Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

CSI:DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations

Published: 07 July 2022 Publication History

Abstract

Recently, the spy cameras spotted in private rental places have raised immense privacy concerns. The existing solutions for detecting them require additional support from synchronous external sensing or stimulus hardware such as on/off LED circuits, which require extra obligations from the user. For example, a user needs to carry a smartphone and laboriously perform preset motions (e.g., jumping, waving, and preplanned walking pattern) for synchronous sensing of acceleration signals. These requirements cause considerable discomfort to the user and limit the practicability of prevalent solutions. To cope with this, we propose CSI:DeSpy, an efficient and painless method by leveraging video bitrate fluctuations of the WiFi camera and the passively obtained Channel States Information (CSI) from user motion. CSI:DeSpy includes a self-adaptive feature that makes it robust to detect motion efficiently in multipath-rich environments. We implemented CSI:DeSpy on the Android platform and assessed its performance in diverse real-life scenarios, namely; (1) its reliability with the intensities of physical activities in diverse multipath-rich environments, (2) its practicability with activities of daily living, (3) its unobtrusiveness with passive sensing, and (4) its robustness to different network loads. CSI:DeSpy attained average detection rates of 96.6%, 96.2%, 98.5%, and 93.6% respectively.

Supplemental Material

ZIP File - salman
Supplemental movie, appendix, image and software files for, CSI:DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations

References

[1]
Fadel Adib and Dina Katabi. 2013. See through walls with WiFi!. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM. 75--86.
[2]
Amazon. 2012. Wireless Camera RF Detector with Built-in Flashlight Retrieved Nov 03, 2020 from https://tinyurl.com/y3hn87sz
[3]
Amazon. 2019. Anti Spy RF Signal Detector. Retrieved Nov 03, 2020 from https://tinyurl.com/y5wjsbgp
[4]
Amazon. 2021. 1080P Super Night Vision Hidden Camera. Retrieved Oct 10, 2021 from https://tinyurl.com/ch75rjs
[5]
B. Baird. 2016. Woman commits suicide after sex tape leaked on internet. Retrieved May 26, 2021 from https://tinyurl.com/35n2j2xp
[6]
BBC. 2020. How many spycams can Stacey Dooley find in a love motel bedroom? Retrieved Nov 01, 2021 from https://youtu.be/ggYIsnUgUdU
[7]
BBC.com. 2020. Everyday motion. Retrieved April 27, 2021 from https://tinyurl.com/2humk9u2
[8]
Apurv Bhartia, Yi-Chao Chen, Swati Rallapalli, and Lili Qiu. 2011. Harnessing frequency diversity in wi-fi networks. In Proceedings of the 17th annual international conference on Mobile computing and networking. 253--264.
[9]
A. Carter. 2015. Couple Wakes Up in Airbnb to Find Hidden Camera Watching Them. Retrieved Oct 20, 2020 from https://tinyurl.com/y7ukmt9r
[10]
A. Carter. 2019. Study says guests are finding hidden cameras inside rental properties, hotel rooms. Retrieved Oct 23, 2020 from https://tinyurl.com/y7ukmt9r
[11]
A. Castelan and J. Treanor. 2016. Hidden cameras found inside a Las Vegas Airbnb rental recording naked people. Retrieved Oct 23, 2020 from https://tinyurl.com/zrtysgx
[12]
Zhenghua Chen, Le Zhang, Chaoyang Jiang, Zhiguang Cao, and Wei Cui. 2019. WiFi CSI Based Passive Human Activity Recognition Using Attention Based BLSTM. IEEE Transactions on Mobile Computing 18, 11 (2019), 2714--2724.
[13]
Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. 2019. On detecting hidden wireless cameras: A traffic pattern-based approach. IEEE Transactions on Mobile Computing 19, 4 (2019), 907--921.
[14]
Emily DeCiccio. 2019. Hidden cameras: Are you being watched? Retrieved Nov 5, 2021 from https://tinyurl.com/pjdrapc2
[15]
Daniel Dobkin. 2012. The rf in RFID: uhf RFID in practice. Newnes.
[16]
Jon Dugan. 2016. iPerf - The ultimate speed test tool for TCP, UDP and SCTP. Retrieved Dec 23, 2021 from https://github.com/esnet/iperf
[17]
Martin Ester, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, et al. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In Kdd, Vol. 96. 226--231.
[18]
Matthew S Gast. 2013. 802.11 ac: a survival guide: Wi-Fi at gigabit and beyond. " O'Reilly Media, Inc.".
[19]
Michael Hahsler, Matthew Piekenbrock, and Derek Doran. 2019. dbscan: Fast density-based clustering with R. Journal of Statistical Software 91, 1 (2019), 1--30.
[20]
Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. 2010. Predictable 802.11 packet delivery from wireless channel measurements. ACM SIGCOMM Computer Communication Review 40, 4 (2010), 159--170.
[21]
IPX1031. 2019. Survey: Do Airbnb Guests Trust Their Hosts? Retrieved Nov 10, 2021 from https://www.ipx1031.com/airbnb-guests-trust-hosts/
[22]
J Edward Jackson. 2005. A user's guide to principal components. Vol. 587. John Wiley & Sons.
[23]
Minqiang Jiang, Xiaoquan Yi, and Nam Ling. 2004. Improved frame-layer rate control for H. 264 using MAD ratio. In 2004 IEEE International Symposium on Circuits and Systems (ISCAS), Vol. 3. IEEE, III-813.
[24]
Brent Lagesse, Kevin Wu, Jaynie Shorb, and Zealous Zhu. 2018. Detecting spies in iot systems using cyber-physical correlation. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 185--190.
[25]
M Powell Lawton and Elaine M Brody. 1969. Assessment of older people: self-maintaining and instrumental activities of daily living. The gerontologist 9, 3_Part_1 (1969), 179--186.
[26]
Stefan Lederer. 2018. Video Developer Report! Retrieved Feb 12, 2022 from https://tinyurl.com/2btpmtku
[27]
Adrian Lin and Hao Ling. 2007. Doppler and direction-of-arrival (DDOA) radar for multiple-mover sensing. IEEE transactions on aerospace and electronic systems 43, 4 (2007), 1496--1509.
[28]
Jian Liu, Hongbo Liu, Yingying Chen, Yan Wang, and Chen Wang. 2020. Wireless Sensing for Human Activity: A Survey. IEEE Communications Surveys Tutorials 22, 3 (2020), 1629--1645. https://doi.org/10.1109/COMST.2019.2934489
[29]
Tian Liu, Ziyu Liu, Jun Huang, Rui Tan, and Zhen Tan. 2018. Detecting wireless spy cameras via stimulating and probing. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 243--255.
[30]
Yongsen Ma, Gang Zhou, and Shuangquan Wang. 2019. WiFi sensing with channel state information: A survey. ACM Computing Surveys (CSUR) 52, 3 (2019), 1--36.
[31]
Rachna Mehta and N Kumar Aggarwal. 2014. Comparative analysis of median filter and adaptive filter for impulse noise-a review. International Journal of Computer Applications 975 (2014), 8887.
[32]
Jiayi Meng, Qiang Xu, and Y Charlie Hu. 2021. Proactive {Energy-Aware } Adaptive Video Streaming on Mobile Devices. In 2021 USENIX Annual Technical Conference (USENIX ATC 21). 303--316.
[33]
C. Mengxiao. 2017. Hidden camera found in H&M store's changing room. Retrieved Oct 21, 2020 from https://tinyurl.com/y7psdcxr
[34]
metageek. 2020. Professional WiFi Tools. Retrieved Feb 02, 2022 from https://www.metageek.com/enterprise-wi-fi/complete/
[35]
BBC News. 2019. Goo Hara and the trauma of South Korea's spy cam victims. Retrieved Nov 6, 2021 from https://www.bbc.com/news/world-asia-50582338
[36]
Sandra Norman-Eady. 2003. OLR research report. Retrieved Nov 10, 2021 from https://tinyurl.com/b8rxjebr
[37]
Maya Oppenheim. 2018. From changing rooms to public toilets: The dark trend of hidden spy cameras filming women. Retrieved Nov 10, 2021 from https://tinyurl.com/5fdk8u6v
[38]
Sameera Palipana, David Rojas, Piyush Agrawal, and Dirk Pesch. 2018. FallDeFi: Ubiquitous fall detection using commodity Wi-Fi devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 4 (2018), 1--25.
[39]
Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, Fugui He, and Tianzhang Xing. 2018. Enabling contactless detection of moving humans with dynamic speeds using CSI. ACM Transactions on Embedded Computing Systems (TECS) 17, 2 (2018), 1--18.
[40]
Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, and Kyle Jamieson. 2017. Widar: Decimeter-level passive tracking via velocity monitoring with commodity Wi-Fi. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 1--10.
[41]
Kun Qian, Chenshu Wu, Yi Zhang, Guidong Zhang, Zheng Yang, and Yunhao Liu. 2018. Widar2. 0: Passive human tracking with a single wi-fi link. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 350--361.
[42]
Shobha Sundar Ram, Yang Li, Adrian Lin, and Hao Ling. 2008. Doppler-based detection and tracking of humans in indoor environments. Journal of the Franklin Institute 345, 6 (2008), 679--699.
[43]
Ahmad Safaai-Jazi, Sedki M Riad, Ali Muqaibel, and Ahmet Bayram. 2002. Ultra-wideband propagation measurements and channel modeling. Report on Through-the-Wall Propagation and Material Characterization (2002).
[44]
Ville Satopaa, Jeannie Albrecht, David Irwin, and Barath Raghavan. 2011. Finding a" kneedle" in a haystack: Detecting knee points in system behavior. In 2011 31st international conference on distributed computing systems workshops. IEEE, 166--171.
[45]
Erich Schubert, Jörg Sander, Martin Ester, Hans Peter Kriegel, and Xiaowei Xu. 2017. DBSCAN revisited, revisited: why and how you should (still) use DBSCAN. ACM Transactions on Database Systems (TODS) 42, 3 (2017), 1--21.
[46]
Matthias Schulz, Daniel Wegemer, and Matthias Hollick. 2017. Nexmon: The C-based Firmware Patching Framework. https://nexmon.org
[47]
Heiko Schwarz, Detlev Marpe, and Thomas Wiegand. 2007. Overview of the scalable video coding extension of the H. 264/AVC standard. IEEE Transactions on circuits and systems for video technology 17, 9 (2007), 1103--1120.
[48]
Brick House Security. 2021. Understanding the legal ramifications of using hidden cameras. Retrieved Nov 3, 2021 from https://www.brickhousesecurity.com/hidden-cameras/laws/
[49]
Signal. 2021. The Signal Jammer. Retrieved July 17, 2020 from https://tinyurl.com/y2hlznnw
[50]
N. Smith. 2019. South Korean woman commits suicide after doctor filmed her using spycam, reports say. Retrieved Oct 18, 2020 from https://tinyurl.com/y52x98pk
[51]
WKRN Web Staff. 2021. Police: 60 females, mostly minors, recorded on hidden camera found in Franklin cheer studio bathroom. Retrieved May 26, 2021 from https://tinyurl.com/3jj4m5c
[52]
NR Tague. 2004. The Quality Toolbox, ASQ (American Society for Quality).
[53]
Global Times. 2021. Media investigation exposes thousands of candid shots shared and sold via social media platforms. Retrieved Nov 5, 2021 from https://tinyurl.com/23xcz4hv
[54]
A. Vikulov and A. Paramonov. 2020. Practical retrospective of 5-year evolution of the IEEE 802.11 client device capabilities. In 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 296--300. https://doi.org/10.1109/ICUMT51630.2020.9222427
[55]
Yuxi Wang, Kaishun Wu, and Lionel M Ni. 2016. Wifall: Device-free fall detection by wireless networks. IEEE Transactions on Mobile Computing 16, 2 (2016), 581--594.
[56]
Zhang Wanqing. 2021. China Cracks Down on Hidden Cameras and Clandestine Filming. Retrieved Nov 11, 2021 from https://tinyurl.com/35jfux7d
[57]
Kevin Wu and Brent Lagesse. 2019. Do You See What I See? Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 1--10.
[58]
Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, and Zhiping Jiang. 2014. Electronic frog eye: Counting crowd using WiFi. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 361--369.
[59]
Jiang Xiao, Kaishun Wu, Youwen Yi, Lu Wang, and Lionel M Ni. 2012. FIMD: Fine-grained device-free motion detection. In 2012 IEEE 18th International conference on parallel and distributed systems. IEEE, 229--235.
[60]
Yang Xiao. 2005. IEEE 802.11 n: enhancements for higher throughput in wireless LANs. IEEE Wireless Communications 12, 6 (2005), 82--91.
[61]
Yaxiong Xie, Jie Xiong, Mo Li, and Kyle Jamieson. 2019. mD-Track: Leveraging multi-dimensionality for passive indoor Wi-Fi tracking. In The 25th Annual International Conference on Mobile Computing and Networking. 1--16.
[62]
Jie Xiong and Kyle Jamieson. 2013. Arraytrack: A fine-grained indoor location system. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation NSDI 13. 71--84.
[63]
Zheng Yang, Zimu Zhou, and Yunhao Liu. 2013. From RSSI to CSI: Indoor localization via channel response. ACM Computing Surveys (CSUR) 46, 2 (2013), 1--32.
[64]
Xin-Wei Yao, Wan-Liang Wang, Shuang-Hua Yang, Yue-Feng Cen, Xiao-Min Yao, and Tie-Qiang Pan. 2014. Ipb-frame adaptive mapping mechanism for video transmission over IEEE 802.11 e WLANs. ACM SIGCOMM Computer Communication Review 44, 2 (2014), 5--12.
[65]
Chia-Jen Yu and Jian Kang. 2009. Environmental impact of acoustic materials in residential buildings. Building and environment 44, 10 (2009), 2166--2175.
[66]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In USENIX Symposium on Usable Privacy and Security (SOUPS). 65--80.
[67]
Xu Zhong and Yu Zhou. 2012. Maintaining wireless communication coverage among multiple mobile robots using fuzzy neural network. In Proceedings of 2012 IEEE/ASME 8th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications. IEEE, 35--41.
[68]
Shilin Zhu, Chi Zhang, and Xinyu Zhang. 2017. Automating visual privacy protection using a smart LED. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. 329--342.

Cited By

View all
  • (2024)mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual RealityProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997728:4(1-29)Online publication date: 21-Nov-2024
  • (2024)Extending EV Battery Lifetime: Digital Phenotyping Approach for Departure Time PredictionProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997258:4(1-30)Online publication date: 21-Nov-2024
  • (2024)Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar EnvironmentsProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695040(109-123)Online publication date: 20-Nov-2024
  • Show More Cited By

Index Terms

  1. CSI:DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 6, Issue 2
    June 2022
    1551 pages
    EISSN:2474-9567
    DOI:10.1145/3547347
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 July 2022
    Published in IMWUT Volume 6, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Access Point (AP)
    2. Channel State Information (CSI)
    3. Person in Line of Sight (PLoS)
    4. Person in None Line of Sight (PNLoS)

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)106
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual RealityProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997728:4(1-29)Online publication date: 21-Nov-2024
    • (2024)Extending EV Battery Lifetime: Digital Phenotyping Approach for Departure Time PredictionProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997258:4(1-30)Online publication date: 21-Nov-2024
    • (2024)Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar EnvironmentsProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695040(109-123)Online publication date: 20-Nov-2024
    • (2024)LocCamsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314327:4(1-24)Online publication date: 12-Jan-2024
    • (2024)CamShield: Tracing Electromagnetics to Steer Ultrasound Against Illegal CamerasIEEE Internet of Things Journal10.1109/JIOT.2024.342847511:20(33296-33311)Online publication date: 15-Oct-2024
    • (2024)Real-Time Sensing and On-Site Spotting Scheme of Multi-Type WLAN SpycamsIEEE Access10.1109/ACCESS.2024.348242912(153965-153979)Online publication date: 2024
    • (2024)Wireless Spy Camera Spotter System With Real-Time Traffic Similarity Analysis and WiFi Signal TracingIEEE Access10.1109/ACCESS.2024.335017512(4459-4470)Online publication date: 2024
    • (2024)WiSOM: WiFi-enabled self-adaptive system for monitoring the occupancy in smart buildingsEnergy10.1016/j.energy.2024.130420294(130420)Online publication date: May-2024
    • (2023)WiFi Sensing with Single-Antenna Devices for Ambient Assisted LivingProceedings of the 8th international Workshop on Sensor-Based Activity Recognition and Artificial Intelligence10.1145/3615834.3615841(1-8)Online publication date: 21-Sep-2023
    • (2023)Phantom-CSI Attacks against Wireless Liveness DetectionProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607245(440-454)Online publication date: 16-Oct-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media