ABSTRACT
The flickering lights of content playing on TV screens in our living rooms are an all too familiar sight at night --- and one that many of us have paid little attention to with regards to the amount of information these diffusions may leak to an inquisitive outsider. In this paper, we introduce an attack that exploits the emanations of changes in light (e.g., as seen through the windows and recorded over 70 meters away) to reveal the programs we watch. Our empirical results show that the attack is surprisingly robust to a variety of noise signals that occur in real-world situations, and moreover, can successfully identify the content being watched among a reference library of tens of thousands of videos within several seconds. The robustness and efficiency of the attack can be attributed to the use of novel feature sets and an elegant online algorithm for performing index-based matches.
- M. Backes, M. Durmuth, and D. Unruh. Compromising reflections-or-how to read LCD monitors around the corner. In Proceedings of the IEEE Symposium on Security and Privacy, 2008. Google ScholarDigital Library
- J. L. Bentley. Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9): 509--517, 1975. Google ScholarDigital Library
- A. Buades, B. Coll, and J.-M. Morel. A review of image denoising algorithms, with a new one. Multiscale Modeling & Simulation, 4(2):490--530, 2005.Google ScholarCross Ref
- M. Enev, S. Gupta, T. Kohno, and S. N. Patel. Televisions, video privacy, and powerline electromagnetic interference. In Proceedings of the 18th ACM conference on Computer and communications security, pages 537--550. ACM, 2011. Google ScholarDigital Library
- C. Faloutsos, M. Ranganathan, and Y. Manolopoulos. Fast subsequence matching in time-series databases. ACM International Conference on Management of Data (SIGMOD), 23(2), 1994. Google ScholarDigital Library
- D. Gomery. As the dial turns. The Wilson Quarterly, pages 41--46, 1993.Google Scholar
- U. Greveler, B. Justus, and D. Loehr. Multimedia content identification through smart meter power usage profiles. Computers, Privacy and Data Protection, 2012.Google Scholar
- G. E. Healey and R. Kondepudy. Radiometric ccd camera calibration and noise estimation. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 16(3):267--276, 1994. Google ScholarDigital Library
- M. G. Kuhn. Compromising emanations of lcd tv sets. Electromagnetic Compatibility, IEEE Transactions on, 55(3): 564--570, 2013.Google Scholar
- B. Langmead, C. Trapnell, M. Pop, S. L. Salzberg, et al. Ultrafast and memory-efficient alignment of short dna sequences to the human genome. Genome Biol, 10(3):R25, 2009.Google ScholarCross Ref
- J. Liu, Z. Huang, H. Cai, H. T. Shen, C. W. Ngo, and W. Wang. Near-duplicate video retrieval: Current research and future trends. ACM Computing Surveys (CSUR), 45(4): 44, 2013. Google ScholarDigital Library
- Y.-S. Moon, K.-Y. Whang, and W.-S. Han. General match: a subsequence matching method in time-series databases based on generalized windows. In Proceedings of the 2002 ACM SIGMOD international conference on Management of data, pages 382--393. ACM, 2002. Google ScholarDigital Library
- R. Raguram, A. M. White, Y. Xu, J.-M. Frahm, P. Georgel, and F. Monrose. On the privacy risks of virtual keyboards: automatic reconstruction of typed input from compromising reflections. Dependable and Secure Computing, IEEE Transactions on, 10(3):154--167, 2013. Google ScholarDigital Library
- A. Torralba and W. T. Freeman. Accidental pinhole and pinspeck cameras: revealing the scene outside the picture. In Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, pages 374--381. IEEE, 2012. Google ScholarDigital Library
- Y. Tsin, V. Ramesh, and T. Kanade. Statistical calibration of ccd imaging process. In Computer Vision, 2001. ICCV 2001. Proceedings. Eighth IEEE International Conference on, volume 1, pages 480--487. IEEE, 2001.Google ScholarCross Ref
- B. Widrow and I. Kollár. Quantization noise: roundoff error in digital computation, signal processing, control, and communications. Cambridge University Press, 2008. Google ScholarDigital Library
- Y. Xu, J. Heinly, A. M. White, F. Monrose, and J.-M. Frahm. Seeing double: reconstructing obscured typed input from repeated compromising reflections. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 1063--1074. ACM, 2013. Google ScholarDigital Library
- L. Zhang and Y. Rui. Image search--from thousands to billions in 20 years. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 9(1s):36, 2013. Google ScholarDigital Library
Index Terms
- Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions
Recommendations
A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes
Information HidingThe security problem of screen image leakage on a cathode-ray tube (CRT) through electromagnetic radiation from several meters away, "transient electro-magnetic pulse emission surveillance technology" (TEMPEST), has attracted wide interest by security ...
Watching the TV Watchers
Studies have linked excessive TV watching to obesity in adults and children. In addition, TV content represents an important source of visual exposure to cues which can effect a broad set of health-related behaviors. This paper presents a ubiquitous ...
Watching Video over the Web: Part 1: Streaming Protocols
The average US consumer watches TV for almost five hours a day. While the majority of viewed content is still broadcast TV programming, the share of the time-shifted content is on the rise. One-third of US viewers currently use a digital video recorder ...
Comments