JICE: Joint Data Compression and Encryption for Wireless Energy Auditing Networks

Size: px
Start display at page:

Download "JICE: Joint Data Compression and Encryption for Wireless Energy Auditing Networks"

Transcription

1 JICE: Joint Data Compression and Encryption for Wireless Energy Auditing Networks Sheng-Yuan Chiu 1,2, Hoang Hai Nguyen 1, Rui Tan 1, David K.Y. Yau 1,3,Deokwoo Jung 1 1 Advanced Digital Science Center, Illinois at Singapore 2 National Tsing Hua University, Taiwan 3 Singapore University of Technology and Design, Singapore

2 Outline Motivation Design of JICE Secrecy of JICE Eperiment 2/19

3 Wireless Energy Auditing Buildings account for 40% electricity use Wireless appliance submetering Smart plugs (ZigBee radio) 3/19

4 Wireless Energy Auditing Buildings account for 40% electricity use Wireless appliance submetering Efficiency analysis 56% energy wasted in our office[jung 2013] Smart plugs (ZigBee radio) 3/19

5 Objectives & Challenges 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station 4/19

6 Objectives & Challenges 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station Increase coverage (# of meters) and sampling rate 10% coverage by 455 plugs [Haggerty 2012] Down to 1Hz to support load profiling 4/19

7 Objectives & Challenges Crowded wireless band Heavy WiFi traffic 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station Increase coverage (# of meters) and sampling rate 10% coverage by 455 plugs [Haggerty 2012] Down to 1Hz to support load profiling 4/19

8 Objectives & Challenges Crowded wireless band Heavy WiFi traffic 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station Increase coverage (# of meters) and sampling rate 10% coverage by 455 plugs [Haggerty 2012] Down to 1Hz to support load profiling Data secrecy during wireless communication Threat model: wireless eavesdropping 4/19

9 Objectives & Challenges Costly encryption No crypto for smart meters [Rouf 2012] Crowded wireless band Heavy WiFi traffic 50W 60W 30W 25W 10W 50W 70W 58W 50W 55W 50W ZigBee smart plugs 90W 50W ZigBee base station Increase coverage (# of meters) and sampling rate 10% coverage by 455 plugs [Haggerty 2012] Down to 1Hz to support load profiling Data secrecy during wireless communication Threat model: wireless eavesdropping 4/19

10 Conventional Scheme (Pipeline) Radio sensor compress encrypt decrypt decompress Power meter Base station reduce bandwidth use prevent eavesdropping Inefficient for resource-constrained plugs Computation-intensive compressor and cipher 5/19

11 Compressive Sensing Random matri Smart plug = Compressed Original Efficient compression Simple matri multiplication Most computation to recovery side Weakly encrypt signal [Rachlin 2008] Shared secret random matri Radio Base station Recovery Constrained optimization 6/19

12 Compressive Sensing Random matri Smart plug O(n) = Compressed Original Efficient compression Simple matri multiplication Most computation to recovery side Weakly encrypt signal [Rachlin 2008] Shared secret random matri Radio Base station Recovery Constrained optimization 6/19

13 Outline Motivation Design of JICE Secrecy of JICE Eperiment 7/19

14 Compressive Sensing Basics = Compression y M 1 M N N 1 M N 8/19

15 Compressive Sensing Basics = Compression y M 1 M N N 1 Recovery: compute from y by M N N N arg min z 1 z s.t. y z 8/19

16 Compressive Sensing Basics = Compression y M 1 M N N 1 Recovery: compute from y by N N Representation basis (only used for recovery) arg min z 1 z s.t. y M N z 8/19

17 Compressive Sensing Basics = Compression y M Recovery: compute from y by N N For better recovery Ψ sparsify 1 M N N 1 Representation basis (only used for recovery) arg min z 1 z s.t. y M Ψ -1 has many zeros N z 8/19

18 Trace-Driven Design Select Φ and Ψ based on traces Data traces from 40 branches for 18 hours Classify power consumption patterns Duty-cycled (fridge) Periodic (projector) Time (seconds) Time (seconds) Fluctuating (desktop) Spiky (server) Time (seconds) Time (seconds) 9/19

19 Random Matri Φ Gaussian, Bernoulli, Binary recovery error ~ 2 2 ~ : : original recovered Recovery error (%) Representation basis differential transform cosine transform Haar wavelet transform 10/19

20 Random Matri Φ Gaussian, Bernoulli, Binary recovery error ~ 2 2 ~ : : original recovered Recovery error (%) Representation basis differential transform cosine transform Haar wavelet transform 10/19

21 Random Matri Φ Gaussian, Bernoulli, Binary recovery error ~ 2 2 ~ : : original recovered Recovery error (%) Representation basis differential transform cosine transform Haar wavelet transform 10/19

22 Random Matri Φ Gaussian, Bernoulli, Binary recovery error ~ 2 2 ~ : : original recovered Representation basis dominates recovery performance Use binary random matri Recovery error (%) Representation basis differential transform cosine transform Haar wavelet transform 10/19

23 Representation Basis Ψ Differential transform (Diff) Cosine transform (Cos) Haar wavelet transform (Haar) sparsity # of nonzeros signal length Average sparsity duty-cycled periodic fluctuating spiky 11/19

24 Representation Basis Ψ Differential transform (Diff) Cosine transform (Cos) Haar wavelet transform (Haar) sparsity # of nonzeros signal length Average sparsity duty-cycled periodic fluctuating spiky Best choice: Diff Cos Haar Diff 11/19

25 Representation Basis Ψ Differential transform (Diff) Cosine transform (Cos) Haar wavelet transform (Haar) sparsity # of signal nonzeros length Changing power pattern: TV A plug monitors multiple appliances Average sparsity Adapt Ψ to changing power pattern duty-cycled periodic fluctuating spiky Best choice: Diff Cos Haar Diff 11/19

26 Adaptive Representation Basis Machine learning approach Plug selects Ψ based on shape features Ψ = Diff Ψ = Cos Ψ = Haar Shape feature 1 Compressed signal Smart plug Choice of Ψ Base station 12/19

27 Adaptive Representation Basis Machine learning approach Plug selects Ψ based on shape features Base station learns decision boundaries Ψ = Diff Ψ = Haar Ψ = Cos learn and update to plug Shape feature 1 Compressed signal Smart plug Choice of Ψ Base station 12/19

28 Shape Feature & Decision Table shape feature vector = # of zero crossings # of sharp changes standard deviation # of zero crossings > Δ 1? N N N N Y Y Y Y # of sharp changes > Δ 2? N N Y Y N N Y Y Standard deviation > Δ 3? N Y N Y N Y N Y Choice of basis ADT ADT HWT DCT HWT HWT ADT DCT 13

29 Shape Feature & Decision Table shape feature vector = # of zero crossings # of sharp changes standard deviation # of zero crossings > Δ 1? N N N N Y Y Y Y # of sharp changes > Δ 2? N N Y Y N N Y Y Standard deviation > Δ 3? N Y N Y N Y N Y Choice of basis ADT ADT HWT DCT HWT HWT ADT DCT 13

30 Shape Feature & Decision Table shape feature vector = # of zero crossings # of sharp changes standard deviation # of zero crossings > Δ 1? N N N N Y Y Y Y # of sharp changes > Δ 2? N N Y Y N N Y Y Standard deviation > Δ 3? N Y N Y N Y N Y Choice of basis ADT ADT HWT DCT HWT HWT ADT DCT Trained at base station Minimize recovery error 13

31 Outline Motivation Design of JICE Secrecy of JICE Eperiment 14/19

32 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance Zero mean: appliance is off High mean: appliance is on 15/19

33 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n n [ k,0,0,,0] T 15/19

34 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n Representation basis n [ k,0,0,,0] T 15/19

35 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n Representation basis n [ k,0,0,,0] T shared secret 15/19

36 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n Representation basis n [ k,0,0,,0] T Statistics depend on k shared secret 15/19

37 Statistics Leak and Perturbation Φ is unknown to attacker Provide a computational guarantee of secrecy [Rachlin 2008] Leak l 2 -norm, mean and variance ~ n n [ k,0,0,,0] T Statistics depend on k Little (no) change to sparsity Little impact on recovery Very sparse in transform domain 15/19

38 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station 16

39 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal perturb & compress y = Φ ( + n) y 16

40 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal Feature etraction perturb & compress y = Φ ( + n) Decision table Ψ choice (2 bits) y 16

41 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal Feature etraction perturb & compress y = Φ ( + n) Decision table Ψ choice (2 bits) y recover & de-perturb = Ψ argmin z - n s.t. y = ΦΨz Recovered signals 16

42 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal Feature etraction perturb & compress y = Φ ( + n) Decision table Ψ choice (2 bits) y updates (14 B) recover & de-perturb = Ψ argmin z - n s.t. y = ΦΨz Decision table training Recovered signals 16

43 Recap of JICE Seed for generating Φ Key for generating n Smart plug Base station power signal Feature etraction perturb & compress y = Φ ( + n) Decision table Ψ choice (2 bits) y updates (14 B) recover & de-perturb = Ψ argmin z - n s.t. y = ΦΨz Decision table training Recovered signals eecuted every a few hours 16

44 Outline Motivation Design of JICE Secrecy of JICE Eperiment 17/19

45 Implementation Smart plug [Sonnonet] Kmote Smart plug Kmote (8MHz MCU, 10KB RAM, ZigBee, TinyOS) Baselines Pipeline: Lossy compressor [Liu 2013] + AES Downsampling Lossless pipeline: SLZW + AES 18/19

46 Implementation Smart plug [Sonnonet] Kmote Smart plug Kmote (8MHz MCU, 10KB RAM, ZigBee, TinyOS) Same compression ratio with JICE Baselines Pipeline: Lossy compressor [Liu 2013] + AES Downsampling Lossless pipeline: SLZW + AES 18/19

47 Adaptive Basis vs. Fied Basis For TV Recovery error (%) Time 19/19

48 Adaptive Basis vs. Fied Basis For TV Recovery error (%) Time JICE achieves best performance with one eception 19/19

49 Adaptive Basis vs. Fied Basis For TV Recovery error (%) Time JICE achieves best performance with one eception 19/19

50 Data Fidelity and Scalability Pipeline Background traffic node JICE 20/19

51 Data Fidelity and Scalability Pipeline Background traffic node JICE = 12 X 20/19

52 Data Fidelity and Scalability Pipeline JICE Pipeline # of background traffic nodes Background traffic node JICE = 12 X 20/19

53 Data Fidelity and Scalability Pipeline JICE Project to 96 plugs Project to 144 plugs Pipeline # of background traffic nodes JICE supports 50% more plugs Background traffic node = 12 X JICE 20/19

54 Conclusion & Future work JICE Supports more nodes for same data fidelity Better data secrecy than pure compressive sensing Adaptive to changing power pattern Future work Other applications 21/19

A A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks

A A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks A A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks RUI TAN, Nanyang Technological University SHENG-YUAN CHIU, National Tsing Hua University HOANG HAI NGUYEN, University

More information

Recovering Lost Sensor Data through Compressed Sensing

Recovering Lost Sensor Data through Compressed Sensing Recovering Lost Sensor Data through Compressed Sensing Zainul Charbiwala Collaborators: Younghun Kim, Sadaf Zahedi, Supriyo Chakraborty, Ting He (IBM), Chatschik Bisdikian (IBM), Mani Srivastava The Big

More information

Volcanic Earthquake Timing Using Wireless Sensor Networks

Volcanic Earthquake Timing Using Wireless Sensor Networks Volcanic Earthquake Timing Using Wireless Sensor Networks GuojinLiu 1,2 RuiTan 2,3 RuoguZhou 2 GuoliangXing 2 Wen-Zhan Song 4 Jonathan M. Lees 5 1 Chongqing University, P.R. China 2 Michigan State University,

More information

Signal Recovery from Random Measurements

Signal Recovery from Random Measurements Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse

More information

Compressed Sensing for Multiple Access

Compressed Sensing for Multiple Access Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Correlation Power Analysis of Lightweight Block Ciphers

Correlation Power Analysis of Lightweight Block Ciphers Correlation Power Analysis of Lightweight Block Ciphers From Theory to Practice Alex Biryukov Daniel Dinu Johann Großschädl SnT, University of Luxembourg ESC 2017 (University of Luxembourg) CPA of Lightweight

More information

Hybrid Coding (JPEG) Image Color Transform Preparation

Hybrid Coding (JPEG) Image Color Transform Preparation Hybrid Coding (JPEG) 5/31/2007 Kompressionsverfahren: JPEG 1 Image Color Transform Preparation Example 4: 2: 2 YUV, 4: 1: 1 YUV, and YUV9 Coding Luminance (Y): brightness sampling frequency 13.5 MHz Chrominance

More information

TSKS01 Digital Communication Lecture 1

TSKS01 Digital Communication Lecture 1 TSKS01 Digital Communication Lecture 1 Introduction, Repetition, Channels as Filters, Complex-baseband representation Emil Björnson Department of Electrical Engineering (ISY) Division of Communication

More information

On-Mote Compressive Sampling in Wireless Seismic Sensor Networks

On-Mote Compressive Sampling in Wireless Seismic Sensor Networks On-Mote Compressive Sampling in Wireless Seismic Sensor Networks Marc J. Rubin Computer Science Ph.D. Candidate Department of Electrical Engineering and Computer Science Colorado School of Mines mrubin@mines.edu

More information

Toward Non-stationary Blind Image Deblurring: Models and Techniques

Toward Non-stationary Blind Image Deblurring: Models and Techniques Toward Non-stationary Blind Image Deblurring: Models and Techniques Ji, Hui Department of Mathematics National University of Singapore NUS, 30-May-2017 Outline of the talk Non-stationary Image blurring

More information

Jamming Wireless Networks: Attack and Defense Strategies

Jamming Wireless Networks: Attack and Defense Strategies Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models

More information

Performance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network

Performance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network American Journal of Applied Sciences Original Research Paper Performance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network Parnasree Chakraborty and C. Tharini Department

More information

2.4GHz vs. Sub-GHz Markets, Applications & Key Decisions

2.4GHz vs. Sub-GHz Markets, Applications & Key Decisions www.silabs.com 2.4GHz vs. Sub-GHz Markets, Applications & Key Decisions Overview Many customers are trying to decide between 2.4 GHz or sub-ghz This presentation will define the key factors impacting a

More information

Compressed Meter Reading for Delay-sensitive and Secure Load Report in Smart Grid

Compressed Meter Reading for Delay-sensitive and Secure Load Report in Smart Grid Compressed Meter Reading for Delay-sensitive Secure Load Report in Smart Grid Husheng Li, Rukun Mao, Lifeng Lai Robert. C. Qiu Abstract It is a key task in smart grid to send the readings of smart meters

More information

From network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA

From network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA From network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA Chadi.Barakat@inria.fr www-sop.inria.fr/members/chadi.barakat/ Joint work with D. Saucez,

More information

Non-uniform Compressive Sensing in Wireless Sensor Networks: Feasibility and Application

Non-uniform Compressive Sensing in Wireless Sensor Networks: Feasibility and Application Non-uniform Compressive Sensing in Wireless Sensor Networks: Feasibility and Application Yiran Shen #, Wen Hu, Rajib Rana, Chun Tung Chou # CSIRO ICT centre, Australia {wen.hu,rajib.rana}@csiro.au # School

More information

K-RLE : A new Data Compression Algorithm for Wireless Sensor Network

K-RLE : A new Data Compression Algorithm for Wireless Sensor Network K-RLE : A new Data Compression Algorithm for Wireless Sensor Network Eugène Pamba Capo-Chichi, Hervé Guyennet Laboratory of Computer Science - LIFC University of Franche Comté Besançon, France {mpamba,

More information

An Introduction to Compressive Sensing and its Applications

An Introduction to Compressive Sensing and its Applications International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 An Introduction to Compressive Sensing and its Applications Pooja C. Nahar *, Dr. Mahesh T. Kolte ** * Department

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Volcanic Earthquake Timing Using Wireless Sensor Networks

Volcanic Earthquake Timing Using Wireless Sensor Networks Volcanic Earthquake Timing Using Wireless Sensor Networks Guojin Liu,, Rui Tan,, Ruogu Zhou, Guoliang Xing, Wen-Zhan Song, Jonathan M. Lees College of Communication Engineering, Chongqing University, P.R.

More information

Compressive Sampling with R: A Tutorial

Compressive Sampling with R: A Tutorial 1/15 Mehmet Süzen msuzen@mango-solutions.com data analysis that delivers 15 JUNE 2011 2/15 Plan Analog-to-Digital conversion: Shannon-Nyquist Rate Medical Imaging to One Pixel Camera Compressive Sampling

More information

WAVELET-BASED COMPRESSED SPECTRUM SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS. Hilmi E. Egilmez and Antonio Ortega

WAVELET-BASED COMPRESSED SPECTRUM SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS. Hilmi E. Egilmez and Antonio Ortega WAVELET-BASED COPRESSED SPECTRU SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS Hilmi E. Egilmez and Antonio Ortega Signal & Image Processing Institute, University of Southern California, Los Angeles, CA,

More information

COMPRESSIVE SENSING BASED ECG MONITORING WITH EFFECTIVE AF DETECTION. Hung Chi Kuo, Yu Min Lin and An Yeu (Andy) Wu

COMPRESSIVE SENSING BASED ECG MONITORING WITH EFFECTIVE AF DETECTION. Hung Chi Kuo, Yu Min Lin and An Yeu (Andy) Wu COMPRESSIVESESIGBASEDMOITORIGWITHEFFECTIVEDETECTIO Hung ChiKuo,Yu MinLinandAn Yeu(Andy)Wu Graduate Institute of Electronics Engineering, ational Taiwan University, Taipei, 06, Taiwan, R.O.C. {charleykuo,

More information

Resource Allocation in a Cognitive Digital Home

Resource Allocation in a Cognitive Digital Home Resource Allocation in a Cognitive Digital Home Tianming Li, Narayan B. Mandayam@ Alex Reznik@InterDigital Inc. Outline Wireless Home Networks A Cognitive Digital Home Joint Channel and Radio Access Technology

More information

Cooperative Compressed Sensing for Decentralized Networks

Cooperative Compressed Sensing for Decentralized Networks Cooperative Compressed Sensing for Decentralized Networks Zhi (Gerry) Tian Dept. of ECE, Michigan Tech Univ. A presentation at ztian@mtu.edu February 18, 2011 Ground-Breaking Recent Advances (a1) s is

More information

Scaling Network- based Spectrum Analyzer with Constant Communica<on Cost

Scaling Network- based Spectrum Analyzer with Constant Communica<on Cost Scaling Network- based Spectrum Analyzer with Constant Communica

More information

Information Hiding: Steganography & Steganalysis

Information Hiding: Steganography & Steganalysis Information Hiding: Steganography & Steganalysis 1 Steganography ( covered writing ) From Herodotus to Thatcher. Messages should be undetectable. Messages concealed in media files. Perceptually insignificant

More information

Empirical Rate-Distortion Study of Compressive Sensing-based Joint Source-Channel Coding

Empirical Rate-Distortion Study of Compressive Sensing-based Joint Source-Channel Coding Empirical -Distortion Study of Compressive Sensing-based Joint Source-Channel Coding Muriel L. Rambeloarison, Soheil Feizi, Georgios Angelopoulos, and Muriel Médard Research Laboratory of Electronics Massachusetts

More information

Rate-Adaptive Compressed-Sensing and Sparsity Variance of Biomedical Signals

Rate-Adaptive Compressed-Sensing and Sparsity Variance of Biomedical Signals Rate-Adaptive Compressed- and Sparsity Variance of Biomedical Signals Vahid Behravan, Neil E. Glover, Rutger Farry, Patrick Y. Chiang Oregon State University Corvallis, OR, USA {behravav,gloverne,farryr,pchiang}@onid.oregonstate.edu

More information

Chapter 9 Image Compression Standards

Chapter 9 Image Compression Standards Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how

More information

Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. Praveen Vadnala

Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. Praveen Vadnala Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers Praveen Vadnala Differential Power Analysis Implementations of cryptographic systems leak Leaks from bit 1 and bit 0 are

More information

Sensors & Transducers 2015 by IFSA Publishing, S. L.

Sensors & Transducers 2015 by IFSA Publishing, S. L. Sensors & Transducers 5 by IFSA Publishing, S. L. http://www.sensorsportal.com Low Energy Lossless Image Compression Algorithm for Wireless Sensor Network (LE-LICA) Amr M. Kishk, Nagy W. Messiha, Nawal

More information

Templates and Image Pyramids

Templates and Image Pyramids Templates and Image Pyramids 09/06/11 Computational Photography Derek Hoiem, University of Illinois Project 1 Due Monday at 11:59pm Options for displaying results Web interface or redirect (http://www.pa.msu.edu/services/computing/faq/autoredirect.html)

More information

Imaging with Wireless Sensor Networks

Imaging with Wireless Sensor Networks Imaging with Wireless Sensor Networks Rob Nowak Waheed Bajwa, Jarvis Haupt, Akbar Sayeed Supported by the NSF What is a Wireless Sensor Network? Comm between army units was crucial Signal towers built

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

General MIMO Framework for Multipath Exploitation in Through-the-Wall Radar Imaging

General MIMO Framework for Multipath Exploitation in Through-the-Wall Radar Imaging General MIMO Framework for Multipath Exploitation in Through-the-Wall Radar Imaging Michael Leigsnering, Technische Universität Darmstadt Fauzia Ahmad, Villanova University Moeness G. Amin, Villanova University

More information

Templates and Image Pyramids

Templates and Image Pyramids Templates and Image Pyramids 09/07/17 Computational Photography Derek Hoiem, University of Illinois Why does a lower resolution image still make sense to us? What do we lose? Image: http://www.flickr.com/photos/igorms/136916757/

More information

Robust Location Distinction Using Temporal Link Signatures

Robust Location Distinction Using Temporal Link Signatures Robust Location Distinction Using Temporal Link Signatures Neal Patwari Sneha Kasera Department of Electrical and Computer Engineering What is location distinction? Ability to know when a transmitter has

More information

SPEECH COMPRESSION USING WAVELETS

SPEECH COMPRESSION USING WAVELETS SPEECH COMPRESSION USING WAVELETS HATEM ELAYDI Electrical & Computer Engineering Department Islamic University of Gaza Gaza, Palestine helaydi@mail.iugaza.edu MUSTAFA I. JABER Electrical & Computer Engineering

More information

An Energy Efficient Compressed Sensing Framework for the Compression of Electroencephalogram Signals

An Energy Efficient Compressed Sensing Framework for the Compression of Electroencephalogram Signals Sensors 2014, 14, 1474-1496; doi:10.3390/s140101474 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article An Energy Efficient Compressed Sensing Framework for the Compression of Electroencephalogram

More information

Bayesian Positioning in Wireless Networks using Angle of Arrival

Bayesian Positioning in Wireless Networks using Angle of Arrival Bayesian Positioning in Wireless Networks using Angle of Arrival Presented by: Rich Martin Joint work with: David Madigan, Eiman Elnahrawy, Wen-Hua Ju, P. Krishnan, A.S. Krishnakumar Rutgers University

More information

ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals

ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals ProxiMate : Proximity Based Secure Pairing using Ambient Wireless Signals Suhas Mathur AT&T Security Research Group Rob Miller, Alex Varshavsky, Wade Trappe, Narayan Madayam Suhas Mathur (AT&T) firstname

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Commutative reversible data hiding and encryption

Commutative reversible data hiding and encryption SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication

More information

Sensor network: storage and query. Overview. TAG Introduction. Overview. Device Capabilities

Sensor network: storage and query. Overview. TAG Introduction. Overview. Device Capabilities Sensor network: storage and query TAG: A Tiny Aggregation Service for Ad- Hoc Sensor Networks Samuel Madden UC Berkeley with Michael Franklin, Joseph Hellerstein, and Wei Hong Z. Morley Mao, Winter Slides

More information

Energy-Effective Communication Based on Compressed Sensing

Energy-Effective Communication Based on Compressed Sensing American Journal of etworks and Communications 2016; 5(6): 121-127 http://www.sciencepublishinggroup.com//anc doi: 10.11648/.anc.20160506.11 ISS: 2326-893X (Print); ISS: 2326-8964 (Online) Energy-Effective

More information

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005 Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.

More information

Improved Compressive Sensing of Natural Scenes Using Localized Random Sampling

Improved Compressive Sensing of Natural Scenes Using Localized Random Sampling Improved Compressive Sensing of Natural Scenes Using Localized Random Sampling Victor J. Barranca 1, Gregor Kovačič 2 Douglas Zhou 3, David Cai 3,4,5 1 Department of Mathematics and Statistics, Swarthmore

More information

College of Engineering

College of Engineering WiFi and WCDMA Network Design Robert Akl, D.Sc. College of Engineering Department of Computer Science and Engineering Outline WiFi Access point selection Traffic balancing Multi-Cell WCDMA with Multiple

More information

Evaluation of On-chip Decoupling Capacitor s Effect on AES Cryptographic Circuit

Evaluation of On-chip Decoupling Capacitor s Effect on AES Cryptographic Circuit R1-3 SASIMI 2013 Proceedings Evaluation of On-chip Decoupling Capacitor s Effect on AES Cryptographic Circuit Tsunato Nakai Mitsuru Shiozaki Takaya Kubota Takeshi Fujino Graduate School of Science and

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

INDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS

INDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS INDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS Dimitris Milioris,3,4, George Tzagkarakis 5, Philippe Jacquet 4 and Panagiotis Tsakalides, Department of Computer

More information

Sparsity-Driven Feature-Enhanced Imaging

Sparsity-Driven Feature-Enhanced Imaging Sparsity-Driven Feature-Enhanced Imaging Müjdat Çetin mcetin@mit.edu Faculty of Engineering and Natural Sciences, Sabancõ University, İstanbul, Turkey Laboratory for Information and Decision Systems, Massachusetts

More information

WIRELESS Sensor Networks (WSN) has attracted interests

WIRELESS Sensor Networks (WSN) has attracted interests 2016 IEEE First International Conference on Internet-of-Things Design and Implementation On the Implementation of Compressive Sensing on Wireless Sensor Network Dong-Yu Cao, Kai Yu, Shu-Guo Zhuo, Yu-Hen

More information

ECE5713 : Advanced Digital Communications

ECE5713 : Advanced Digital Communications ECE5713 : Advanced Digital Communications Bandpass Modulation MPSK MASK, OOK MFSK 04-May-15 Advanced Digital Communications, Spring-2015, Week-8 1 In-phase and Quadrature (I&Q) Representation Any bandpass

More information

Data Compression via Logic Synthesis

Data Compression via Logic Synthesis Data Compression via Logic Synthesis Luca Amarú 1, Pierre-Emmanuel Gaillardon 1, Andreas Burg 2, Giovanni De Micheli 1 Integrated Systems Laboratory (LSI), EPFL, Switzerland 1 Telecommunication Circuits

More information

Autonomous Self-deployment of Wireless Access Networks in an Airport Environment *

Autonomous Self-deployment of Wireless Access Networks in an Airport Environment * Autonomous Self-deployment of Wireless Access Networks in an Airport Environment * Holger Claussen Bell Labs Research, Swindon, UK. * This work was part-supported by the EU Commission through the IST FP5

More information

Ch. 3: Image Compression Multimedia Systems

Ch. 3: Image Compression Multimedia Systems 4/24/213 Ch. 3: Image Compression Multimedia Systems Prof. Ben Lee (modified by Prof. Nguyen) Oregon State University School of Electrical Engineering and Computer Science Outline Introduction JPEG Standard

More information

Module 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains:

Module 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains: The Lecture Contains: The Need for Video Coding Elements of a Video Coding System Elements of Information Theory Symbol Encoding Run-Length Encoding Entropy Encoding file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2040/40_1.htm[12/31/2015

More information

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad - 500 043 ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK Course Title Course Code Class Branch DIGITAL IMAGE PROCESSING A70436 IV B. Tech.

More information

Application of Discrete Wavelet Transform for Compressing Medical Image

Application of Discrete Wavelet Transform for Compressing Medical Image Application of Discrete Wavelet Transform for Compressing Medical 1 Ibrahim Abdulai Sawaneh, 2 Joshua Hamid Koroma, 3 Abu Koroma 1, 2, 3 Department of Computer Science: Institute of Advanced Management

More information

The Strengths and Weaknesses of Different Image Compression Methods. Samuel Teare and Brady Jacobson

The Strengths and Weaknesses of Different Image Compression Methods. Samuel Teare and Brady Jacobson The Strengths and Weaknesses of Different Image Compression Methods Samuel Teare and Brady Jacobson Lossy vs Lossless Lossy compression reduces a file size by permanently removing parts of the data that

More information

A Practical Approach to Landmark Deployment for Indoor Localization

A Practical Approach to Landmark Deployment for Indoor Localization A Practical Approach to Landmark Deployment for Indoor Localization Yingying Chen, John-Austen Francisco, Wade Trappe, and Richard P. Martin Dept. of Computer Science Wireless Information Network Laboratory

More information

Finding the key in the haystack

Finding the key in the haystack A practical guide to Differential Power hunz Zn000h AT gmail.com December 30, 2009 Introduction Setup Procedure Tunable parameters What s DPA? side channel attack introduced by Paul Kocher et al. 1998

More information

Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information

Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information 1992 2008 R. C. Gonzalez & R. E. Woods For the image in Fig. 8.1(a): 1992 2008 R. C. Gonzalez & R. E. Woods Measuring

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

EE3723 : Digital Communications

EE3723 : Digital Communications EE3723 : Digital Communications Week 8-9: Bandpass Modulation MPSK MASK, OOK MFSK 04-May-15 Muhammad Ali Jinnah University, Islamabad - Digital Communications - EE3723 1 In-phase and Quadrature (I&Q) Representation

More information

Camera Image Processing Pipeline: Part II

Camera Image Processing Pipeline: Part II Lecture 13: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements

More information

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique Wen-Yuan Chen, Jen-Tin Lin, Chi-Yuan Lin, and Jin-Rung Liu Department of Electronic Engineering, National Chin-Yi Institute of Technology,

More information

Satellite Communications: Part 4 Signal Distortions & Errors and their Relation to Communication Channel Specifications. Howard Hausman April 1, 2010

Satellite Communications: Part 4 Signal Distortions & Errors and their Relation to Communication Channel Specifications. Howard Hausman April 1, 2010 Satellite Communications: Part 4 Signal Distortions & Errors and their Relation to Communication Channel Specifications Howard Hausman April 1, 2010 Satellite Communications: Part 4 Signal Distortions

More information

Deformation Monitoring Based on Wireless Sensor Networks

Deformation Monitoring Based on Wireless Sensor Networks Deformation Monitoring Based on Wireless Sensor Networks Zhou Jianguo tinyos@whu.edu.cn 2 3 4 Data Acquisition Vibration Data Processing Summary 2 3 4 Data Acquisition Vibration Data Processing Summary

More information

Compressive Sensing based Asynchronous Random Access for Wireless Networks

Compressive Sensing based Asynchronous Random Access for Wireless Networks Compressive Sensing based Asynchronous Random Access for Wireless Networks Vahid Shah-Mansouri, Suyang Duan, Ling-Hua Chang, Vincent W.S. Wong, and Jwo-Yuh Wu Department of Electrical and Computer Engineering,

More information

COMPRESSING LIDAR WAVEFORM DATA

COMPRESSING LIDAR WAVEFORM DATA COMPRESSING LIDAR WAVEFORM DATA Sandor Laky 1,2, Piroska Zaletnyik 1,2, Charles Toth 1 1 Budapest University of Technology and Economics, HAS-BME Research Group for Physical Geodesy and Geodynamics, Muegyetem

More information

Anna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester

Anna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester www.vidyarthiplus.com Anna University, Chennai B.E./B.TECH DEGREE EXAMINATION, MAY/JUNE 2013 Seventh Semester Electronics and Communication Engineering EC 2029 / EC 708 DIGITAL IMAGE PROCESSING (Regulation

More information

Speech Compression Using Wavelet Transform

Speech Compression Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. VI (May - June 2017), PP 33-41 www.iosrjournals.org Speech Compression Using Wavelet Transform

More information

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering

More information

Applied to Wireless Sensor Networks. Objectives

Applied to Wireless Sensor Networks. Objectives Communication Theory as Applied to Wireless Sensor Networks muse Objectives Understand the constraints of WSN and how communication theory choices are influenced by them Understand the choice of digital

More information

Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep.

Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep. 978-1-4673-2451-9/12/$31.00 2012 IEEE 201 CPA Performance Comparison based on Wavelet Transform Aesun Park Department of Mathematics Kookmin University Seoul, Korea Rep. aesons@kookmin.ac.kr Dong-Guk Han

More information

COMPRESSIVE SENSING IN WIRELESS COMMUNICATIONS

COMPRESSIVE SENSING IN WIRELESS COMMUNICATIONS COMPRESSIVE SENSING IN WIRELESS COMMUNICATIONS A Dissertation Presented to the Faculty of the Electrical and Computer Engineering Department University of Houston in Partial Fulfillment of the Requirements

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS Puneetha R 1, Dr.S.Akhila 2 1 M. Tech in Digital Communication B M S College Of Engineering Karnataka, India 2 Professor Department of

More information

Compact VNA - TR1300/1

Compact VNA - TR1300/1 Compact VNA - TR1300/1 TM Extended Specifications Frequency range: 300 khz - 1.3 GHz Wide output power adjustment range: -55 dbm to +3 dbm Dynamic range: 135 db (10 Hz IF bandwidth) typ. Measurement time

More information

AirMagnet Spectrum XT

AirMagnet Spectrum XT AirMagnet Spectrum XT AirMagnet Spectrum XT is the industry s first professional spectrum analyzer solution that combines in-depth RF analysis with real-time WLAN information for quicker and more accurate

More information

Harvesting a Clock from a GSM Signal for the Wake-Up of a Wireless Sensor Network

Harvesting a Clock from a GSM Signal for the Wake-Up of a Wireless Sensor Network Harvesting a Clock from a GSM Signal for the Wake-Up of a Wireless Sensor Network Jonathan K. Brown and David D. Wentzloff University of Michigan Ann Arbor, MI, USA ISCAS 2010 Acknowledgment: This material

More information

Compressive sensing in wireless sensor network for poultry acoustic monitoring

Compressive sensing in wireless sensor network for poultry acoustic monitoring 94 March, 2017 Int J Agric & Biol Eng Open Access at https://www.ijabe.org Vol. 10 o.2 Compressive sensing in wireless sensor network for poultry acoustic monitoring Xuan Chuanzhong 1, Wu Pei 1*, Zhang

More information

Smart Metering Communication Network Need, Selection and Comparison

Smart Metering Communication Network Need, Selection and Comparison Smart Metering Communication Network Need, Selection and Comparison 1 Communication Technology for Smart Metering- Parameters for Selection Reliability and robustness Performance to meet SLA targets Cost

More information

A Practical Method to Achieve Perfect Secrecy

A Practical Method to Achieve Perfect Secrecy A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary

More information

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs Objective Evaluation of Edge Blur and Artefacts: Application to JPEG and JPEG 2 Image Codecs G. A. D. Punchihewa, D. G. Bailey, and R. M. Hodgson Institute of Information Sciences and Technology, Massey

More information

Optimization Techniques for Alphabet-Constrained Signal Design

Optimization Techniques for Alphabet-Constrained Signal Design Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques

More information

Novel Methods for Microscopic Image Processing, Analysis, Classification and Compression

Novel Methods for Microscopic Image Processing, Analysis, Classification and Compression Novel Methods for Microscopic Image Processing, Analysis, Classification and Compression Ph.D. Defense by Alexander Suhre Supervisor: Prof. A. Enis Çetin March 11, 2013 Outline Storage Analysis Image Acquisition

More information

arxiv: v1 [cs.it] 5 Jun 2016

arxiv: v1 [cs.it] 5 Jun 2016 AN ENERGY-EFFICIENT COMPRESSIVE SENSING FRAMEWORK INCORPORATING ONLINE DICTIONARY LEARNING FOR LONG-TERM WIRELESS HEALTH MONITORING Kai XU, Yixing Li, Fengbo Ren Parallel Systems and Computing Laboratory

More information

The Mote Revolution: Low Power Wireless Sensor Network Devices

The Mote Revolution: Low Power Wireless Sensor Network Devices The Mote Revolution: Low Power Wireless Sensor Network Devices University of California, Berkeley Joseph Polastre Robert Szewczyk Cory Sharp David Culler The Mote Revolution: Low Power Wireless Sensor

More information

SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES

SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES Dr. Ertan Atar Türk Telekom İstanbul-I Area Offices İstanbul, Turkey ertan.atar@turktelekom.com.tr Prof. Dr. Okan K. Ersoy

More information

Array-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks

Array-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks Proceedings of the IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada July 2005 Array-Transmission Based Physical-Layer Security Techniques For Wireless Sensor Networks Xiaohua(Edward)

More information

Physical Layer. Networked Systems (H) Lecture 3

Physical Layer. Networked Systems (H) Lecture 3 Physical Layer Networked Systems (H) Lecture 3 This work is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/4.0/

More information

Camera Image Processing Pipeline: Part II

Camera Image Processing Pipeline: Part II Lecture 14: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements

More information

Research Article A Robust Zero-Watermarking Algorithm for Audio

Research Article A Robust Zero-Watermarking Algorithm for Audio Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 453580, 7 pages doi:10.1155/2008/453580 Research Article A Robust Zero-Watermarking Algorithm for

More information

Antennas and Propagation. Chapter 6d: Diversity Techniques and Spatial Multiplexing

Antennas and Propagation. Chapter 6d: Diversity Techniques and Spatial Multiplexing Antennas and Propagation d: Diversity Techniques and Spatial Multiplexing Introduction: Diversity Diversity Use (or introduce) redundancy in the communications system Improve (short time) link reliability

More information