skip to main content
10.1145/3196494.3196509acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

DeWiCam: Detecting Hidden Wireless Cameras via Smartphones

Published: 29 May 2018 Publication History

Abstract

Wireless cameras are widely deployed in surveillance systems for security guarding. However, the privacy concerns associated with unauthorized videotaping, are drawing an increasing attention recently. Existing detection methods for unauthorized wireless cameras are either limited by their detection accuracy or requiring dedicated devices. In this paper, we propose DeWiCam, a lightweight and effective detection mechanism using smartphones. The basic idea of DeWiCam is to utilize the intrinsic traffic patterns of flows from wireless cameras. Compared with traditional traffic pattern analysis, DeWiCam is more challenging because it cannot access the encrypted information in the data packets. Yet, DeWiCam overcomes the difficulty and can detect nearby wireless cameras reliably. To further identify whether a camera is in an interested room, we propose a human-assisted identification model. We implement DeWiCam on the Android platform and evaluate it with extensive experiments on 20 cameras. The evaluation results show that DeWiCam can detect cameras with an accuracy of 99% within 2.7 s.

References

[1]
Giuseppe Anastasi and Luciano Lenzini. 2000. QoS provided by the IEEE 802.11 wireless LAN to advanced data applications: a simulation analysis. Wireless Networks 6, 2 (2000), 99--100.
[2]
Ashwin Ashok, Viet Nguyen, Marco Gruteser, Narayan Mandayam,Wenjia Yuan, and Kristin Dana. 2014. Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras. In Proceedings of the 1st ACMMobiCom workshop on Visible light communication systems. ACM, 39--44.
[3]
Simon Birnbach, Richard Baker, and Ivan Martinovic. 2017. Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones. In NDSS.
[4]
Dario Bonfiglio, Marco Mellia, Michela Meo, Dario Rossi, and Paolo Tofanelli. 2007. Revealing skype traffic: when randomness plays with you. In ACM SIGCOMM Computer Communication Review, Vol. 37. ACM, 37--48.
[5]
Marina Bosi, Karlheinz Brandenburg, Schuyler Quackenbush, Louis Fielder, Kenzo Akagiri, Hendrik Fuchs, and Martin Dietz. 1997. ISO/IEC MPEG-2 advanced audio coding. Journal of the Audio engineering society 45, 10 (1997), 789--814.
[6]
Danny Bradbury. 2011. Hacking wifi the easy way. Network Security 2011, 2 (2011), 9--12.
[7]
Antonio Castelan and John Treanor. 2016. Hidden cameras found inside a Las Vegas Airbnb rental recording naked people. https://tinyurl.com/zrtysgx.
[8]
ICSLMS Committee et al. 1997. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Std 802 (1997), 50.
[9]
Laura Connor. 2016. Airbnb host admits 'using hidden cameras to film guests and swaps sex videos with other users'. https://tinyurl.com/y9kem8wm.
[10]
FutureApps. 2017. Hidden Camera Detector. https://tinyurl.com/y7nlhbx8.
[11]
GalaxyApp. 2016. Hidden Camera Detector Pro. https://tinyurl.com/y745nqf7.
[12]
Pierre Geurts, Damien Ernst, and Louis Wehenkel. 2006. Extremely randomized trees. Machine learning 63, 1 (2006), 3--42.
[13]
Jack Smith IV. 2015. Couple Wakes Up in Airbnb to Find Hidden Camera Watching Them. https://tinyurl.com/yd556cwm.
[14]
Minqiang Jiang, Xiaoquan Yi, and Nam Ling. 2004. Improved frame-layer rate control for H. 264 using MAD ratio. In Proceedings of the 2004 International Symposium on Circuits and Systems, Vol. 3. IEEE, III--813.
[15]
Thomas Karagiannis, Konstantina Papagiannaki, and Michalis Faloutsos. 2005. BLINC: multilevel traffic classification in the dark. In ACM SIGCOMM Computer Communication Review, Vol. 35. ACM, 229--240.
[16]
Randy Kenner. 2012. Man Sues After Finding Hidden Cam In Hotel Bathroom. http://www.rense.com/general29/msn.htm.
[17]
Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2016. Enhancing lifelogging privacy by detecting screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 4309--4314.
[18]
KpopJoA. 2017. Korean couple discover a hidden camera inside Airbnb guesthouse in Japan. https://tinyurl.com/y9ju55ut.
[19]
Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, and Behrang Samadi. 2009. A survey on wireless security protocols (WEP, WPA and WPA2/802.11 . In Proceedings of the 2nd International Conference on Computer Science and Information Technology. IEEE, 48--52.
[20]
Hubert W Lilliefors. 1967. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. Journal of the American statistical Association 62, 318 (1967), 399--402.
[21]
LLC LSC. 2016. Hidden Camera Detector. https://itunes.apple.com/us/app/ hidden-camera-detector/id532882360?mt=8.
[22]
D. Wegemer M. Schulz. 2005. Nexmon. https://github.com/seemoo-lab/nexmon.
[23]
News Corp Australia Network. 2016. Airbnb host admits to filming people having sex on hidden cameras. https://tinyurl.com/j7cw2a5.
[24]
Circa News. 2016. Experts say that spy cameras in Airbnb rentals are becoming harder to detect. https://tinyurl.com/y8q6khsm.
[25]
Asher L. Poretz. 2017. Spy hidden camera Detector. https://itunes.apple.com/us/ app/spy-hidden-camera-detector/id925967783?mt=8.
[26]
Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, and John Qian. 2016. Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. In WOOT.
[27]
Heiko Schwarz, Detlev Marpe, and Thomas Wiegand. 2007. Overview of the scalable video coding extension of the H. 264/AVC standard. IEEE Transactions on circuits and systems for video technology 17, 9 (2007), 1103--1120.
[28]
Bunker Hill Security. 2017. Wireless Camera RF Detector. https://www. harborfreight.com/wireless-camera-rf-detector-95053.html.
[29]
Technavio. 2017. Global Wireless Video Surveillance Market 2017--2021. https: //tinyurl.com/y7u9yfl4.
[30]
Robert Templeman, Mohammed Korayem, David J Crandall, and Apu Kapadia. 2014. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. In NDSS. 23--26.
[31]
UNIFORE Website. 2014. Introduction to Hisilicon IP Cameras. https://tinyurl. com/yaolrcje.
[32]
Andrew M White, Austin R Matthews, Kevin Z Snow, and Fabian Monrose. 2011. Phonotactic reconstruction of encrypted voip conversations: Hookt on fon-iks. In 2011 IEEE Symposium on Security and Privacy (SP). IEEE, 3--18.
[33]
Wikipedia. 2017. Closed-circuit television camera. https://en.wikipedia.org/wiki/ Closed-circuit_television_camera.
[34]
Wikipedia. 2017. CUSUM. https://en.wikipedia.org/wiki/CUSUM.
[35]
Wikipedia. 2017. P-value. https://en.wikipedia.org/wiki/P-value.
[36]
Workshop512. 2013. Glint Finder-Camera Detector. https://tinyurl.com/pbnfnur.
[37]
Xin-Wei Yao, Wan-Liang Wang, Shuang-Hua Yang, Yue-Feng Cen, Xiao-Min Yao, and Tie-Qiang Pan. 2014. Ipb-frame adaptive mapping mechanism for video transmission over ieee 802.11 e wlans. ACM SIGCOMM Computer Communication Review 44, 2 (2014), 5--12.

Cited By

View all
  • (2024)LocCamsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314327:4(1-24)Online publication date: 12-Jan-2024
  • (2024)Precise Wireless Camera Localization Leveraging Traffic-Aided Spatial AnalysisIEEE Transactions on Mobile Computing10.1109/TMC.2023.333327223:6(7256-7269)Online publication date: Jun-2024
  • (2024)Wireless Spy Camera Spotter System With Real-Time Traffic Similarity Analysis and WiFi Signal TracingIEEE Access10.1109/ACCESS.2024.335017512(4459-4470)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. DeWiCam: Detecting Hidden Wireless Cameras via Smartphones

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications Security
    May 2018
    866 pages
    ISBN:9781450355766
    DOI:10.1145/3196494
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 May 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. hidden camera detection
    2. personal privacy
    3. traffic analysis

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ASIA CCS '18
    Sponsor:

    Acceptance Rates

    ASIACCS '18 Paper Acceptance Rate 52 of 310 submissions, 17%;
    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)158
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 15 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)LocCamsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314327:4(1-24)Online publication date: 12-Jan-2024
    • (2024)Precise Wireless Camera Localization Leveraging Traffic-Aided Spatial AnalysisIEEE Transactions on Mobile Computing10.1109/TMC.2023.333327223:6(7256-7269)Online publication date: Jun-2024
    • (2024)Wireless Spy Camera Spotter System With Real-Time Traffic Similarity Analysis and WiFi Signal TracingIEEE Access10.1109/ACCESS.2024.335017512(4459-4470)Online publication date: 2024
    • (2023)Sneaky spy devices and defective detectorsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620245(123-140)Online publication date: 9-Aug-2023
    • (2023)Abuse vectorsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620242(69-86)Online publication date: 9-Aug-2023
    • (2023)ZPAWireless Communications & Mobile Computing10.1155/2023/67317832023Online publication date: 1-Jan-2023
    • (2023)Fingerprinting IoT Devices Using Latent Physical Side-ChannelsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962477:2(1-26)Online publication date: 12-Jun-2023
    • (2023)Security Threat Mitigation for Smart Contracts: A Comprehensive SurveyACM Computing Surveys10.1145/359329355:14s(1-37)Online publication date: 17-Jul-2023
    • (2023)A Systematic Review of Data Quality in CPS and IoT for Industry 4.0ACM Computing Surveys10.1145/359304355:14s(1-38)Online publication date: 17-Jul-2023
    • (2023)Towards Enhanced Identification of Emotion from Resource-Constrained Language through a novel Multilingual BERT ApproachACM Transactions on Asian and Low-Resource Language Information Processing10.1145/3592794Online publication date: 19-Apr-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media