Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information

The cybersecurity breaches expose surveillance video streams to forgery attacks, under which authentic streams are falsified to hide unauthorized activities. Traditional video forensics approaches can localize forgery traces using spatialtemporal analysis on relatively long video clips, while falling short in real-time forgery detection. The recent work correlates time-series camera and wireless signals to detect looped videos but cannot realize fine-grained forgery localization. To overcome these limitations, we propose Secure-Pose, which exploits the pervasive coexistence of surveillance and Wi-Fi infrastructures to defend against video forgery attacks in a real-time and finegrained manner. We observe that coexisting camera and WiFi signals convey common human semantic information and forgery attacks on video streams will decouple such information correspondence. Particularly, retrievable human pose features are first extracted from concurrent video and Wi-Fi channel state information (CSI) streams. Then, a lightweight detection network is developed to accurately discover forgery attacks and an efficient localization algorithm is devised to seamlessly track forgery traces in video streams. We implement SecurePose using one Logitech camera and two Intel 5300 NICs and evaluate it in different environments. Secure-Pose achieves a high detection accuracy of 98.7% and localizes abnormal objects under playback and tampering attacks.

[1]  Hao Wang,et al.  Authenticating On-Body IoT Devices: An Adversarial Learning Approach , 2020, IEEE Transactions on Wireless Communications.

[2]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting duplication , 2007, MM&Sec.

[3]  Chenglin Miao,et al.  Towards 3D human pose construction using wifi , 2020, MobiCom.

[4]  Yaser Sheikh,et al.  OpenPose: Realtime Multi-Person 2D Pose Estimation Using Part Affinity Fields , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Inkyu Bang,et al.  SurFi: detecting surveillance camera looping attacks with wi-fi channel state information , 2019, WiSec.

[6]  T. Jiang,et al.  Enabling Low-Power OFDM for IoT by Exploiting Asymmetric Clock Rates , 2020, IEEE/ACM Transactions on Networking.

[7]  Tao Jiang,et al.  Cross-Technology Communications for Heterogeneous IoT Devices Through Artificial Doppler Shifts , 2018, IEEE Transactions on Wireless Communications.

[8]  Bin Li,et al.  Automatic Detection of Object-Based Forgery in Advanced Video , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Ming Yang,et al.  3D Convolutional Neural Networks for Human Action Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[11]  Trevor Darrell,et al.  Fully Convolutional Networks for Semantic Segmentation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Yong Huang,et al.  Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos , 2021, IEEE INFOCOM 2021 - IEEE Conference on Computer Communications.

[13]  Tianqiang Huang,et al.  Using similarity analysis to detect frame duplication forgery in videos , 2014, Multimedia Tools and Applications.

[14]  Adeel Anjum,et al.  An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues , 2019, Multimedia Tools and Applications.

[15]  Ross B. Girshick,et al.  Mask R-CNN , 2017, 1703.06870.

[16]  Frédo Durand,et al.  Capturing the human figure through a wall , 2015, ACM Trans. Graph..

[17]  Honghai Liu,et al.  Intelligent Video Systems and Analytics: A Survey , 2013, IEEE Transactions on Industrial Informatics.

[18]  Fei Wang,et al.  Person-in-WiFi: Fine-Grained Person Perception Using WiFi , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[19]  Vasif V. Nabiyev,et al.  Frame duplication/mirroring detection method with binary features , 2017, IET Image Process..

[20]  Antonio Torralba,et al.  RF-based 3D skeletons , 2018, SIGCOMM.

[21]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[22]  Wei Wang,et al.  Understanding and Modeling of WiFi Signal Based Human Activity Recognition , 2015, MobiCom.

[23]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[24]  David Wetherall,et al.  Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.

[25]  Yongsen Ma,et al.  WiFi Sensing with Channel State Information , 2019, ACM Comput. Surv..

[26]  Kaiming He,et al.  Feature Pyramid Networks for Object Detection , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[27]  Laurence B. Milstein,et al.  Resource Allocation and Performance Analysis for Multiuser Video Transmission Over Doubly Selective Channels , 2015, IEEE Transactions on Wireless Communications.

[28]  Wei Wang,et al.  Gait recognition using wifi signals , 2016, UbiComp.