Mobile Devices based Eavesdropping of Handwriting

被引:6
作者
Yu, Tuo [1 ]
Jin, Haiming [2 ]
Nahrstedt, Klara [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
[2] Univ Illinois, Coordinated Sci Lab, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
Mobile handsets; Eavesdropping; Handwriting recognition; Tracking; Dictionaries; Mobile computing; handwriting analysis; signal processing; RECOGNITION; ONLINE;
D O I
10.1109/TMC.2019.2912747
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When filling out privacy-related forms in public places such as hospitals or clinics, people usually are not aware that the sound of their handwriting leaks personal information. In this paper, we explore the possibility of eavesdropping on handwriting via nearby mobile devices based on audio signal processing and machine learning. By presenting a proof-of-concept system, WritingHacker, we show the usage of mobile devices to collect the sound of victims' handwriting, and to extract handwriting-specific features for machine learning based analysis. WritingHacker focuses on the situation where the victim's handwriting follows certain print style. An attacker can keep a mobile device, such as a common smartphone, touching the desk used by the victim to record the audio signals of handwriting. Then, the system can provide a word-level estimate for the content of the handwriting. To reduce the impacts of various writing habits and writing locations, the system utilizes the methods of letter clustering, dictionary filtering and letter time length based offsetting. Moreover, if the relative position between the device and the handwriting is known, a hand motion tracking method can be further applied to enhance the system's performance. Our prototype system's experimental results show that the accuracy of word recognition reaches around 70 - 80 percent under certain conditions, which reveals the danger of privacy leakage through the sound of handwriting.
引用
收藏
页码:1649 / 1663
页数:15
相关论文
共 33 条
  • [1] Aoki M., 2001, Acoustical Science and Technology, V22, P149, DOI 10.1250/ast.22.149
  • [2] Asonov D, 2004, P IEEE S SECUR PRIV, P3
  • [3] ClearShot: Eavesdropping on keyboard input from video
    Balzarotti, Davide
    Cova, Marco
    Vigna, Giovanni
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 170 - +
  • [4] Bashir M., 2008, INT J ELECT COMPUT E, V2, P1839, DOI 10.5281/zenodo.1081501
  • [5] Berger Y., 2006, P 13 ACM C COMP COMM, P245
  • [6] Distributed detection with multiple sensors .2. Advanced topics
    Blum, RS
    Kassam, SA
    Poor, HV
    [J]. PROCEEDINGS OF THE IEEE, 1997, 85 (01) : 64 - 79
  • [7] Calkins H, 2017, J ARRYTHM, V33, P369, DOI 10.1016/j.joa.2017.08.001
  • [8] GyroPen: Gyroscopes for Pen-Input With Mobile Phones
    Deselaers, Thomas
    Keysers, Daniel
    Hosang, Jan
    Rowley, Henry A.
    [J]. IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2015, 45 (02) : 263 - 271
  • [9] Dubay I., 2011, YES ITS TIME STOP ON
  • [10] Content-based audio classification and retrieval by support vector machines
    Guo, GD
    Li, SZ
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2003, 14 (01): : 209 - 215