Privacy-Preserving Covert Communication Using Encrypted Wearable Gesture Recognition
- URL: http://arxiv.org/abs/2602.07936v1
- Date: Sun, 08 Feb 2026 12:06:01 GMT
- Title: Privacy-Preserving Covert Communication Using Encrypted Wearable Gesture Recognition
- Authors: Tasnia Ashrafi Heya, Sayed Erfan Arefin,
- Abstract summary: This work proposes a privacy-preserving gesture-based covert communication system.<n>The system employs a multi-party homomorphic learning pipeline for gesture recognition directly over encrypted motion data.<n>To our knowledge, this work is the first to apply encrypted gesture recognition in a wearable-based covert communication setting.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Secure communication is essential in covert and safety-critical settings where verbal interactions may expose user intent or operational context. Wearable gesture-based communication enables low-effort, nonverbal interaction, but existing systems leak motion data, intermediate representations, or inference outputs to untrusted infrastructure, enabling intent inference, behavioral biometric leakage, and insider attacks. This work proposes a privacy-preserving gesture-based covert communication system that ensures, no raw sensor signals, learned features, or classification outputs are exposed to any third-party. The system employs a multi-party homomorphic learning pipeline for gesture recognition directly over encrypted motion data, preventing adversaries from inferring gesture semantics, replaying sensor traces, or accessing intermediate representations. To our knowledge, this work is the first to apply encrypted gesture recognition in a wearable-based covert communication setting. We design and evaluate haptic and visual feedback mechanisms for covert signal delivery and evaluate the system using 600 gesture samples from a commodity smartwatch, achieving over 94.44% classification accuracy and demonstrating the feasibility of the proposed system with practical deployability from high-performance systems to resource-constrained edge devices.
Related papers
- BLINDSPOT: Enabling Bystander-Controlled Privacy Signaling for Camera-Enabled Devices [1.713098606679826]
We present BlindSpot, an on-device system that enables bystanders to manage their own privacy by signaling their privacy preferences in real-time.<n>Our main contribution is the design and comparative evaluation of three distinct signaling modalities.<n>We implement the complete system (BlindSpot) on a commodity smartphone and conduct a comprehensive evaluation of each modality's accuracy and latency.
arXiv Detail & Related papers (2025-12-12T19:12:04Z) - Finding Phones Fast: Low-Latency and Scalable Monitoring of Cellular Communications in Sensitive Areas [6.422892494095325]
Low-latency systems are crucial to allow for timely detection, decision (e.g., geofencing or localization) and disruption of unauthorized communication in sensitive areas.<n>We propose LTag, the first low-latency, operator-independent and scalable system designed to monitor cellular connections across all operators prior to any user data transmission.
arXiv Detail & Related papers (2025-09-29T19:39:12Z) - Collaborative Inference over Wireless Channels with Feature Differential Privacy [57.68286389879283]
Collaborative inference among multiple wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.
transmitting extracted features poses a significant privacy risk, as sensitive personal data can be exposed during the process.
We propose a novel privacy-preserving collaborative inference mechanism, wherein each edge device in the network secures the privacy of extracted features before transmitting them to a central server for inference.
arXiv Detail & Related papers (2024-10-25T18:11:02Z) - Rate-Distortion-Perception Theory for Semantic Communication [73.04341519955223]
We study the achievable data rate of semantic communication under the symbol distortion and semantic perception constraints.
We observe that there exists cases that the receiver can directly infer the semantic information source satisfying certain distortion and perception constraints.
arXiv Detail & Related papers (2023-12-09T02:04:32Z) - Agile gesture recognition for capacitive sensing devices: adapting
on-the-job [55.40855017016652]
We demonstrate a hand gesture recognition system that uses signals from capacitive sensors embedded into the etee hand controller.
The controller generates real-time signals from each of the wearer five fingers.
We use a machine learning technique to analyse the time series signals and identify three features that can represent 5 fingers within 500 ms.
arXiv Detail & Related papers (2023-05-12T17:24:02Z) - Cognitive Semantic Communication Systems Driven by Knowledge Graph:
Principle, Implementation, and Performance Evaluation [74.38561925376996]
Two cognitive semantic communication frameworks are proposed for the single-user and multiple-user communication scenarios.
An effective semantic correction algorithm is proposed by mining the inference rule from the knowledge graph.
For the multi-user cognitive semantic communication system, a message recovery algorithm is proposed to distinguish messages of different users.
arXiv Detail & Related papers (2023-03-15T12:01:43Z) - Adversarial Learning for Implicit Semantic-Aware Communications [104.08383219177557]
We develop a novel adversarial learning-based implicit semantic-aware communication architecture (iSAC)
We prove that by applying iSAC, the destination user can always learn an inference rule that matches the true inference rule of the source messages.
Experimental results show that the proposed iSAC can offer up to a 19.69 dB improvement over existing non-inferential communication solutions.
arXiv Detail & Related papers (2023-01-27T08:28:12Z) - Task-Oriented Communications for NextG: End-to-End Deep Learning and AI
Security Aspects [78.84264189471936]
NextG communication systems are beginning to explore shifting this design paradigm to reliably executing a given task such as in task-oriented communications.
Wireless signal classification is considered as the task for the NextG Radio Access Network (RAN), where edge devices collect wireless signals for spectrum awareness and communicate with the NextG base station (gNodeB) that needs to identify the signal label.
Task-oriented communications is considered by jointly training the transmitter, receiver and classifier functionalities as an encoder-decoder pair for the edge device and the gNodeB.
arXiv Detail & Related papers (2022-12-19T17:54:36Z) - GesSure -- A Robust Face-Authentication enabled Dynamic Gesture
Recognition GUI Application [1.3649494534428745]
This paper aims to design a robust, face-verification-enabled gesture recognition system.
We use meaningful and relevant gestures for task operation, resulting in a better user experience.
Our prototype has successfully executed context-dependent tasks like save, print, control video-player operations and exit, and context-free operating system tasks like sleep, shut-down, and unlock intuitively.
arXiv Detail & Related papers (2022-07-22T12:14:35Z) - Attribute Inference Attack of Speech Emotion Recognition in Federated
Learning Settings [56.93025161787725]
Federated learning (FL) is a distributed machine learning paradigm that coordinates clients to train a model collaboratively without sharing local data.
We propose an attribute inference attack framework that infers sensitive attribute information of the clients from shared gradients or model parameters.
We show that the attribute inference attack is achievable for SER systems trained using FL.
arXiv Detail & Related papers (2021-12-26T16:50:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.