Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls

Video calls have become an essential part of remote work. They enable employees to collaborate from different locations, including their homes. Transmitting video from the personal living environment, however, poses a privacy risk: Colleagues may gain insight into private information through details in the background. To limit this risk, video conferencing services implement virtual backgrounds that conceal the real environment during a video call. Unfortunately, this protection suffers from imperfections and pixels from the environment occasionally become visible.
In this paper, we investigate this privacy leak. We analyze the virtual background techniques used in two major video conferencing services (Zoom and Google) and determine how pixels of the environment leak. Based on this analysis, we propose a reconstruction attack: This attack removes the virtual background by re-purposing the video conferencing
software and uses semantic segmentation to filter out the video caller. As a result, only pixels leaking from the environment remain and can be aggregated into a reconstructed image. We examine the efficacy of this attack in a quantitative and qualitative evaluation. In comparison to previous studies, our attack recovers at least 53% more leaked pixels from a video call, exposing larger areas of the environment. We thus conclude that virtual backgrounds currently do not provide an adequate protection in practice.
Author(s): | Felix Weissberg, Jan Malte Hilgefort, Steve Grogorick, Daniel Arp, Thorsten Eisenhofer, Martin Eisemann, Konrad Rieck |
---|---|
Published: | to appear |
Type: | Article in conference proceedings |
Book: | USENIX Security Symposium |
Presented at: | USENIX Security Symposium (USENIX) 2025 |
@inproceedings{weissberg2025seeing, title = {Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls}, author = {Weissberg, Felix and Hilgefort, Jan Malte and Grogorick, Steve and Arp, Daniel and Eisenhofer, Thorsten and Eisemann, Martin and Rieck, Konrad}, booktitle = {{USENIX} Security Symposium}, year = {2025} }
Authors
Felix Weissberg
ExternalJan Malte Hilgefort
StudentSteve Grogorick
Fmr. Senior ResearcherDaniel Arp
ExternalThorsten Eisenhofer
ExternalMartin Eisemann
DirectorKonrad Rieck
External