Multimedia Content Identification Through Smart

Slides:



Advertisements
Similar presentations
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Advertisements

Watts up ?. NET. Watts up.NET Overview Ideal for remote monitoring, the built-in web server allows data to be accessed via the internet. Connect the.
Daisuke Mashima and Arnab Roy Fujitsu Laboratories of America, Inc. Privacy Preserving Disclosure of Authenticated Energy Usage Data.
Home Area Networks …Expect More Mohan Wanchoo Jasmine Systems, Inc.
FixtureFinder: Discovering the Existence of Electrical and Water Fixtures Vijay Srinivasan*, John Stankovic, Kamin Whitehouse University of Virginia *(Currently.
Managing Data from Avian Radar Systems Edwin Herricks, PhD Siddhartha Majumdar.
By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh. Achieving Security through Kinect using Skeleton Analysis (ASKSA)
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
2006/12/05ICS iPower: An Energy Conservation System for Intelligent Buildings by Wireless Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun-Wu.
Tutorial 7 Working with Multimedia. XP Objectives Explore various multimedia applications on the Web Learn about sound file formats and properties Embed.
A Survey of Home Energy Management Systems in Future Smart Grid Communications By Muhammad Ishfaq Khan.
12. 2 Using Electrical Energy Wisely. (Pages )
Advanced Metering Infrastructure
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
SensEye: A Multi-Tier Camera Sensor Network by Purushottam Kulkarni, Deepak Ganesan, Prashant Shenoy, and Qifeng Lu Presenters: Yen-Chia Chen and Ivan.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Introduction Due to the recent advances in smart grid as well as the increasing dissemination of smart meters, the electricity usage of every moment in.
GML-3 GPRS BASED METER AND LOGGER THREE PHASE METER WITH INBUILT DATA LOGGER © Embuilt Technologies Visit us at Or For.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Instituto de Investigaciones Eléctricas
MODERN OPERATING SYSTEMS Third Edition ANDREW S
APC InfraStruxure TM Central Smart Plug-In for HP Operations Manager Manage Power, Cooling, Security, Environment, Rack Access and Physical Layer Infrastructure.
Audio Compression Usha Sree CMSC 691M 10/12/04. Motivation Efficient Storage Streaming Interactive Multimedia Applications.
Deokwoo Jung Estimating Building Consumption Breakdowns using ON/OFF State Sensing and Incremental Sub-Meter Deployment Deokwoo Jung and Andreas Savvides.
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
DYNAMIC WAP BASED VOTING SYSTEM Bertrand COLAS Submission date: May 2002 School of Computing Bachelor of Engineering with Honours in Computer.
April 2011 November 2010.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
1 SpotLight : Focusing on Energy Consumption of Individuals Younghun Kim Zainul M. Charbiwala Akhilesh Singhania Mani B. Srivastava.
Portal User Group Meeting June 13, Agenda I. Welcome II. Updates on the following: –Migration Status –New Templates –DB Breakup –Keywords –Streaming.
Projekt „ESSNBS“ Niš, November 4 th – 7 th, DAAD Design and Simulation of Multiplexer Cell Resistant to Side Channel Attacks.
IPower: An Energy Conservation System for Intelligent Buildings International Journal of Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun- Wu Yeh.
28 th /June/2010 Security & AV Systems Business Unit Panasonic System Networks Company WJ-NV200K/G Face Matching Outline.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Spotlight: Personal Natural Resource Consumption Profiler Younghun Kim, Zainul Charbiwala, Akhilesh Singhania, Thomas Schmid, Mani B. Srivastava Networked.
A Buffer-Aware HTTP Live Streaming Approach for SDN-Enabled 5G Wireless Networks Speaker: Bo-Yu Huang Advisor: Dr. Ho-Ting Wu Date: 2015/04/15 1.
Photovoltaic Power System Monitor Josh Stone Ryan Mann Art Barnes Austin Fisher.
SMART GRID A smart grid for intelligent energy use. By: Suhani Gupta.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
61 Events Total Test Home #1: Controlled Test DryerGarage Toaster Oven 1Oven 2.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Blue eye technology Prepared by VINIT SHAH 08 CE 099.
EE5900 Cyber-Physical Systems Smart Home CPS
Distributed Control and Measurement via the Internet
Seminar On Energy Audit Submitted To: Submitted By:
WP3 INERTIA Local Control and Automation Hub
WP2 INERTIA Distributed Multi-Agent Based Framework
How SCADA Systems Work?.
System Control based Renewable Energy Resources in Smart Grid Consumer
Digital image self-adaptive acquisition in medical x-ray imaging
Use Case of LRLP Operation for IoT
EE5900: Cyber-Physical Systems
Tutorial 7 Working with Multimedia
A Framework for Automatic Resource and Accuracy Management in A Cloud Environment Smita Vijayakumar.
Nipun Batra Haimonti Dutta Amarjeet Singh
Overview What is Multimedia? Characteristics of multimedia
Cover page.
Working with Multimedia
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
XProtect R New features
Protect Consumer Privacy from Load Monitoring
Designing IIS Security (IIS – Internet Information Service)
Yining ZHAO Computer Network Information Center,
ELEC-E Smart Grid Smart Meters and Security Issues
Simple, accurate tenant sub-metering
Presentation transcript:

Multimedia Content Identification Through Smart Multimedia Content Identification Through Smart Meter Power Usage Profiles Ulrich Greveler, Peter Gl¨osek¨otterz, Benjamin Justusy, Dennis Loehry PRESENTED BY: KIRAN KUMAR SURAPATHI DATE: 03/30/2017

OVERVIEW INTRODUCTION RELATED WORK EXPERIMENTAL RESULTS DATA TRANSMISSION TV/FILM DETECTION CONCLUSION

I. INTRODUCTION Advanced metering devices (smart meters) Electrical meter that records consumption of electrical energy at intervals Installed throughout electric networks Communicating with central server Problems regarding high-resolution energy consumption data Unprecedented invasions of consumer privacy Intrusive identification Monitoring of equipment within consumers’ homes Examples like TV set, refrigerator, toaster, and oven

I. INTRODUCTION MAIN CONTRIBUTIONS: The data transmitted via the Internet by the smart meter are unsigned and unencrypted 5 minutes-chunk of consecutive viewing without major interference by other appliances is sufficient to identify the content Identifying what channel the TV set in the household was displaying by analyzing the household’s electricity usage profile at a 0.5s sample rate

II. RELATED WORK Nonintrusive load monitoring (NILM) The number of electric appliances in a private home can be identified by their load signatures with impressive accuracy Currently two approaches of implementing privacy preserving smart meter data analysis Masking the meter readings Homomorphic encryption

III. EXPERIMENTAL RESULTS AIMS What are the possible ways of obtaining and evaluating data coming from a calibrated smart meter? What can be deduced from smart meter data regarding a person’s TV watching habit in a private home?

IV. DATA TRANSMISSION Transmission of smart meter data to the Server is done through the TCP/IP protocol Contrary to provider's claim The smart meter data are not encrypted and unsigned The unencrypted data can be easily hacked out. Attacker can send different power consumption data to the server

IV. DATA TRANSMISSION

IV. DATA TRANSMISSION Web browser based view on the power consumption profile. Java-script based application

V. TV/FILM DETECTION Television Hardware Tests were performed on an home LCD television set Total amount of visible brightness of a picture is a combination of the backlighting and LCD shuttering A technology dubbed dynamic backlighting is applied on modern LCD TVs to improve the contrast ratio The shutters produce a contrast ratio of 1000:1 and dynamic backlighting enhances this ratio up to 30000:1 Power Consumption Prediction Function Input of the function is the multimedia content Output is power usage prediction

V. TV/FILM DETECTION Power Consumption Prediction Function Cont….. Step one measures the power consumption for a series of pictures with the use of additive RGB color notation bmin is the minimum brightness value that maximizes TV power consumption A typical bmin value for the tested LCD TVs lies in the range {26, . . . , 58}. Step two extract the frames from a movie and determines the brightness of each frame

V. TV/FILM DETECTION Power Consumption Prediction Function Cont……. Test for determining the value bmin

V. TV/FILM DETECTION Power Consumption Prediction Function Cont….

V. TV/FILM DETECTION Preliminary Analysis Extracted first 5 minutes of three movie files Compared the actual power consumption against values produced by the prediction function Calculated the Pearson product moment correlation coefficients between the actual and predicted power consumption data. The correlation for the three movie events are 0.94, 0.98 and 0.93 respectively

V. TV/FILM DETECTION Preliminary Analysis Cont…….

V. TV/FILM DETECTION Corridor Algorithm To eliminate possible false matches To make movie load signature more distinguishable The parameters for the decision are threshold, corridor heights

V. TV/FILM DETECTION Automatic Detection of bmin To identify a broad range of video material A script to detect the optimal bmin values Correlation between actual consumption and power prediction is calculated for every bmin value

V. TV/FILM DETECTION Work-flow

V. TV/FILM DETECTION Other Television Models Test results relating to 3 movies and 1 TV for other TV models Movie/TV content identification via fine-grained smart meter data is possible

V. TV/FILM DETECTION Determining the Optimal Values A series of test runs for varying parameters are performed No of false positive and correct identification are recorded 0.85, 50%, 5% are the best identification rate CONTENT IDENTIFICATION OF 12 MOVIE CHUNKS WITH DIFFERENT PARAMETERS

V. TV/FILM DETECTION False Positives with Other Appliances To get some consolidated findings regarding false content identification using workflow Search of content in several 24h periods Used 653 content files split into 5 min chunks Considered correlation >=0.85 Identified 35.5 hits per 24hours Log file clipping showing false positive matches on other appliances

V. TV/FILM DETECTION False Positives with Other Appliances Sample example of a false positive match The power curve does obviously not reflect television operation. The power consumption difference of more than 4000 watts is too high for being generated by TV set The curve shape does not obey the shape of prediction

VI. CONCLUSION Transmission of unsigned and unencrypted data is a major throwback in data integrity and consumer privacy At least a major privacy issue regarding content identification via a smart meter Research has shown that identification of appliance’s behavior, television program and TV watching habits can be done by analyzing the smart meter power consumption data and electricity usage profile . Smart meter data protection standards need to be defined and fulfilled, before a meter becomes fully operational and capable of preserving a user privacy

REFERENCES [1] The basics of tv power. http://reviews.cnet.com/green-tech/tv-powerefficiency/, April 2010. [2] Researchers analyze smart meter data. http://www.spiegel.de/netzwelt/netzpolitik/0,1518,787629,00.html, September 2011. [3] A. Rial and G. Danezis and M. Kohlweiss. Differential private billing with rebates. Technical Report MSR-TR-2011-10, Microsoft Research, Feburary 2011. [4] Gergely Acs and Claude Castelluccia. Dream: Differentially private ´ smart metering. CoRR, abs/1201.2531, 2012. [5] G.Danezis A.Rial. Privacy-Preserving Smart Metering, MSR-TR-2010- 150. [6] Miro Enev, Sidhant Gupta, Tadayoshi Kohno, and Shwetak N. Patel. Televisions, video privacy, and powerline electromagnetic interference. In ACM Conference on Computer and Communications Security, pages 537–550, 2011.

QUESTIONS??