skip to main content
research-article

CSI:DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations

Authors Info & Claims
Published:07 July 2022Publication History
Skip Abstract Section

Abstract

Recently, the spy cameras spotted in private rental places have raised immense privacy concerns. The existing solutions for detecting them require additional support from synchronous external sensing or stimulus hardware such as on/off LED circuits, which require extra obligations from the user. For example, a user needs to carry a smartphone and laboriously perform preset motions (e.g., jumping, waving, and preplanned walking pattern) for synchronous sensing of acceleration signals. These requirements cause considerable discomfort to the user and limit the practicability of prevalent solutions. To cope with this, we propose CSI:DeSpy, an efficient and painless method by leveraging video bitrate fluctuations of the WiFi camera and the passively obtained Channel States Information (CSI) from user motion. CSI:DeSpy includes a self-adaptive feature that makes it robust to detect motion efficiently in multipath-rich environments. We implemented CSI:DeSpy on the Android platform and assessed its performance in diverse real-life scenarios, namely; (1) its reliability with the intensities of physical activities in diverse multipath-rich environments, (2) its practicability with activities of daily living, (3) its unobtrusiveness with passive sensing, and (4) its robustness to different network loads. CSI:DeSpy attained average detection rates of 96.6%, 96.2%, 98.5%, and 93.6% respectively.

Skip Supplemental Material Section

Supplemental Material

References

  1. Fadel Adib and Dina Katabi. 2013. See through walls with WiFi!. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM. 75--86.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Amazon. 2012. Wireless Camera RF Detector with Built-in Flashlight Retrieved Nov 03, 2020 from https://tinyurl.com/y3hn87szGoogle ScholarGoogle Scholar
  3. Amazon. 2019. Anti Spy RF Signal Detector. Retrieved Nov 03, 2020 from https://tinyurl.com/y5wjsbgpGoogle ScholarGoogle Scholar
  4. Amazon. 2021. 1080P Super Night Vision Hidden Camera. Retrieved Oct 10, 2021 from https://tinyurl.com/ch75rjsGoogle ScholarGoogle Scholar
  5. B. Baird. 2016. Woman commits suicide after sex tape leaked on internet. Retrieved May 26, 2021 from https://tinyurl.com/35n2j2xpGoogle ScholarGoogle Scholar
  6. BBC. 2020. How many spycams can Stacey Dooley find in a love motel bedroom? Retrieved Nov 01, 2021 from https://youtu.be/ggYIsnUgUdUGoogle ScholarGoogle Scholar
  7. BBC.com. 2020. Everyday motion. Retrieved April 27, 2021 from https://tinyurl.com/2humk9u2Google ScholarGoogle Scholar
  8. Apurv Bhartia, Yi-Chao Chen, Swati Rallapalli, and Lili Qiu. 2011. Harnessing frequency diversity in wi-fi networks. In Proceedings of the 17th annual international conference on Mobile computing and networking. 253--264.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Carter. 2015. Couple Wakes Up in Airbnb to Find Hidden Camera Watching Them. Retrieved Oct 20, 2020 from https://tinyurl.com/y7ukmt9rGoogle ScholarGoogle Scholar
  10. A. Carter. 2019. Study says guests are finding hidden cameras inside rental properties, hotel rooms. Retrieved Oct 23, 2020 from https://tinyurl.com/y7ukmt9rGoogle ScholarGoogle Scholar
  11. A. Castelan and J. Treanor. 2016. Hidden cameras found inside a Las Vegas Airbnb rental recording naked people. Retrieved Oct 23, 2020 from https://tinyurl.com/zrtysgxGoogle ScholarGoogle Scholar
  12. Zhenghua Chen, Le Zhang, Chaoyang Jiang, Zhiguang Cao, and Wei Cui. 2019. WiFi CSI Based Passive Human Activity Recognition Using Attention Based BLSTM. IEEE Transactions on Mobile Computing 18, 11 (2019), 2714--2724.Google ScholarGoogle ScholarCross RefCross Ref
  13. Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. 2019. On detecting hidden wireless cameras: A traffic pattern-based approach. IEEE Transactions on Mobile Computing 19, 4 (2019), 907--921.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Emily DeCiccio. 2019. Hidden cameras: Are you being watched? Retrieved Nov 5, 2021 from https://tinyurl.com/pjdrapc2Google ScholarGoogle Scholar
  15. Daniel Dobkin. 2012. The rf in RFID: uhf RFID in practice. Newnes.Google ScholarGoogle Scholar
  16. Jon Dugan. 2016. iPerf - The ultimate speed test tool for TCP, UDP and SCTP. Retrieved Dec 23, 2021 from https://github.com/esnet/iperfGoogle ScholarGoogle Scholar
  17. Martin Ester, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, et al. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise.. In Kdd, Vol. 96. 226--231.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Matthew S Gast. 2013. 802.11 ac: a survival guide: Wi-Fi at gigabit and beyond. " O'Reilly Media, Inc.".Google ScholarGoogle Scholar
  19. Michael Hahsler, Matthew Piekenbrock, and Derek Doran. 2019. dbscan: Fast density-based clustering with R. Journal of Statistical Software 91, 1 (2019), 1--30.Google ScholarGoogle ScholarCross RefCross Ref
  20. Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. 2010. Predictable 802.11 packet delivery from wireless channel measurements. ACM SIGCOMM Computer Communication Review 40, 4 (2010), 159--170.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. IPX1031. 2019. Survey: Do Airbnb Guests Trust Their Hosts? Retrieved Nov 10, 2021 from https://www.ipx1031.com/airbnb-guests-trust-hosts/Google ScholarGoogle Scholar
  22. J Edward Jackson. 2005. A user's guide to principal components. Vol. 587. John Wiley & Sons.Google ScholarGoogle Scholar
  23. Minqiang Jiang, Xiaoquan Yi, and Nam Ling. 2004. Improved frame-layer rate control for H. 264 using MAD ratio. In 2004 IEEE International Symposium on Circuits and Systems (ISCAS), Vol. 3. IEEE, III-813.Google ScholarGoogle Scholar
  24. Brent Lagesse, Kevin Wu, Jaynie Shorb, and Zealous Zhu. 2018. Detecting spies in iot systems using cyber-physical correlation. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 185--190.Google ScholarGoogle ScholarCross RefCross Ref
  25. M Powell Lawton and Elaine M Brody. 1969. Assessment of older people: self-maintaining and instrumental activities of daily living. The gerontologist 9, 3_Part_1 (1969), 179--186.Google ScholarGoogle Scholar
  26. Stefan Lederer. 2018. Video Developer Report! Retrieved Feb 12, 2022 from https://tinyurl.com/2btpmtkuGoogle ScholarGoogle Scholar
  27. Adrian Lin and Hao Ling. 2007. Doppler and direction-of-arrival (DDOA) radar for multiple-mover sensing. IEEE transactions on aerospace and electronic systems 43, 4 (2007), 1496--1509.Google ScholarGoogle Scholar
  28. Jian Liu, Hongbo Liu, Yingying Chen, Yan Wang, and Chen Wang. 2020. Wireless Sensing for Human Activity: A Survey. IEEE Communications Surveys Tutorials 22, 3 (2020), 1629--1645. https://doi.org/10.1109/COMST.2019.2934489Google ScholarGoogle ScholarCross RefCross Ref
  29. Tian Liu, Ziyu Liu, Jun Huang, Rui Tan, and Zhen Tan. 2018. Detecting wireless spy cameras via stimulating and probing. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 243--255.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Yongsen Ma, Gang Zhou, and Shuangquan Wang. 2019. WiFi sensing with channel state information: A survey. ACM Computing Surveys (CSUR) 52, 3 (2019), 1--36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Rachna Mehta and N Kumar Aggarwal. 2014. Comparative analysis of median filter and adaptive filter for impulse noise-a review. International Journal of Computer Applications 975 (2014), 8887.Google ScholarGoogle Scholar
  32. Jiayi Meng, Qiang Xu, and Y Charlie Hu. 2021. Proactive {Energy-Aware } Adaptive Video Streaming on Mobile Devices. In 2021 USENIX Annual Technical Conference (USENIX ATC 21). 303--316.Google ScholarGoogle Scholar
  33. C. Mengxiao. 2017. Hidden camera found in H&M store's changing room. Retrieved Oct 21, 2020 from https://tinyurl.com/y7psdcxrGoogle ScholarGoogle Scholar
  34. metageek. 2020. Professional WiFi Tools. Retrieved Feb 02, 2022 from https://www.metageek.com/enterprise-wi-fi/complete/Google ScholarGoogle Scholar
  35. BBC News. 2019. Goo Hara and the trauma of South Korea's spy cam victims. Retrieved Nov 6, 2021 from https://www.bbc.com/news/world-asia-50582338Google ScholarGoogle Scholar
  36. Sandra Norman-Eady. 2003. OLR research report. Retrieved Nov 10, 2021 from https://tinyurl.com/b8rxjebrGoogle ScholarGoogle Scholar
  37. Maya Oppenheim. 2018. From changing rooms to public toilets: The dark trend of hidden spy cameras filming women. Retrieved Nov 10, 2021 from https://tinyurl.com/5fdk8u6vGoogle ScholarGoogle Scholar
  38. Sameera Palipana, David Rojas, Piyush Agrawal, and Dirk Pesch. 2018. FallDeFi: Ubiquitous fall detection using commodity Wi-Fi devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 4 (2018), 1--25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, Fugui He, and Tianzhang Xing. 2018. Enabling contactless detection of moving humans with dynamic speeds using CSI. ACM Transactions on Embedded Computing Systems (TECS) 17, 2 (2018), 1--18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, and Kyle Jamieson. 2017. Widar: Decimeter-level passive tracking via velocity monitoring with commodity Wi-Fi. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 1--10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Kun Qian, Chenshu Wu, Yi Zhang, Guidong Zhang, Zheng Yang, and Yunhao Liu. 2018. Widar2. 0: Passive human tracking with a single wi-fi link. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 350--361.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Shobha Sundar Ram, Yang Li, Adrian Lin, and Hao Ling. 2008. Doppler-based detection and tracking of humans in indoor environments. Journal of the Franklin Institute 345, 6 (2008), 679--699.Google ScholarGoogle ScholarCross RefCross Ref
  43. Ahmad Safaai-Jazi, Sedki M Riad, Ali Muqaibel, and Ahmet Bayram. 2002. Ultra-wideband propagation measurements and channel modeling. Report on Through-the-Wall Propagation and Material Characterization (2002).Google ScholarGoogle Scholar
  44. Ville Satopaa, Jeannie Albrecht, David Irwin, and Barath Raghavan. 2011. Finding a" kneedle" in a haystack: Detecting knee points in system behavior. In 2011 31st international conference on distributed computing systems workshops. IEEE, 166--171.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Erich Schubert, Jörg Sander, Martin Ester, Hans Peter Kriegel, and Xiaowei Xu. 2017. DBSCAN revisited, revisited: why and how you should (still) use DBSCAN. ACM Transactions on Database Systems (TODS) 42, 3 (2017), 1--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Matthias Schulz, Daniel Wegemer, and Matthias Hollick. 2017. Nexmon: The C-based Firmware Patching Framework. https://nexmon.orgGoogle ScholarGoogle Scholar
  47. Heiko Schwarz, Detlev Marpe, and Thomas Wiegand. 2007. Overview of the scalable video coding extension of the H. 264/AVC standard. IEEE Transactions on circuits and systems for video technology 17, 9 (2007), 1103--1120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Brick House Security. 2021. Understanding the legal ramifications of using hidden cameras. Retrieved Nov 3, 2021 from https://www.brickhousesecurity.com/hidden-cameras/laws/Google ScholarGoogle Scholar
  49. Signal. 2021. The Signal Jammer. Retrieved July 17, 2020 from https://tinyurl.com/y2hlznnwGoogle ScholarGoogle Scholar
  50. N. Smith. 2019. South Korean woman commits suicide after doctor filmed her using spycam, reports say. Retrieved Oct 18, 2020 from https://tinyurl.com/y52x98pkGoogle ScholarGoogle Scholar
  51. WKRN Web Staff. 2021. Police: 60 females, mostly minors, recorded on hidden camera found in Franklin cheer studio bathroom. Retrieved May 26, 2021 from https://tinyurl.com/3jj4m5cGoogle ScholarGoogle Scholar
  52. NR Tague. 2004. The Quality Toolbox, ASQ (American Society for Quality).Google ScholarGoogle Scholar
  53. Global Times. 2021. Media investigation exposes thousands of candid shots shared and sold via social media platforms. Retrieved Nov 5, 2021 from https://tinyurl.com/23xcz4hvGoogle ScholarGoogle Scholar
  54. A. Vikulov and A. Paramonov. 2020. Practical retrospective of 5-year evolution of the IEEE 802.11 client device capabilities. In 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 296--300. https://doi.org/10.1109/ICUMT51630.2020.9222427Google ScholarGoogle Scholar
  55. Yuxi Wang, Kaishun Wu, and Lionel M Ni. 2016. Wifall: Device-free fall detection by wireless networks. IEEE Transactions on Mobile Computing 16, 2 (2016), 581--594.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Zhang Wanqing. 2021. China Cracks Down on Hidden Cameras and Clandestine Filming. Retrieved Nov 11, 2021 from https://tinyurl.com/35jfux7dGoogle ScholarGoogle Scholar
  57. Kevin Wu and Brent Lagesse. 2019. Do You See What I See? Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 1--10.Google ScholarGoogle Scholar
  58. Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, and Zhiping Jiang. 2014. Electronic frog eye: Counting crowd using WiFi. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 361--369.Google ScholarGoogle ScholarCross RefCross Ref
  59. Jiang Xiao, Kaishun Wu, Youwen Yi, Lu Wang, and Lionel M Ni. 2012. FIMD: Fine-grained device-free motion detection. In 2012 IEEE 18th International conference on parallel and distributed systems. IEEE, 229--235.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Yang Xiao. 2005. IEEE 802.11 n: enhancements for higher throughput in wireless LANs. IEEE Wireless Communications 12, 6 (2005), 82--91.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Yaxiong Xie, Jie Xiong, Mo Li, and Kyle Jamieson. 2019. mD-Track: Leveraging multi-dimensionality for passive indoor Wi-Fi tracking. In The 25th Annual International Conference on Mobile Computing and Networking. 1--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Jie Xiong and Kyle Jamieson. 2013. Arraytrack: A fine-grained indoor location system. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation NSDI 13. 71--84.Google ScholarGoogle Scholar
  63. Zheng Yang, Zimu Zhou, and Yunhao Liu. 2013. From RSSI to CSI: Indoor localization via channel response. ACM Computing Surveys (CSUR) 46, 2 (2013), 1--32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Xin-Wei Yao, Wan-Liang Wang, Shuang-Hua Yang, Yue-Feng Cen, Xiao-Min Yao, and Tie-Qiang Pan. 2014. Ipb-frame adaptive mapping mechanism for video transmission over IEEE 802.11 e WLANs. ACM SIGCOMM Computer Communication Review 44, 2 (2014), 5--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Chia-Jen Yu and Jian Kang. 2009. Environmental impact of acoustic materials in residential buildings. Building and environment 44, 10 (2009), 2166--2175.Google ScholarGoogle Scholar
  66. Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In USENIX Symposium on Usable Privacy and Security (SOUPS). 65--80.Google ScholarGoogle Scholar
  67. Xu Zhong and Yu Zhou. 2012. Maintaining wireless communication coverage among multiple mobile robots using fuzzy neural network. In Proceedings of 2012 IEEE/ASME 8th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications. IEEE, 35--41.Google ScholarGoogle ScholarCross RefCross Ref
  68. Shilin Zhu, Chi Zhang, and Xinyu Zhang. 2017. Automating visual privacy protection using a smart LED. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. 329--342.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CSI:DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
      Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 6, Issue 2
      July 2022
      1551 pages
      EISSN:2474-9567
      DOI:10.1145/3547347
      Issue’s Table of Contents

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 July 2022
      Published in imwut Volume 6, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader