CamDetector Detecting and Positioning Hidden Cameras With Raspberry Pi 4 Via EM Radiation
CamDetector Detecting and Positioning Hidden Cameras With Raspberry Pi 4 Via EM Radiation
3598
Authorized licensed use limited to: Malnad College of Engineering. Downloaded on May 22,2025 at 05:48:40 UTC from IEEE Xplore. Restrictions apply.
(a) Frame rate (15 Hz) (b) Line readout waveform (52.1 kHz)
3599
Authorized licensed use limited to: Malnad College of Engineering. Downloaded on May 22,2025 at 05:48:40 UTC from IEEE Xplore. Restrictions apply.
(a) Before folding (b) After folding
Fig. 5. The line frequency coupled at 381.825MHz before and after folding
at 30 cm.
This stage will cost time around 2s, we can assume the peak
Max Distance.
value is emitted from hidden cameras after subtraction. Label Power
(cm)
B. Feature Judgement C1 Battery 50
C2 Battery 43
After we get the full-band spectrum, we will focus on if the C3 USB 88
spectrum has the feature mentioned in section III. C4 USB 57
1) Frequency Domain: First, we should group the harmon- C5 USB 132
C6 USB 165
ics of system clock used by CMOS sensor for further analysis.
We use the folding method to better group the harmonics
and improve the SNR by presetting the period size and
amining the max detection distance of cameras in laboratory
segmentation, and comparing the peaks after superimposing.
environment and examing the SNR and TPR at various dis-
We learn that the commercial cameras mostly have resolu-
tances. Following that, we evaluate the detection accuracy of
tions of 1920*1080, 1080*720 and frame rate ranging from
CamDetectorin a real-world scene with interference from other
10fps to 30fps. So the line frequency fl is in the range of
devices. Finally, we invite volunteers to use CamDetectorto
10KHz to 60KHz by calculating. This value can be used to
detect hidden cameras in a room and evaluate their detection
jointly determine the feature of the frequency domain. After
time and accuracy.
folding each component of harmonics, the line frequency
can also be grouped as shown in Fig 5(a)-(b). The SNR of A. Experimental Setup
baseband frequency improves from 7.2dB to 21.6dB which
benifits the detection distance. Targeted cameras. Our criteria for a targeted camera are
2) Time Domain: We can further improve the detection small-size and ease of disguise, i.e., more likely to be used
accuracy by observing the feature of time domain mentioned as a spy camera by an attacker. fig. 6 shows the 6 cameras
in section III-B as the magnitude of baseband’s frequency is we selected on top shopping platforms, consisting of 2 com-
consistent with frame rate of the hidden camera. To minimize mercially available battery-powered compact cameras and 4
the time of one detection, we choose 1.6 s to record the USB-powered cameras. We present the label, power supply
magnitude. In our experiments, the average time of detection type and corresponding results in table I.
is 11.3 s. Equipment. As shown in fig. 6, A to F stand for DC power
supply, a magnetic filed probe NFP-3, a low noise amplifier
V. E VALUATION LNA-650, the USRP B200 mini, a Raspberry Pi 4 and a 3.5
In this section, we describe our experimental setup and inch display. These devices are small, inexpensive and easy to
evaluate the performance of CamDetector. We start by ex- carry.
3600
Authorized licensed use limited to: Malnad College of Engineering. Downloaded on May 22,2025 at 05:48:40 UTC from IEEE Xplore. Restrictions apply.
Fig. 7. The relationship between the average TPR and the detection distance.
3601
Authorized licensed use limited to: Malnad College of Engineering. Downloaded on May 22,2025 at 05:48:40 UTC from IEEE Xplore. Restrictions apply.
TABLE II [14] Z. Liu, F. Lin, C. Wang, Y. Shen, Z. Ba, L. Lu, W. Xu, and K. Ren,
L OCATION RESULTS OF C AM D ETECTOR “Camradar: Hidden camera detection leveraging amplitude-modulated
sensor images embedded in electromagnetic emanations,” Proceedings of
Position Number Time Accuracy the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies,
A 5 14.6min 100% vol. 6, no. 4, pp. 1–25, 2023.
B 5 15.4min 100%
C 5 20.3min 60%
D 5 17.2min 80%
VI. CONCLUSION
R EFERENCES
[1] Rebecca Edwards, “Security camera laws, rights, and rules,” 2022,
https://www.safewise.com/security-camera-laws/.
[2] Aliza Vigderman, Gabe Turner, “Are security cameras legal?” 2022,
https://www.security.org/security-cameras/legality/.
[3] Y. Cheng, X. Ji, T. Lu, and W. Xu, “Dewicam: Detecting hidden
wireless cameras via smartphones,” in Proceedings of the 2018 on Asia
Conference on Computer and Communications Security, 2018, pp. 1–13.
[4] Y. He, Q. He, S. Fang, and Y. Liu, “Motioncompass: pinpointing wireless
camera via motion-activated traffic,” in Proceedings of the 19th Annual
International Conference on Mobile Systems, Applications, and Services,
2021, pp. 215–227.
[5] S. Sami, S. R. X. Tan, B. Sun, and J. Han, “Lapd: Hidden spy camera
detection using smartphone time-of-flight sensors,” in Proceedings of the
19th ACM Conference on Embedded Networked Sensor Systems, 2021,
pp. 288–301.
[6] A. Zuniga, N. H. Motlagh, M. A. Hoque, S. Tarkoma, H. Flores, and
P. Nurmi, “See no evil: Discovering covert surveillance devices using
thermal imaging,” IEEE Pervasive Computing, vol. 21, no. 4, pp. 33–42,
2022.
[7] M. Jin, R. Jia, Z. Kang, I. C. Konstantakopoulos, and C. J. Spanos, “Pres-
encesense: Zero-training algorithm for individual presence detection
based on power monitoring,” in Proceedings of the 1st ACM conference
on embedded systems for energy-efficient buildings, 2014, pp. 1–10.
[8] H. Aniktar, D. Baran, E. Karav, E. Akkaya, Y. S. Birecik, and M. Sezgin,
“Getting the bugs out: A portable harmonic radar system for electronic
countersurveillance applications,” IEEE Microwave Magazine, vol. 16,
no. 10, pp. 40–52, 2015.
[9] J. Raoult, A. Martorell, L. Chusseau, and C. Carel, “Intermodulation
radar for rf receiver detections,” in Proceedings of the 2018 15th
European Radar Conference (EuRAD). IEEE, 2018, pp. 273–276.
[10] P. Lui, “Passive intermodulation interference in communication sys-
tems,” Electronics & Communication Engineering Journal, vol. 2, no. 3,
pp. 109–118, 1990.
[11] G. Camurati, S. Poeplau, M. Muench, T. Hayes, and A. Francillon,
“Screaming channels: When electromagnetic side channels meet radio
transceivers,” in Proceedings of the 2018 ACM SIGSAC Conference on
Computer and Communications Security, 2018, pp. 163–177.
[12] J. Choi, H.-Y. Yang, and D.-H. Cho, “Tempest comeback: A realistic
audio eavesdropping threat on mixed-signal socs,” in Proceedings of
the 2020 ACM SIGSAC Conference on Computer and Communications
Security, 2020, pp. 1085–1101.
[13] M. Berouti, R. Schwartz, and J. Makhoul, “Enhancement of speech cor-
rupted by acoustic noise,” in ICASSP’79. IEEE International Conference
on Acoustics, Speech, and Signal Processing, vol. 4. IEEE, 1979, pp.
208–211.
3602
Authorized licensed use limited to: Malnad College of Engineering. Downloaded on May 22,2025 at 05:48:40 UTC from IEEE Xplore. Restrictions apply.