<div class="csl-bib-body">
<div class="csl-entry">Weißberg, F., Hilgefort, J. M., Grogorick, S., Arp, D., Eisenhofer, T., Eisemann, M., & Rieck, K. (2025). Seeing through: analyzing and attacking virtual backgrounds in video calls. In <i>SEC ’25: Proceedings of the 34th USENIX Conference on Security Symposium</i> (pp. 6561–6580). Association for Computing Machinery.</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/222934
-
dc.description.abstract
Video calls have become an essential part of remote work. They enable employees to collaborate from different locations, including their homes. Transmitting video from the personal living environment, however, poses a privacy risk: Colleagues may gain insight into private information through details in the background. To limit this risk, video conferencing services implement virtual backgrounds that conceal the real environment during a video call. Unfortunately, this protection suffers from imperfections and pixels from the environment occasionally become visible.
In this paper, we investigate this privacy leak. We analyze the virtual background techniques used in two major video conferencing services (Zoom and Google) and determine how pixels of the environment leak. Based on this analysis, we propose a reconstruction attack: This attack removes the virtual background by re-purposing the video conferencing software and uses semantic segmentation to filter out the video caller. As a result, only pixels leaking from the environment remain and can be aggregated into a reconstructed image.
We examine the efficacy of this attack in a quantitative and qualitative evaluation. In comparison to previous studies, our attack recovers at least 53% more leaked pixels from a video call, exposing larger areas of the environment. We thus conclude that virtual backgrounds currently do not provide an adequate protection in practice.
en
dc.description.sponsorship
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds
-
dc.language.iso
en
-
dc.subject
Video Conferencing
en
dc.subject
Privacy
en
dc.subject
Background Reconstruction
en
dc.title
Seeing through: analyzing and attacking virtual backgrounds in video calls
en
dc.type
Inproceedings
en
dc.type
Konferenzbeitrag
de
dc.contributor.affiliation
Technische Universität Berlin, Germany
-
dc.contributor.affiliation
Technische Universität Braunschweig, Germany
-
dc.contributor.affiliation
Technische Universität Braunschweig, Germany
-
dc.contributor.affiliation
Technische Universität Berlin, Germany
-
dc.contributor.affiliation
Technische Universität Braunschweig, Germany
-
dc.contributor.affiliation
Technische Universität Berlin, Germany
-
dc.relation.isbn
978-1-939133-52-6
-
dc.description.startpage
6561
-
dc.description.endpage
6580
-
dc.relation.grantno
VRG23-011
-
dc.type.category
Full-Paper Contribution
-
tuw.booktitle
SEC '25: Proceedings of the 34th USENIX Conference on Security Symposium
-
tuw.relation.publisher
Association for Computing Machinery
-
tuw.project.title
Building Robust and Explainable AI-based Defenses for Computer Security
-
tuw.researchTopic.id
I5
-
tuw.researchTopic.id
I4
-
tuw.researchTopic.name
Visual Computing and Human-Centered Technology
-
tuw.researchTopic.name
Information Systems Engineering
-
tuw.researchTopic.value
50
-
tuw.researchTopic.value
50
-
tuw.publication.orgunit
E192-06 - Forschungsbereich Security and Privacy
-
dc.description.numberOfPages
20
-
tuw.author.orcid
0009-0001-2631-9031
-
tuw.author.orcid
0009-0008-2576-2657
-
tuw.author.orcid
0000-0003-2837-2642
-
tuw.author.orcid
0000-0003-3628-794X
-
tuw.author.orcid
0000-0002-5054-8758
-
tuw.event.name
SEC '25: 34th USENIX Conference on Security Symposium
en
tuw.event.startdate
13-08-2025
-
tuw.event.enddate
15-08-2025
-
tuw.event.online
On Site
-
tuw.event.type
Event for scientific audience
-
tuw.event.place
Seattle
-
tuw.event.country
US
-
tuw.event.presenter
Weißberg, Felix
-
wb.sciencebranch
Informatik
-
wb.sciencebranch
Mathematik
-
wb.sciencebranch.oefos
1020
-
wb.sciencebranch.oefos
1010
-
wb.sciencebranch.value
80
-
wb.sciencebranch.value
20
-
item.grantfulltext
none
-
item.languageiso639-1
en
-
item.cerifentitytype
Publications
-
item.openairecristype
http://purl.org/coar/resource_type/c_5794
-
item.fulltext
no Fulltext
-
item.openairetype
conference paper
-
crisitem.author.dept
Technische Universität Berlin, Germany
-
crisitem.author.dept
Technische Universität Braunschweig, Germany
-
crisitem.author.dept
Technische Universität Braunschweig, Germany
-
crisitem.author.dept
E192-06 - Forschungsbereich Security and Privacy
-
crisitem.author.dept
Technische Universität Berlin, Germany
-
crisitem.author.dept
Technische Universität Braunschweig, Germany
-
crisitem.author.dept
Technische Universität Berlin, Germany
-
crisitem.author.orcid
0009-0001-2631-9031
-
crisitem.author.orcid
0009-0008-2576-2657
-
crisitem.author.orcid
0000-0003-2837-2642
-
crisitem.author.orcid
0000-0003-3628-794X
-
crisitem.author.orcid
0000-0002-5054-8758
-
crisitem.author.parentorg
E192 - Institut für Logic and Computation
-
crisitem.project.funder
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds