Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations

Published: 11 January 2023 Publication History

Abstract

Hidden cameras in sensitive locations have become an increasing threat to personal privacy all over the world. Because the camera is small and camouflaged, it is difficult to detect the presence of the camera with naked eyes. Existing works on this subject have either only covered using wireless transmission to detect cameras, or using other methods which are cumbersome in practical use. In this paper, we introduce a new direction that leverages the unintentional electromagnetic (EM) emanations of the camera to detect it. We first find that the digital output of the camera's image sensor will be amplitude-modulated to the EM emanations of the camera's clock. Thus, changes in the scope of the camera will directly cause changes in the camera's EM emanations, which constitutes a unique characteristic for a hidden camera. Based on this, we propose a novel camera detection system named CamRadar, which can filter out potential camera EM emanations from numerous EM signals quickly and achieve accurate hidden camera detection. Benefitting from the camera's EM emanations, CamRadar will not be limited by the camera transmission types or the detection angle. Our extensive real-world experiments using CamRadar and 19 hidden cameras show that CamRadar achieves a fast detection (in 16.75s) with a detection rate of 93.23% as well as a low false positive rate of 3.95%.

References

[1]
Mosabbah Mushir Ahmed, David Hely, Nicolas Barbot, Romain Siragusa, Etienne Perret, Maxime Bernier, and Fredric Garet. 2017. Radiated electromagnetic emission for integrated circuit authentication. IEEE Microwave and Wireless Components Letters 27, 11 (2017), 1028--1030.
[2]
Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, and Milos Prvulovic. 2018. One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded {RSA}. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 585--602.
[3]
Amazon. 2022. hidden cameras. https://tinyurl.com/83h9hkes
[4]
Ardalan Amiri Sani, Lin Zhong, and Ashutosh Sabharwal. 2010. Directional antenna diversity for mobile devices: Characterizations and solutions. In Proceedings of the sixteenth annual international conference on Mobile computing and networking. 221--232.
[5]
ANI. 2021. China launches fresh crackdown on spy cameras in a bid to tighten digital privacy laws. https://tinyurl.com/ya95r4k2.
[6]
Bruce Archambeault, Colin Brench, and Sam Connor. 2010. Review of printed-circuit-board level EMI/EMC issues and tools. IEEE Transactions on Electromagnetic compatibility 52, 2 (2010), 455--461.
[7]
Laura Bicker. 2021. 'I was humiliated': The continuing trauma of South Korea's spy cam victims. https://tinyurl.com/bdcmk4vr.
[8]
Gabrielle Burkhart. 2021. New Mexico police chief investigated for hidden camera in office vent. https://tinyurl.com/bdhded3v.
[9]
Robert Callan, Alenka Zajić, and Milos Prvulovic. 2015. FASE: Finding amplitude-modulated side-channel emanations. In 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA). IEEE, 592--603.
[10]
Giovanni Camurati, Aurélien Francillon, and François-Xavier Standaert. 2020. Understanding screaming channels: From a detailed analysis to improved attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems (2020), 358--401.
[11]
Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, and Aurélien Francillon. 2018. Screaming channels: When electromagnetic side channels meet radio transceivers. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 163--177.
[12]
Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. 2018. Dewicam: Detecting hidden wireless cameras via smartphones. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security. 1--13.
[13]
Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, and Yi-Chao Chen. 2019. Demicpu: Device fingerprinting with magnetic signals radiated by cpu. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1149--1170.
[14]
DFROBOT. 2022. LattePanda Alpha 864s. https://www.dfrobot.com/product-1728.html.
[15]
Lawrence J Fennelly. 2016. Effective physical security. Butterworth-Heinemann.
[16]
Julia Fink, Valérie Bauwens, Frédéric Kaplan, and Pierre Dillenbourg. 2013. Living with a vacuum cleaning robot. International Journal of Social Robotics 5, 3 (2013), 389--408.
[17]
Lorenzo Giambagli, Lorenzo Buffoni, Timoteo Carletti, Walter Nocentini, and Duccio Fanelli. 2021. Machine learning in spectral domain. Nature communications 12, 1 (2021), 1--9.
[18]
Hüseyin Göksu, Donald C Wunsch, Xiaopeng Dong, Ali Kökce, and Daryl G Beetner. 2018. Detection and identification of vehicles based on their spark-free unintended electromagnetic emissions. IEEE Transactions on Electromagnetic Compatibility 60, 5 (2018), 1594--1597.
[19]
Mali Gong, Sifeng He, Rui Guo, and Wei Wang. 2016. Cat-eye effect reflected beam profiles of an optical system with sensor array. Applied Optics 55, 16 (2016), 4461--4466.
[20]
Manoj Gulati, Shobha Sundar Ram, and Amarjeet Singh. 2014. An in depth study into using EMI signatures for appliance identification. In Proceedings of the 1st ACM Conference on Embedded Systems for Energy-efficient Buildings. 70--79.
[21]
Sidhant Gupta, Matthew S Reynolds, and Shwetak N Patel. 2010. ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home. In Proceedings of the 12th ACM international conference on Ubiquitous computing. 139--148.
[22]
Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici. 2015. Gsmem: Data exfiltration from air-gapped computers over {GSM} frequencies. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 849--864.
[23]
Mordechai Guri, Matan Monitz, and Yuval Elovici. 2016. USBee: Air-gap covert-channel via electromagnetic emission from USB. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 264--268.
[24]
Yuichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, and Hideaki Sone. 2014. A threat for tablet pcs in public space: Remote visualization of screen images using em emanation. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 954--965.
[25]
Yu-ichi Hayashi, Naofumi Homma, Yohei Toriumi, Kazuhiro Takaya, and Takafumi Aoki. 2016. Remote visualization of screen images using a pseudo-antenna that blends into the mobile environment. IEEE Transactions on Electromagnetic Compatibility 59, 1 (2016), 24--33.
[26]
Yan He, Qiuye He, Song Fang, and Yao Liu. 2021. MotionCompass: pinpointing wireless camera via motion-activated traffic. In Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services. 215--227.
[27]
HOID. 2017. Create a Wireless Spy Camera Using a Raspberry Pi. https://tinyurl.com/yvv3ukh5.
[28]
Jiahao Huang, Haiyang Zhang, Lin Wang, Zilong Zhang, and Changming Zhao. 2021. Improved YOLOv3 Model for miniature camera detection. Optics & Laser Technology 142 (2021), 107133.
[29]
Wenqiang Jin, Srinivasan Murali, Huadi Zhu, and Ming Li. 2021. Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 700--714.
[30]
Haider Adnan Khan, Nader Sehatbakhsh, Luong N Nguyen, Milos Prvulovic, and Alenka Zajić. 2019. Malware detection in embedded systems using neural network model for electromagnetic side-channel signals. Journal of Hardware and Systems Security 3, 4 (2019), 305--318.
[31]
Brian Krebs. 2019. Hidden Cam Above Bluetooth Pump Skimmer. https://tinyurl.com/d5sm9p9v.
[32]
Gierad Laput, Chouchang Yang, Robert Xiao, Alanson Sample, and Chris Harrison. 2015. Em-sense: Touch recognition of uninstrumented, electrical and electromechanical objects. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. 157--166.
[33]
Ho Seong Lee, Dong Hoon Choi, Kyuhong Sim, and Jong-Gwan Yook. 2018. Information recovery using electromagnetic emanations from display devices under realistic environment. IEEE Transactions on Electromagnetic Compatibility 61, 4 (2018), 1098--1106.
[34]
ALTHEA LEGASPI. 2021. Audiotree Cofounder Accused of Using Hidden Cameras to Take Nude Images. https://tinyurl.com/yuvcy6ry.
[35]
Zhijing Li, Zhujun Xiao, Yanzi Zhu, Irene Pattarachanyakul, Ben Y Zhao, and Haitao Zheng. 2018. Adversarial localization against wireless cameras. In Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications. 87--92.
[36]
Chun Liu, Changming Zhao, Haiyang Zhang, Zilong Zhang, Zitao Cai, and Zhipeng Li. 2019. Spectrum classification using convolutional neural networks for a mini-camera detection system. Applied optics 58, 33 (2019), 9230--9239.
[37]
Chun Liu, Changming Zhao, Haiyang Zhang, Zilong Zhang, Yanwang Zhai, and Yali Zhang. 2019. Design of an Active Laser Mini-Camera Detection System Using CNN. IEEE Photonics Journal 11, 6 (2019), 1--12.
[38]
Zhuoran Liu, Niels Samwel, Léo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and Martha Larson. 2020. Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. arXiv preprint arXiv:2011.09877 (2020).
[39]
Marc J Loinaz, Kanwar Jit Singh, Andrew J Blanksby, David A Inglis, Kamran Azadet, and Bryan D Ackland. 1998. A 200-mW, 3.3-V, CMOS color camera IC producing 352/spl times/288 24-b video at 30 frames/s. IEEE Journal of Solid-State Circuits 33, 12 (1998), 2092--2103.
[40]
Lime Microsystems Ltd. 2020. LimeSDR. https://limemicro.com/products/boards/limesdr/.
[41]
Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, and Ahmad-Reza Sadeghi. 2020. Leakypick: Iot audio spy detector. In Annual Computer Security Applications Conference. 694--705.
[42]
NI. 2022. USRP B210. https://www.ettus.com/all-products/ub210-kit/.
[43]
The Associated Press. 2021. Seoul police arrest 4 over cameras hidden in entire motel. https://tinyurl.com/bdfxcrms.
[44]
Milos Prvulovic, Alenka Zajić, Robert L Callan, and Christopher J Wang. 2016. A method for finding frequency-modulated and amplitude-modulated electromagnetic emanations in computer systems. IEEE Transactions on Electromagnetic Compatibility 59, 1 (2016), 34--42.
[45]
reatscottgadgets.com. 2021. HackRF Product Line. https://greatscottgadgets.com/hackrf/.
[46]
Rebecca Salinas. 2021. Arrest made after plumber finds camera hidden in women's bathroom. https://tinyurl.com/bzuvudu9.
[47]
Muhammad Salman, Nguyen Dao, Uichin Lee, and Youngtae Noh. 2022. CSI: DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 2 (2022), 1--27.
[48]
Sriram Sami, Sean Rui Xiang Tan, Bangjie Sun, and Jun Han. 2021. LAPD: Hidden Spy Camera Detection using Smartphone Time-of-Flight Sensors. In Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems. 288--301.
[49]
Asanka Sayakkara, Nhien-An Le-Khac, and Mark Scanlon. 2019. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digital Investigation 29 (2019), 43--54.
[50]
Cheng Shen and Jun Huang. 2021. EarFisher: Detecting Wireless Eavesdroppers by Stimulating and Sensing Memory {EMR}. In 18th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 21). 873--886.
[51]
Cheng Shen, Tian Liu, Jun Huang, and Rui Tan. 2021. When LoRa meets EMR: Electromagnetic covert channels can be super resilient. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1304--1317.
[52]
Takeshi Shimmura, Ryosuke Ichikari, Takashi Okuma, Hiroyuki Ito, Kei Okada, and Tomomi Nonaka. 2020. Service robot introduction to a restaurant enhances both labor productivity and service quality. Procedia CIRP 88 (2020), 589--594.
[53]
Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. In 30th { USENIX} Security Symposium ({ USENIX} Security 21).
[54]
SpyGadgets. 2021. Hidden Cameras. https://tinyurl.com/2p9yuaxx.
[55]
MB Sruthi, M Abirami, Akhil Manikkoth, R Gandhiraj, and KP Soman. 2013. Low cost digital transceiver design for Software Defined Radio using RTL-SDR. In 2013 international mutli-conference on automation, computing, communication, control and compressed sensing (iMac4s). IEEE, 852--855.
[56]
TaoBao. 2022. cameras. https://tinyurl.com/29y6hvxp
[57]
CBSNewYork Team. 2021. Brooklyn Man Thomas Tamborski Accused Of Spying On Female Roommates With Hidden Cameras. https://tinyurl.com/2d4n2bsp.
[58]
IPVM Team. 2021. Frame Rate Guide for Video Surveillance. https://tinyurl.com/65v7m2cm.
[59]
technlicious. 2019. The Secrets to Finding Hidden Cameras.
[60]
ShareBrained Technology. 2022. portapack-hackrf. https://github.com/sharebrained/portapack-hackrf.
[61]
Frank T Werner, Baki Berkay Yilmaz, Milos Prvulovic, and Alenka Zajić. 2020. Leveraging em side-channels for recognizing components on a motherboard. IEEE Transactions on Electromagnetic Compatibility 63, 2 (2020), 502--515.
[62]
Wikipedia. 2021. Crystal oscillator frequencies. https://tinyurl.com/2p8whasc.
[63]
WIRED. 2021. The Best Smart Bulbs to Light Up Your Room. https://tinyurl.com/mvrc3dx9.
[64]
Kevin Wu and Brent Lagesse. 2019. Do you see what i see? detecting hidden streaming cameras through similarity of simultaneous observation. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom. IEEE, 1--10.
[65]
Chouchang Yang and Alanson P Sample. 2016. EM-ID: Tag-less identification of electrical devices via electromagnetic emissions. In 2016 IEEE International Conference on RFID (RFID). IEEE, 1--8.
[66]
Jie Yang, Jinfan Xu, Xiaolei Zhang, Chiyu Wu, Tao Lin, and Yibin Ying. 2019. Deep learning for vibrational spectral analysis: Recent progress and a practical guide. Analytica Chimica Acta 1081 (2019), 6--17.
[67]
Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, and Dennis Sylvester. 2017. Exploiting the analog properties of digital circuits for malicious hardware. Commun. ACM 60, 9 (2017), 83--91.
[68]
Juntao Yao, Zhedong Ma, Yanwen Lai, and Shuo Wang. 2021. A survey of modeling and reduction techniques of radiated EMI in power electronics. In 2021 IEEE International Joint EMC/SI/PI and EMC Europe Symposium. IEEE, 1081--1086.
[69]
Zhenkai Zhang, Zihao Zhan, Daniel Balasubramanian, Bo Li, Peter Volgyesi, and Xenofon Koutsoukos. 2020. Leveraging em side-channel information to detect rowhammer attacks. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 729--746.
[70]
Nan Zhao, Gershon Dublon, Nicholas Gillian, Artem Dementyev, and Joseph A Paradiso. 2015. EMI Spy: Harnessing electromagnetic interference for low-cost, rapid prototyping of proxemic interaction. In 2015 IEEE 12th International Conference on Wearable and Implantable Body Sensor Networks (BSN). IEEE, 1--6.
[71]
Agustin Zuniga, Naser Hossein Motlagh, Mohammad A Hoque, Sasu Tarkoma, Huber Flores, and Petteri Nurmi. 2022. See No Evil: Discovering Covert Surveillance Devices Using Thermal Imaging. IEEE Pervasive Computing (2022).
[72]
Hashir Zuniga. 2022. 12 Best Hidden Camera Detector Apps for Android and iOS. https://tinyurl.com/5n8wnne7.

Cited By

View all
  • (2024)Lipwatch: Enabling Silent Speech Recognition on Smartwatches using Acoustic SensingProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596148:2(1-29)Online publication date: 15-May-2024
  • (2024)CW-AcousLen: A Configurable Wideband Acoustic MetasurfaceProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661882(29-41)Online publication date: 3-Jun-2024
  • (2024)MetaFormerProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435508:1(1-27)Online publication date: 6-Mar-2024
  • Show More Cited By

Index Terms

  1. CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 6, Issue 4
    December 2022
    1534 pages
    EISSN:2474-9567
    DOI:10.1145/3580286
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 January 2023
    Published in IMWUT Volume 6, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Electromagnetic Emanation
    2. Electromagnetic Side-channels
    3. Hidden Camera Detection

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)274
    • Downloads (Last 6 weeks)28
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Lipwatch: Enabling Silent Speech Recognition on Smartwatches using Acoustic SensingProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596148:2(1-29)Online publication date: 15-May-2024
    • (2024)CW-AcousLen: A Configurable Wideband Acoustic MetasurfaceProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661882(29-41)Online publication date: 3-Jun-2024
    • (2024)MetaFormerProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435508:1(1-27)Online publication date: 6-Mar-2024
    • (2024)XRF55Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435438:1(1-34)Online publication date: 6-Mar-2024
    • (2024)LocCamsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314327:4(1-24)Online publication date: 12-Jan-2024
    • (2024)MuKI-Fi: Multi-Person Keystroke Inference With BFI-Enabled Wi-Fi SensingIEEE Transactions on Mobile Computing10.1109/TMC.2024.336833923:10(9835-9850)Online publication date: Oct-2024
    • (2024)CamShield: Tracing Electromagnetics to Steer Ultrasound Against Illegal CamerasIEEE Internet of Things Journal10.1109/JIOT.2024.342847511:20(33296-33311)Online publication date: 15-Oct-2024
    • (2024)MAG-JAM: Jamming Detection via Magnetic EmissionsComputer Security – ESORICS 202410.1007/978-3-031-70879-4_9(167-186)Online publication date: 5-Sep-2024
    • (2023)mmHSV: In-Air Handwritten Signature Verification via Millimeter-Wave RadarACM Transactions on Internet of Things10.1145/36144434:4(1-22)Online publication date: 22-Nov-2023
    • (2023)Enriching Social Sharing for the Dementia Community: Insights from In-Person and Online Social ProgramsACM Transactions on Accessible Computing10.1145/358255816:1(1-33)Online publication date: 29-Mar-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media