title":"Proc 25th USENIX Security Symp (USENIX Security)"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2016.7551833"},{"key":"ref108","article-title":"Cocaine noodles: Exploiting the gap between human and machine speech recognition","author":"vaidya","year":"2015","journal-title":"Proc 9th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6855037"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"ref93","first-page":"294","article-title":"Security of audio secret sharing scheme encrypting audio secrets","author":"yoshida","year":"2012","journal-title":"Proc IEEE Int Conf Internet Technol Secured Trans"},{"key":"ref106","article-title":"Smart homes: Vendor analysis, impact assessments & strategic opportunities 2018&#x2013;2023","author":"maynard","year":"2018"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2008.4651264"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49649-1_31"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196545"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2856820"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479068"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2013.6694344"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"ref99","first-page":"2242","article-title":"Survey of different types of CAPTCHA","volume":"5","author":"singh","year":"2014","journal-title":"Int J Comput Sci Inf Technol"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714634"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0403"},{"key":"ref11","first-page":"15","article-title":"An overview of acoustic side-channel attack","volume":"3","author":"deepa","year":"2013","journal-title":"Int J Comput Sci Commun Netw"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8228-3_33"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5121\/ijma.2011.3308"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/9781118142882"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1121\/1.424266"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971681"},{"key":"ref16","first-page":"138","article-title":"Voice recognition algorithms using MEL frequency Cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques","volume":"2","author":"muda","year":"2010","journal-title":"J Supercomput"},{"key":"ref82","first-page":"1","article-title":"AdhocPairing: Spontaneous audio based secure device pairing for Android mobile devices","volume":"12","author":"sigg","year":"2012","journal-title":"Proc IWSSI\/SPMU"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-018-0403-7"},{"key":"ref17","first-page":"565","article-title":"Speaker identification using MEL frequency Cepstral coefficients","volume":"1","author":"hasan","year":"2004","journal-title":"Proc ICECE"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62024-4_14"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5715\/jnlp.14.4_83"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197527"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939934"},{"key":"ref19","first-page":"123","article-title":"Hello, is it me you&#x2019;re looking for? Differentiating between human and electronic speakers for voice interface security","author":"blue","year":"2018","journal-title":"Proc ACM WiSec"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0264-7"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023426"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053005"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2873372"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2036146.2036150"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2011.5767583"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2247758"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744928"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2018.8480126"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-017-1255-0"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9361471\/08967104.pdf?arnumber=8967104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:26Z","timestamp":1652194346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8967104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":141,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2020.2969030","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}