Computer Graphics
TU Braunschweig

Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls


Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls

Video calls have become an essential part of remote work. They enable employees to collaborate from different locations, including their homes. Transmitting video from the personal living environment, however, poses a privacy risk: Colleagues may gain insight into private information through details in the background. To limit this risk, video conferencing services implement virtual backgrounds that conceal the real environment during a video call. Unfortunately, this protection suffers from imperfections and pixels from the environment occasionally become visible.

In this paper, we investigate this privacy leak. We analyze the virtual background techniques used in two major video conferencing services (Zoom and Google) and determine how pixels of the environment leak. Based on this analysis, we propose a reconstruction attack: This attack removes the virtual background by re-purposing the video conferencing

software and uses semantic segmentation to filter out the video caller. As a result, only pixels leaking from the environment remain and can be aggregated into a reconstructed image. We examine the efficacy of this attack in a quantitative and qualitative evaluation. In comparison to previous studies, our attack recovers at least 53% more leaked pixels from a video call, exposing larger areas of the environment. We thus conclude that virtual backgrounds currently do not provide an adequate protection in practice.


Author(s):Felix Weissberg, Jan Malte Hilgefort, Steve Grogorick, Daniel Arp, Thorsten Eisenhofer, Martin Eisemann, Konrad Rieck
Published:to appear
Type:Article in conference proceedings
Book:USENIX Security Symposium
Presented at:USENIX Security Symposium (USENIX) 2025


@inproceedings{weissberg2025seeing,
  title = {Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls},
  author = {Weissberg, Felix and Hilgefort, Jan Malte and Grogorick, Steve and Arp, Daniel and Eisenhofer, Thorsten and Eisemann, Martin and Rieck, Konrad},
  booktitle = {{USENIX} Security Symposium},
  year = {2025}
}

Authors

  • Felix Weissberg

    External
  • Jan Malte Hilgefort

    Student
  • Steve Grogorick

    Fmr. Senior Researcher
  • Daniel Arp

    External
  • Thorsten Eisenhofer

    External
  • Konrad Rieck

    External