Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3460120.3484741acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

The Invisible Shadow: How Security Cameras Leak Private Activities

Published: 13 November 2021 Publication History

Abstract

This paper presents a new privacy threat, the Invisible Infrared Shadow Attack (IRSA), which leverages the inconspicuous infrared (IR) light emitted by indoor security cameras, to reveal in-home human activities behind opaque curtains. The key observation is that the in-home IR light source can project invisible shadows on the window curtains, which can be captured by an attacker outside using an IR-capable camera. The major challenge for IRSA lies in the shadow deformation caused by a variety of environmental factors involving the IR source position and curtain shape, which distorts the body contour. A two-stage attack scheme is proposed to circumvent the challenge. Specifically, a DeShaNet model performs accurate shadow keypoint detection through multi-dimension feature fusion. Then a scene constructor maps the 2D shadow keypoints to 3D human skeletons by iteratively reproducing the on-site shadow projection process in a virtual Unity 3D environment. Through comprehensive evaluation, we show that the proposed attack scheme can be successfully launched to recover 3D skeleton of the victims, even under severe shadow deformation. Finally, we propose potential defense mechanisms against the IRSA.

Supplementary Material

MP4 File (CCS21-fp086.mp4)
Presentation Video

References

[1]
Amazon. 2021 a. 360 AC1C camera. (2021). https://www.amazon.com/360-Security-Recognition-Detection-Activity/dp/B089W4PKRW/
[2]
Amazon. 2021 b. IR filter. (2021). https://www.amazon.com/gp/product/B015XMSWIQ/
[3]
Amazon. 2021 c. Top selling smart cameras on Amazon. https://www.amazon.com/s?k=smart+cameras$&$s=review-rank$&$qid=1625164398$&$ref=$sr_st_review-rank$. (2021).
[4]
Amazon. 2021 d. Voile curtain. (2021). https://www.amazon.com/gp/product/B0155EB71Q/
[5]
Amazon. 2021 e. Wyze camera. (2021). https://www.amazon.com/Wyze-Indoor-Wireless-Detection-Assistant/dp/B076H3SRXG/
[6]
Brekel. 2021. Brekel Body v2. (2021). https://brekel.com/body_v2/
[7]
Zhe Cao, Tomas Simon, Shih-En Wei, and Yaser Sheikh. 2017. Realtime multi-person 2d pose estimation using part affinity fields. In Proceedings of the IEEE conference on computer vision and pattern recognition. 7291--7299.
[8]
Yu Cheng, Bo Yang, Bo Wang, Wending Yan, and Robby T Tan. 2019. Occlusion-aware networks for 3d human pose estimation in video. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 723--732.
[9]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A Kientz. 2011. Living in a glass house: a survey of private moments in the home. In Proceedings of the 13th international conference on Ubiquitous computing. 41--44.
[10]
Rohit Girdhar. 2018. 3D Mask R-CNN. (2018). https://rohitgirdhar.github.io/DetectAndTrack/
[11]
Rohit Girdhar, Georgia Gkioxari, Lorenzo Torresani, Manohar Paluri, and Du Tran. 2018. Detect-and-track: Efficient pose estimation in videos. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 350--359.
[12]
Grandviewresearch. 2019. Window Covering Market Size. https://www.grandviewresearch.com/industry-analysis/window-covering-market. (2019).
[13]
Y. Hbali, S. Hbali, L. Ballihi, and M. Sadgal. 2017. Skeleton-based human activity recognition for elderly monitoring systems. IET Computer Vision, Vol. 12, 1 (2017), 16--26.
[14]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.
[15]
Yumi Iwashita, Adrian Stoica, and Ryo Kurazume. 2010. People identification using shadow dynamics. In IEEE International Conference on Image Processing.
[16]
JD. 2021. Top selling smart cameras on JD.COM. https://search.jd.com/Search?keyword=smartcamera. (2021).
[17]
Yunji Kim, Seonghyeon Nam, In Cho, and Seon Joo Kim. 2019. Unsupervised keypoint learning for guiding class-conditional video prediction. arXiv preprint arXiv:1910.02027 (2019).
[18]
Jia Li, Wen Su, and Zengfu Wang. 2020. Simple pose: Rethinking and improving a bottom-up approach for multi-person pose estimation. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 11354--11361.
[19]
Tianxing Li, Chuankai An, Zhao Tian, Andrew T Campbell, and Xia Zhou. 2015. Human sensing using visible light communication. Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. 331--344.
[20]
Tianxing Li, Xi Xiong, Yifei Xie, George Hito, Xing-Dong Yang, and Xia Zhou. 2017. Reconstructing hand poses using visible light. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 1, 3 (2017), 1--20.
[21]
Dushyant Mehta, Oleksandr Sotnychenko, Franziska Mueller, Weipeng Xu, Mohamed Elgharib, Pascal Fua, Hans-Peter Seidel, Helge Rhodin, Gerard Pons-Moll, and Christian Theobalt. 2020. XNect: Real-time multi-person 3D motion capture with a single RGB camera. ACM Transactions on Graphics (TOG), Vol. 39, 4 (2020), 82--1.
[22]
Microsoft. 2009. MSR Action 3D dataset. https://www.microsoft.com/en-us/download/details.aspx?id=52315. (2009).
[23]
Msn. 2020. Average house size around the world. https://www.msn.com/en-in/lifestyle/smart-living/how-big-is-the-average-house-size-around-the-world/ar-AAdKEhh. (2020).
[24]
Viet Nguyen, Mohamed Ibrahim, Siddharth Rupavatharam, Minitha Jawahar, Marco Gruteser, and Richard Howard. 2018. Eyelight: Light-and-shadow-based occupancy estimation and room activity recognition. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 351--359.
[25]
Obi. 2021. Obi cloth. (2021). https://assetstore.unity.com/packages/tools/physics/obi-cloth-81333
[26]
OpenCV. 2021. opencv contour. (2021). https://docs.opencv.org/master/dd/d49/tutorial_py_contour_features.html
[27]
Pytorch. 2020. Pytorch website. (2020). https://pytorch.org/
[28]
M.W. Rahman and M.L. Gavrilova. 2017. Kinect gait skeletal joint feature-based person identification. In IEEE International Conference on Cognitive Informatics $&$ Cognitive Computing.
[29]
Grand View Research. 2021. Smart Home Security Cameras Market Size. https://www.grandviewresearch.com/industry-analysis/smart-home-security-camera-market. (2021).
[30]
Worldpopulation review. 2021. World population. https://worldpopulationreview.com/. (2021).
[31]
Sriram Sami, Yimin Dai, Sean Rui Xiang Tan, Nirupam Roy, and Jun Han. 2020. Spying with your robot vacuum cleaner: eavesdropping via lidar sensors. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. 354--367.
[32]
Makoto Shinzaki, Yumi Iwashita, Ryo Kurazume, and Koichi Ogawara. 2015. Gait-Based Person Identification Method Using Shadow Biometrics for Robustness to Changes in the Walking Direction. In IEEE Winter Conference on Applications of Computer Vision.
[33]
Strategyanalytics. 2019. Smart home surveillance camera market forecast and analysis. https://www.strategyanalytics.com/access-services/devices/connected-home/smart-home/reports/report-detail/2019-smart-home-surveillance-camera-market-forecast-and-analysis. (2019).
[34]
Masanori Suganuma, Xing Liu, and Takayuki Okatani. 2019. Attention-based adaptive selection of operations for image restoration in the presence of unknown combined distortions. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 9039--9048.
[35]
Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. arXiv preprint arXiv:1409.3215 (2014).
[36]
Unity. 2021 a. PuppetMaster. (2021). https://assetstore.unity.com/packages/tools/physics/puppetmaster-48977
[37]
Unity. 2021 b. Unity 3D. (2021). https://unity.com/
[38]
Edward J Wang, William Li, Junyi Zhu, Rajneil Rana, and Shwetak N Patel. 2017. Noninvasive hemoglobin measurement using unmodified smartphone camera and white flash. In 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2333--2336.
[39]
Jifeng Wang, Xiang Li, and Jian Yang. 2018. Stacked conditional generative adversarial networks for jointly learning shadow detection and shadow removal. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1788--1797.
[40]
C. C. Wei, L. H. Tsai, H. P. Chou, and S. C. Chang. 2020. Person Identification by Walking Gesture Using Skeleton Sequences .Advanced Concepts for Intelligent Vision Systems.
[41]
Yi Xu, Jan-Michael Frahm, and Fabian Monrose. 2014. Watching the watchers: Automatically inferring tv content from outdoor light effusions. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 418--428.
[42]
Youtube. 2019 a. Night vision trigger test 1 of different smart cameras. https://www.youtube.com/watch?v=hx5k4dIbT3Y. (2019).
[43]
Youtube. 2019 b. Night vision trigger test 2 of different smart cameras. https://www.youtube.com/watch?v=hx5k4dIbT3Y. (2019).
[44]
Youtube. 2021 a. How to see through material with a Night Vision Camcorder. (2021). https://www.youtube.com/watch?v=RdtJlHVDcmM
[45]
Youtube. 2021 b. Infra-X-Vision. (2021). https://www.youtube.com/watch?v=9DilYUiu4AQ
[46]
Quanlong Zheng, Xiaotian Qiao, Ying Cao, and Rynson WH Lau. 2019. Distraction-aware shadow detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 5167--5176.
[47]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 1--20.
[48]
Shilin Zhu, Chi Zhang, and Xinyu Zhang. 2017. Automating Visual Privacy Protection Using a Smart LED. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom).

Cited By

View all
  • (2024)Wi-MoID: Human and Nonhuman Motion Discrimination Using WiFi With Edge ComputingIEEE Internet of Things Journal10.1109/JIOT.2023.333954411:8(13900-13912)Online publication date: 15-Apr-2024
  • (2024)Enabling Coexistence of Indoor Millimeter- Wave Networking and Human Activity Sensing2024 IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)10.1109/CHASE60773.2024.00014(37-48)Online publication date: 19-Jun-2024
  • (2023)Exploitation Techniques of IoST Vulnerabilities in Air-Gapped Networks and Security Measures—A Systematic ReviewSignals10.3390/signals40400384:4(687-707)Online publication date: 13-Oct-2023
  • Show More Cited By

Index Terms

  1. The Invisible Shadow: How Security Cameras Leak Private Activities

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 2021
    3558 pages
    ISBN:9781450384544
    DOI:10.1145/3460120
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. infrared light
    2. privacy leakage
    3. security camera

    Qualifiers

    • Research-article

    Conference

    CCS '21
    Sponsor:
    CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 15 - 19, 2021
    Virtual Event, Republic of Korea

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)117
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 24 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Wi-MoID: Human and Nonhuman Motion Discrimination Using WiFi With Edge ComputingIEEE Internet of Things Journal10.1109/JIOT.2023.333954411:8(13900-13912)Online publication date: 15-Apr-2024
    • (2024)Enabling Coexistence of Indoor Millimeter- Wave Networking and Human Activity Sensing2024 IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)10.1109/CHASE60773.2024.00014(37-48)Online publication date: 19-Jun-2024
    • (2023)Exploitation Techniques of IoST Vulnerabilities in Air-Gapped Networks and Security Measures—A Systematic ReviewSignals10.3390/signals40400384:4(687-707)Online publication date: 13-Oct-2023
    • (2023)Facial Recognition Technology in Policing: A National Survey of Public Support for This Technology and Privacy/Safety ConcernsCrime & Delinquency10.1177/00111287221150172(001112872211501)Online publication date: 29-Jan-2023
    • (2023)"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security ConferencesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623130(3433-3459)Online publication date: 15-Nov-2023
    • (2022)Who Moved My Cheese? Human and Non-human Motion Recognition with WiFi2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)10.1109/MASS56207.2022.00073(476-484)Online publication date: Oct-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media