Abstract
Recently, the spy cameras spotted in private rental places have raised immense privacy concerns. The existing solutions for detecting them require additional support from synchronous external sensing or stimulus hardware such as on/off LED circuits, which require extra obligations from the user. For example, a user needs to carry a smartphone and laboriously perform preset motions (e.g., jumping, waving, and preplanned walking pattern) for synchronous sensing of acceleration signals. These requirements cause considerable discomfort to the user and limit the practicability of prevalent solutions. To cope with this, we propose CSI:DeSpy, an efficient and painless method by leveraging video bitrate fluctuations of the WiFi camera and the passively obtained Channel States Information (CSI) from user motion. CSI:DeSpy includes a self-adaptive feature that makes it robust to detect motion efficiently in multipath-rich environments. We implemented CSI:DeSpy on the Android platform and assessed its performance in diverse real-life scenarios, namely; (1) its reliability with the intensities of physical activities in diverse multipath-rich environments, (2) its practicability with activities of daily living, (3) its unobtrusiveness with passive sensing, and (4) its robustness to different network loads. CSI:DeSpy attained average detection rates of 96.6%, 96.2%, 98.5%, and 93.6% respectively.
Supplemental Material
Available for Download
Supplemental movie, appendix, image and software files for, CSI:DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations
- Fadel Adib and Dina Katabi. 2013. See through walls with WiFi!. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM. 75--86.Google ScholarDigital Library
- Amazon. 2012. Wireless Camera RF Detector with Built-in Flashlight Retrieved Nov 03, 2020 from https://tinyurl.com/y3hn87szGoogle Scholar
- Amazon. 2019. Anti Spy RF Signal Detector. Retrieved Nov 03, 2020 from https://tinyurl.com/y5wjsbgpGoogle Scholar
- Amazon. 2021. 1080P Super Night Vision Hidden Camera. Retrieved Oct 10, 2021 from https://tinyurl.com/ch75rjsGoogle Scholar
- B. Baird. 2016. Woman commits suicide after sex tape leaked on internet. Retrieved May 26, 2021 from https://tinyurl.com/35n2j2xpGoogle Scholar
- BBC. 2020. How many spycams can Stacey Dooley find in a love motel bedroom? Retrieved Nov 01, 2021 from https://youtu.be/ggYIsnUgUdUGoogle Scholar
- BBC.com. 2020. Everyday motion. Retrieved April 27, 2021 from https://tinyurl.com/2humk9u2Google Scholar
- Apurv Bhartia, Yi-Chao Chen, Swati Rallapalli, and Lili Qiu. 2011. Harnessing frequency diversity in wi-fi networks. In Proceedings of the 17th annual international conference on Mobile computing and networking. 253--264.Google ScholarDigital Library
- A. Carter. 2015. Couple Wakes Up in Airbnb to Find Hidden Camera Watching Them. Retrieved Oct 20, 2020 from https://tinyurl.com/y7ukmt9rGoogle Scholar
- A. Carter. 2019. Study says guests are finding hidden cameras inside rental properties, hotel rooms. Retrieved Oct 23, 2020 from https://tinyurl.com/y7ukmt9rGoogle Scholar
- A. Castelan and J. Treanor. 2016. Hidden cameras found inside a Las Vegas Airbnb rental recording naked people. Retrieved Oct 23, 2020 from https://tinyurl.com/zrtysgxGoogle Scholar
- Zhenghua Chen, Le Zhang, Chaoyang Jiang, Zhiguang Cao, and Wei Cui. 2019. WiFi CSI Based Passive Human Activity Recognition Using Attention Based BLSTM. IEEE Transactions on Mobile Computing 18, 11 (2019), 2714--2724.Google ScholarCross Ref
- Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. 2019. On detecting hidden wireless cameras: A traffic pattern-based approach. IEEE Transactions on Mobile Computing 19, 4 (2019), 907--921.Google ScholarDigital Library
- Emily DeCiccio. 2019. Hidden cameras: Are you being watched? Retrieved Nov 5, 2021 from https://tinyurl.com/pjdrapc2Google Scholar
- Daniel Dobkin. 2012. The rf in RFID: uhf RFID in practice. Newnes.Google Scholar
- Jon Dugan. 2016. iPerf - The ultimate speed test tool for TCP, UDP and SCTP. Retrieved Dec 23, 2021 from https://github.com/esnet/iperfGoogle Scholar
- Martin Ester, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, et al. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise.. In Kdd, Vol. 96. 226--231.Google ScholarDigital Library
- Matthew S Gast. 2013. 802.11 ac: a survival guide: Wi-Fi at gigabit and beyond. " O'Reilly Media, Inc.".Google Scholar
- Michael Hahsler, Matthew Piekenbrock, and Derek Doran. 2019. dbscan: Fast density-based clustering with R. Journal of Statistical Software 91, 1 (2019), 1--30.Google ScholarCross Ref
- Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. 2010. Predictable 802.11 packet delivery from wireless channel measurements. ACM SIGCOMM Computer Communication Review 40, 4 (2010), 159--170.Google ScholarDigital Library
- IPX1031. 2019. Survey: Do Airbnb Guests Trust Their Hosts? Retrieved Nov 10, 2021 from https://www.ipx1031.com/airbnb-guests-trust-hosts/Google Scholar
- J Edward Jackson. 2005. A user's guide to principal components. Vol. 587. John Wiley & Sons.Google Scholar
- Minqiang Jiang, Xiaoquan Yi, and Nam Ling. 2004. Improved frame-layer rate control for H. 264 using MAD ratio. In 2004 IEEE International Symposium on Circuits and Systems (ISCAS), Vol. 3. IEEE, III-813.Google Scholar
- Brent Lagesse, Kevin Wu, Jaynie Shorb, and Zealous Zhu. 2018. Detecting spies in iot systems using cyber-physical correlation. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 185--190.Google ScholarCross Ref
- M Powell Lawton and Elaine M Brody. 1969. Assessment of older people: self-maintaining and instrumental activities of daily living. The gerontologist 9, 3_Part_1 (1969), 179--186.Google Scholar
- Stefan Lederer. 2018. Video Developer Report! Retrieved Feb 12, 2022 from https://tinyurl.com/2btpmtkuGoogle Scholar
- Adrian Lin and Hao Ling. 2007. Doppler and direction-of-arrival (DDOA) radar for multiple-mover sensing. IEEE transactions on aerospace and electronic systems 43, 4 (2007), 1496--1509.Google Scholar
- Jian Liu, Hongbo Liu, Yingying Chen, Yan Wang, and Chen Wang. 2020. Wireless Sensing for Human Activity: A Survey. IEEE Communications Surveys Tutorials 22, 3 (2020), 1629--1645. https://doi.org/10.1109/COMST.2019.2934489Google ScholarCross Ref
- Tian Liu, Ziyu Liu, Jun Huang, Rui Tan, and Zhen Tan. 2018. Detecting wireless spy cameras via stimulating and probing. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 243--255.Google ScholarDigital Library
- Yongsen Ma, Gang Zhou, and Shuangquan Wang. 2019. WiFi sensing with channel state information: A survey. ACM Computing Surveys (CSUR) 52, 3 (2019), 1--36.Google ScholarDigital Library
- Rachna Mehta and N Kumar Aggarwal. 2014. Comparative analysis of median filter and adaptive filter for impulse noise-a review. International Journal of Computer Applications 975 (2014), 8887.Google Scholar
- Jiayi Meng, Qiang Xu, and Y Charlie Hu. 2021. Proactive {Energy-Aware } Adaptive Video Streaming on Mobile Devices. In 2021 USENIX Annual Technical Conference (USENIX ATC 21). 303--316.Google Scholar
- C. Mengxiao. 2017. Hidden camera found in H&M store's changing room. Retrieved Oct 21, 2020 from https://tinyurl.com/y7psdcxrGoogle Scholar
- metageek. 2020. Professional WiFi Tools. Retrieved Feb 02, 2022 from https://www.metageek.com/enterprise-wi-fi/complete/Google Scholar
- BBC News. 2019. Goo Hara and the trauma of South Korea's spy cam victims. Retrieved Nov 6, 2021 from https://www.bbc.com/news/world-asia-50582338Google Scholar
- Sandra Norman-Eady. 2003. OLR research report. Retrieved Nov 10, 2021 from https://tinyurl.com/b8rxjebrGoogle Scholar
- Maya Oppenheim. 2018. From changing rooms to public toilets: The dark trend of hidden spy cameras filming women. Retrieved Nov 10, 2021 from https://tinyurl.com/5fdk8u6vGoogle Scholar
- Sameera Palipana, David Rojas, Piyush Agrawal, and Dirk Pesch. 2018. FallDeFi: Ubiquitous fall detection using commodity Wi-Fi devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 4 (2018), 1--25.Google ScholarDigital Library
- Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, Fugui He, and Tianzhang Xing. 2018. Enabling contactless detection of moving humans with dynamic speeds using CSI. ACM Transactions on Embedded Computing Systems (TECS) 17, 2 (2018), 1--18.Google ScholarDigital Library
- Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, and Kyle Jamieson. 2017. Widar: Decimeter-level passive tracking via velocity monitoring with commodity Wi-Fi. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 1--10.Google ScholarDigital Library
- Kun Qian, Chenshu Wu, Yi Zhang, Guidong Zhang, Zheng Yang, and Yunhao Liu. 2018. Widar2. 0: Passive human tracking with a single wi-fi link. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 350--361.Google ScholarDigital Library
- Shobha Sundar Ram, Yang Li, Adrian Lin, and Hao Ling. 2008. Doppler-based detection and tracking of humans in indoor environments. Journal of the Franklin Institute 345, 6 (2008), 679--699.Google ScholarCross Ref
- Ahmad Safaai-Jazi, Sedki M Riad, Ali Muqaibel, and Ahmet Bayram. 2002. Ultra-wideband propagation measurements and channel modeling. Report on Through-the-Wall Propagation and Material Characterization (2002).Google Scholar
- Ville Satopaa, Jeannie Albrecht, David Irwin, and Barath Raghavan. 2011. Finding a" kneedle" in a haystack: Detecting knee points in system behavior. In 2011 31st international conference on distributed computing systems workshops. IEEE, 166--171.Google ScholarDigital Library
- Erich Schubert, Jörg Sander, Martin Ester, Hans Peter Kriegel, and Xiaowei Xu. 2017. DBSCAN revisited, revisited: why and how you should (still) use DBSCAN. ACM Transactions on Database Systems (TODS) 42, 3 (2017), 1--21.Google ScholarDigital Library
- Matthias Schulz, Daniel Wegemer, and Matthias Hollick. 2017. Nexmon: The C-based Firmware Patching Framework. https://nexmon.orgGoogle Scholar
- Heiko Schwarz, Detlev Marpe, and Thomas Wiegand. 2007. Overview of the scalable video coding extension of the H. 264/AVC standard. IEEE Transactions on circuits and systems for video technology 17, 9 (2007), 1103--1120.Google ScholarDigital Library
- Brick House Security. 2021. Understanding the legal ramifications of using hidden cameras. Retrieved Nov 3, 2021 from https://www.brickhousesecurity.com/hidden-cameras/laws/Google Scholar
- Signal. 2021. The Signal Jammer. Retrieved July 17, 2020 from https://tinyurl.com/y2hlznnwGoogle Scholar
- N. Smith. 2019. South Korean woman commits suicide after doctor filmed her using spycam, reports say. Retrieved Oct 18, 2020 from https://tinyurl.com/y52x98pkGoogle Scholar
- WKRN Web Staff. 2021. Police: 60 females, mostly minors, recorded on hidden camera found in Franklin cheer studio bathroom. Retrieved May 26, 2021 from https://tinyurl.com/3jj4m5cGoogle Scholar
- NR Tague. 2004. The Quality Toolbox, ASQ (American Society for Quality).Google Scholar
- Global Times. 2021. Media investigation exposes thousands of candid shots shared and sold via social media platforms. Retrieved Nov 5, 2021 from https://tinyurl.com/23xcz4hvGoogle Scholar
- A. Vikulov and A. Paramonov. 2020. Practical retrospective of 5-year evolution of the IEEE 802.11 client device capabilities. In 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 296--300. https://doi.org/10.1109/ICUMT51630.2020.9222427Google Scholar
- Yuxi Wang, Kaishun Wu, and Lionel M Ni. 2016. Wifall: Device-free fall detection by wireless networks. IEEE Transactions on Mobile Computing 16, 2 (2016), 581--594.Google ScholarDigital Library
- Zhang Wanqing. 2021. China Cracks Down on Hidden Cameras and Clandestine Filming. Retrieved Nov 11, 2021 from https://tinyurl.com/35jfux7dGoogle Scholar
- Kevin Wu and Brent Lagesse. 2019. Do You See What I See? Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 1--10.Google Scholar
- Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, and Zhiping Jiang. 2014. Electronic frog eye: Counting crowd using WiFi. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 361--369.Google ScholarCross Ref
- Jiang Xiao, Kaishun Wu, Youwen Yi, Lu Wang, and Lionel M Ni. 2012. FIMD: Fine-grained device-free motion detection. In 2012 IEEE 18th International conference on parallel and distributed systems. IEEE, 229--235.Google ScholarDigital Library
- Yang Xiao. 2005. IEEE 802.11 n: enhancements for higher throughput in wireless LANs. IEEE Wireless Communications 12, 6 (2005), 82--91.Google ScholarDigital Library
- Yaxiong Xie, Jie Xiong, Mo Li, and Kyle Jamieson. 2019. mD-Track: Leveraging multi-dimensionality for passive indoor Wi-Fi tracking. In The 25th Annual International Conference on Mobile Computing and Networking. 1--16.Google ScholarDigital Library
- Jie Xiong and Kyle Jamieson. 2013. Arraytrack: A fine-grained indoor location system. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation NSDI 13. 71--84.Google Scholar
- Zheng Yang, Zimu Zhou, and Yunhao Liu. 2013. From RSSI to CSI: Indoor localization via channel response. ACM Computing Surveys (CSUR) 46, 2 (2013), 1--32.Google ScholarDigital Library
- Xin-Wei Yao, Wan-Liang Wang, Shuang-Hua Yang, Yue-Feng Cen, Xiao-Min Yao, and Tie-Qiang Pan. 2014. Ipb-frame adaptive mapping mechanism for video transmission over IEEE 802.11 e WLANs. ACM SIGCOMM Computer Communication Review 44, 2 (2014), 5--12.Google ScholarDigital Library
- Chia-Jen Yu and Jian Kang. 2009. Environmental impact of acoustic materials in residential buildings. Building and environment 44, 10 (2009), 2166--2175.Google Scholar
- Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In USENIX Symposium on Usable Privacy and Security (SOUPS). 65--80.Google Scholar
- Xu Zhong and Yu Zhou. 2012. Maintaining wireless communication coverage among multiple mobile robots using fuzzy neural network. In Proceedings of 2012 IEEE/ASME 8th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications. IEEE, 35--41.Google ScholarCross Ref
- Shilin Zhu, Chi Zhang, and Xinyu Zhang. 2017. Automating visual privacy protection using a smart LED. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. 329--342.Google ScholarDigital Library
Index Terms
- CSI:DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations
Recommendations
MIMO minimum total MSE transceiver design with imperfect CSI at both ends
This paper presents new results on joint linear transceiver design under the minimum total mean-square error (MSE) criterion, with channel mean as well as both transmit and receive correlation information at both ends of a multiple-input multiple-output ...
Performance analysis of ZF receivers with imperfect CSI for uplink massive MIMO systems
We consider the uplink of massive multiple-input multiple-output systems in a multicell environment. Since the base station (BS) estimates the channel state information (CSI) using the pilot signals transmitted from the users, each BS will have ...
Transceiver Design for MIMO Systems with Improper Modulations
This paper considers joint transceiver designs for single-user multiple-input, multiple-output systems employing improper constellations such as binary phase shift-keying and M-ary amplitude shift-keying (M-ASK). Proposed are novel joint linear ...
Comments