Tracking program through the laptop camera. How to determine if the webcam of a laptop or computer has been hacked? Are they following me on the webcam?

An unknown hacker puts on an Internet show for several days in a row, spying on people using webcams. This is not the first time that users have been monitored through their own computers and smartphones - many intruders and Western intelligence officers have done this. Lenta.ru found out whether it is possible to protect the webcam from hacking.

amateur peep

On Tuesday, April 26, an anonymous member of the Dvach imageboard created a forum thread where he announced an unusual Internet show. He promised that within a couple of hours he would broadcast a YouTube broadcast and follow random network users live. Moreover, they unexpectedly launch various applications on the computers of the victims, turn on porn and upload their data to the network.

So that the audience does not get bored, the self-proclaimed showman announced "full interactive" - ​​viewers will be able to send their requests to the chat, which he will immediately fulfill. After some time, a link to the Synchtube service appeared in the recording, where, in addition to the built-in video broadcast from YouTube, a chat was organized and donations were collected. In order to guarantee the fulfillment of their requests, users were asked to send the hacker a symbolic sum of two or three rubles for the “development of the project”.

At the very beginning of the broadcast, it became clear that the attacker was acting through the LuminosityLink system. It is commonly used by network administrators to manage computer networks from a distance. However, there are many pirated versions of the program on the Internet that can be configured to spy on users, infect them with viruses and organize DDoS attacks. Relevant instructions are easy to find on YouTube.

For more than two hours of broadcasting, the hacker managed to connect to several dozen computers. He usually watched what the victim was doing for a couple of minutes, and then suddenly displayed various videos or photos on the screen of the person. So, a young couple from Russia was forced to see gay porn, and a Ukrainian policeman was forced to watch a bloody mixed martial arts fight.

The next day, the hacker mastered another entertainment: turn on music on VKontakte. I managed to wake one of the users with it. The attacker tried in every possible way to anger people, because this was what the audience of the show expected. Usually, the victims immediately began to scan their computer for viruses, but the showman simply added antiviruses to the list of prohibited programs.

Spectators reacted especially violently to several users who turned off the Internet out of fear, and to a young man who decided to call the police. They also laughed at the one who entered into correspondence with the hacker, thinking that he was in dialogue with the support service of the Internet provider. Prior to this, the author of the broadcast displayed information about skin diseases on the screen for ten minutes.

The most curious thing is that the attacker is extremely difficult to figure out. Dvach has long been famous for guaranteed anonymity for all users, and the hacker himself probably uses VPN and other services to mask his IP address. The network, however, suggested that the broadcasts were organized by Dmitry Shalashov, a well-known YouTube browser for various hacker programs, since the voice is similar.

Site for cameras

The Dvacha hacker is far from the only attacker who spies on people through webcams. In 2014, the BBC reported on a Russian site that allowed the world to follow live webcams. More than 2,500 channels from the USA, 2,000 from France and 1,500 from the Netherlands were available on the resource.

The webcams of Russian users also got on this portal. The Threat Post edition found about 70 working cameras from Moscow, Korolev, Krasnodar and other cities.

BBC journalists then contacted the owner of the resource. He stated that he had nothing to do with Russia, and refused to recognize himself as a hacker. According to him, he received access to all broadcasts after entering a simple password to the cameras, which the users themselves did not change from the standard one. At the same time, the Networkworld website calculated that about 73,000 webcams in 256 countries were protected by default with a password.

There really was no break-in. Users who did not change the factory settings and passwords, in fact, provided attackers with access to their webcams.

The emergence of an aggregator of unprotected webcams was only a matter of time. The creators of the portal did not need to look for software vulnerabilities or run a phishing site to steal passwords. Unprotected cameras were found using a simple search query.

After widespread publicity, the site was taken down. Foscam wireless camera makers said at the time that they changed the software after the incident, and their cameras now force users to set up complex passwords, preventing them from working with standard factory security settings.

Snowden's truth

Edward Snowden, a former employee of the US National Security Agency, also spoke about the fact that webcams are used for surveillance. In his revealing materials, he said that the American and British intelligence services are tapping phones, tracking correspondence on social networks and instant messengers, money transactions and ticket purchases. In addition, the NSA has access to millions of webcams and can monitor users through them. It became clear that absolutely unhackable technologies do not exist.

Snowden provided details of how intelligence agencies monitored video chats in February 2014. According to published materials, a special Optic Nerve program was used for this, capable of recognizing human faces. Initially, it was created to fight crime, and with its help it was planned to search for terrorists, but eventually turned into a tool for mass surveillance.

Optic Nerve was developed by British intelligence. According to Snowden, the program automatically took screenshots of randomly selected video chats every five seconds and stored them in a special database. Among these images, frames of an erotic nature often came across. Optic Nerve was launched in 2008, and within six months, intelligence received images from 1.8 million network users.

For surveillance, British intelligence used only Yahoo! Inc, and shared data exclusively with their American counterparts. At Yahoo! Inc. knew nothing about it.

To each according to his work

However, hackers do not always succeed in escaping responsibility. For example, in 2013, a case was opened in the United States against 19-year-old Jared James Abrahams (Jared James Abrahams). The young man obtained illegal access to the computers of the girls and took candid pictures of them through webcams. He then threatened his victims to publish these materials if they did not send him more erotic photos.

Abrahams also tried his former classmate Cassidy Wolf (Cassidy Wolf), the winner of the Miss Teen USA 2013 title. The girl refused to comply with the demands of Abrahams. He carried out his threat and posted pictures taken from the webcam online. As a result, his

How to check if the camera is following the user or not?

Hello, today we will talk about how to check if the webcam of your laptop or computer is working now, and the camera is now monitoring your movements, or can you pick your nose?

The fact that any mobile device is now equipped with a camera is damn convenient. Have you ever thought that the camera can shoot without your permission? After all, with its only existence it is aimed at the one who settled down in front of the monitor. That is you.

We follow further. If the camera is built-in, then the LED blinking next to it often “gives out” the work process. The same "eye" is located on the device mounted on the monitor of a stationary PC. Well… well, if so, and you suddenly noticed it. And if not, and the camera is following you right now? She can do it without blinking...

Immediately about the unpleasant.

There are a lot of options when a hacker can turn on the camera from a distance. This is usually done using two options:

  • a Trojan program, and it will be compiled not only in order to broadcast the image from the camera. After all, the picture itself does not matter. Sometimes turning on the camera and subsequent recording goes along with another, huge number of programs that allow, among other things, to disable most of the Windows security features. A typical and most elementary example of such a Trojan is .
  • who does not know (he meter), I advise you to get to know him at least superficially. And if in the first paragraph the dexterity of a hacker can come to naught thanks to a good anti-virus package, then there is no panacea for this - the anti-virus does not isolate an open meter session. And among the running services, recording screenshots from the screen or webcam can also be started there. Read the article at the link.

Is the camera watching? Quick option.

Let's check...

But first, I will ask you to download a very good program called Process Explorer. It is very useful for those who are interested in the nature of certain processes that take place in Windows, allowing you to track programs and programs running on the system. With its help, it is easy to detect viruses and other rubbish, which successfully disguises itself as popular processes. Program Process Explorer will appear in my articles more than once, it is high time for you to acquire it. It is in English, does not require installation, a simple executable file.

But let's get back to “our sheep” and check who the camera is following.

Download the Process Explorer program from the Microsoft website in a zip archive

To check the details of your device (yes, any!), you will need its full name. The device manager in Windows will issue it with giblets. A computer(across Start) - right mouse PropertiesDevice Manager.

Now find the imaging devices. Expand the item. And right click Properties. Copy the device name in the tab Device description:

Now we launch Process Explorer. It reminds me of the windows task manager. On the left in the toolbar, find the icon with binoculars. Click on it and paste what you copied. Click Search

If something has already alerted you, kill the process using the two buttons above, starting with Kill . See what happens to the performance of the camera and the program for working with the camera. If nothing happened - an option to think about the fact that someone else knows what your face looks like in front of the monitor. And the fact that the camera is watching you, consider it a proven fact.

  • in order to correctly identify your camera among other devices of a computer and laptop, you will need its full name in the list of equipment. No one can tell you better than the Windows Manager. We press WIN + R, we collect a team
devmgmt.msc

Copy the name from the tab Intelligence under paragraph Device description and type it in the open search box Process Explorer(CTRL+F). How to proceed, you know. Check and make sure.

How to prevent?

I'll tell you a secret - a well-hidden Trojan will hide the "process" so that no one will notice it. Therefore, make sure that the infection does not get into the computer. If there is no good antivirus package, your computer is open for surveillance. And it will solve most problems. Bypass antivirus protection, and sometimes even at the level Difender-but from Windows 10, maybe not every “hacker”. There are few professionals who will encroach on your camera. And without an antivirus, there is nothing to do on the network at all. The problem is sometimes that hackers often have very specific titles and positions.

There is an option to turn it off. And turn it on only for the duration of the session. Is the camera built in? In sure there is an option to disable the camera from there. Dance from the word camera in the CMOS settings. Use this. If you use it often, the next option is suitable.

There are two ways to use a digital camera as a webcam - using the built-in webcam mode or using the camera as a video capture device. Let's consider each of these options.

First of all, check the instructions for your camera to see if it can work as a webcam. Many digital cameras have this feature. You just need to install proprietary software to use it as a webcam - most often it can be found on the website of the camera manufacturer. Install the necessary software before connecting the camera.


Procedure:

  • Connect your camera to a computer - connection is possible both via a USB cable and (if necessary) using audio / video cables that can be supplied with the camera.
  • Go to "My Computer" (when using Windows 7, 8 or 8.1) and click on the USB video capture device icon. Most likely, the captured video from the camera will appear. If this does not happen, check if the power supply is connected to the camera. Some cameras cannot function as webcams unless an external power supply is connected. Webcam mode requires more power and the built-in battery or batteries are not enough.
  • Use a separate microphone if your camera is not transmitting sound.
  • Find out the focal length of the camera. The minimum focal length of the lenses determines the minimum distance to the object. Generally, the shorter the focal length, the closer you can position your subject.
  • Make sure that the cables are connected firmly to avoid breakage during the broadcast.
  • You can select the required webcam in the program that you will use (Skype, etc.)
You can choose a high-quality camera or camera in our or.

In the second case, if the camera does not have an operating mode as a webcam, but can broadcast an image via a video cable, you will need not only drivers, but also specialized software for redirecting the video signal to the Internet (for example, ManyCam, Active WebCam, SplitCam programs). Standard video capture programs can save video recordings taken by the camera to a hard disk, but they cannot broadcast this signal to the network - therefore, you need to take care of choosing the necessary program in advance.

To organize the operation of the camera as a webcam, you must have a video capture device (Capture Video) on your computer. Such a device for capturing video can be a TV tuner, a video card, or a special adapter. The input usually uses a video input for video in the form of a "tulip" connector. Through it, the camera is connected.

The camera must be connected in the off state. With the help of the video capture program, you should see the video from the camera (make sure you specify the correct video input - composite "composite"). You can then configure programs to use your video capture device (your camera) as a webcam.

Recently, programs have appeared on the Internet that allow people to spy on other people through a camera. As a rule, they are created for specific purposes and not everyone has access to them. But still there are people who are able to use these programs. To protect your personal space, you need to learn how these programs work and whether you can protect yourself from them.

Yes, it is possible. Hackers know how to write software codes that can perform this function. Most often, programs are written not for public purposes (they are illegal), but to track a certain person whose life others are interested in. There is no point in spying on ordinary people.

Ways to turn on someone else's webcam

There are many options with which you can turn on someone else's camera. But the two most common are:

  1. Trojan virus. Its action is aimed not only at transferring images from the camera, but also transferring data from a computer. It can also corrupt information. The virus has a whole range of functions from disabling the antivirus to transferring information to another user. The Trojan virus works as follows: along with downloaded data from the Internet, an additional program is also downloaded, which is automatically installed. It is difficult to notice it, especially when downloading a large amount of data.
  2. Meterpreter. This is a functional program that is injected into explorer processes. The purpose of this program is to collect data. It allows you to access remote information, including the camera. This program is not a virus, so not all antiviruses are able to detect it.

Attention! The Trojan virus is considered one of the most dangerous, because it is not always caught by the antivirus.

Is this surveillance legal?

No, any surveillance through the camera without the consent of the person is illegal. There is an article of invasion of privacy and private property of a person. You can get time for this. At the same time, surveillance through a webcam can be used by officials (for example, the police), if they have received appropriate permission.

How to protect yourself

There are several rules that will help protect yourself from surveillance through the camera:

  1. First you need to download a good antivirus. He is able to catch viruses.
  2. We also check all files downloaded from the Internet. If there are doubtful ones, they should be removed.
  3. Any program will not be able to access the camera if the latter is turned off. Therefore, when you do not need the device, it should be turned off.
  4. If the camera is built-in (for example, in a laptop), you can disable it through the BIOS. Or you can just seal the camera if you are sure that someone is watching, but you can’t turn it off.
  5. Check camera operation. If you notice glare or flash in your work, chances are you are being followed.
  6. Check outbound traffic usage.

If the spyware is made by a professional, and it is well hidden, it is almost impossible to identify it. Antivirus won't help. But remember that they are mainly watching those who keep state secrets or something important. Therefore, the risk that you are being followed is extremely low.

Some people worry that the webcam built into their laptops might
peek at them. They fear this so seriously that sometimes even
Tape up her unsleeping eye with duct tape. They do it for a reason. We'll tell
how to programmatically take over the built-in webcam in a laptop and use it
functionality for both peaceful and not very purposes.

We start implementation: the first annoying disappointments

I was very surprised and upset when I found out that in the great and mighty .NET
Framework completely lacks the ability to simply interact with webcams.
In the fourth version, the situation has improved (for SilverLight projects,
corresponding classes), but I did not have time to test them, since the example for
I started writing this article even before the official release of VS2010 and .NET 4.

Almost desperate, I sat down tightly in Google. Runet search results
I was not inspired - all I found were links to MSDN and technology
DirectDraw. I even tried to sketch a simple example, but because of
lack of experience with DirectDraw, I suffered a bummer. I managed
to assemble a very simple application, but I still could not catch everything in it
glitches.

Even more desperate, I began to wool the resources of our Western comrades.
Having studied several dozen links, I was able to dig up a lot of goodies. Among
there were all sorts of examples and little articles (Americans don't like much
write). I even managed to find a working example based on DirectDraw, but when I
I saw the code - I was horrified. It was hard to understand him. So I decided not to
bother, but try to find a simpler way. I didn't have time to say goodbye
example on DirectDraw, as another one caught my eye. The author of the example coded
a whole library for working with webcams and other video capture devices,
using VFW (Video For Windows) technology.

It is a pity that the author's project (I'm talking about the library) was castrated as much as possible. Everything,
what the library allowed to do was to display the image from the webcam. No capture
There were no separate frames, no video recording and other features that were useful to us.

And yet, my subconscious told me emphatically that this project and
have what I was looking for. Before I had time to glance over his code,
I saw the names of familiar win-messages and no less familiar names of WinAPI functions.
Once upon a time, I had to write a webcam application
on Delphi. Then I encountered these functions for the first time.

After looking at the sorts, I decided to write my own version of the library and provide it with the necessary
functionality.

Platoon, readiness No. 1

It is quite possible that there may be several webcams in one computer / laptop. Behind
the example does not have to go far. At work, I often have to organize
simple video conferencing. They usually involve two people. each of
participants are filmed by a separate camera. The cameras themselves are connected to my computer. When
I start shooting, then I choose in the program for working with video cameras the one I need in
present camera. Since we decided to take control of the camera, we must
figure out how to get a list of installed video capture devices and select
with which we will work at the moment.

To solve this simple task, the Windows API provides a function
capGetDriverDescription(). It takes five parameters:

  1. wDriverIndex - video capture driver index. The index value can
    vary from 0 to 9;
  2. lpszName is a pointer to a buffer containing the corresponding driver name;
  3. cbName - size (in bytes) of the lpszName buffer;
  4. lpszVer is a pointer to a buffer containing a description of a specific
    drivers;
  5. cbVer is the size of the buffer (in bytes) that stores the driver description.

If successful, the function will return TRUE. Description of our function
yes, now let's see how to define it in C#. It is done like this:


protected static extern bool capGetDriverDescriptionA (short wDriverIndex,
ref String lpszName, int cbName, ref
String lpszVer, int cbVer);

Note that before specifying the name of the hook function, in
it is mandatory to write the name of the DLL in which it is defined. IN
in our case, this is avicap32.dll.

So, the function is imported, now you can write a class in which it will be
be used. I don’t give the entire class code for getting a list of devices
I will show only the code of the key method:

public static Device GetAllCapturesDevices()
{
String dName = "".PadRight(100);
String dVersion = "".PadRight(100);

for (short i = 0; i< 10; i++)
{
if (capGetDriverDescriptionA(i,
ref dName, 100, ref dVersion,
100))
{
Device d = new Device(i);
d.Name = dName.Trim();
d.Version = dVersion.Trim();

devices.Add(d);
}
}
return (Device)devices.ToArray
(typeof(Device));
}

The code looks easier than ever. The most interesting place in it is the cycle in which
the capGetDriverDescription function mentioned above is called. From MSDN we
we know that the index (the first parameter of the capGetDriverDescription() function) can
range from 0 to 9, so we purposefully run a loop in this
range. The result of the method execution will be an array of Device classes (this class
I determined it myself, see the corresponding sources).

We figured out getting a list of devices, now let's take care of the display
video stream from the camera. Here the function will serve us well
capCreateCaptureWindow() to create a capture window.

Looking ahead a little, I will say that further actions with the camera will
occur by simply sending messages to the capture window. Yes exactly,
you will have to use the painfully familiar windows-programmer (and prankster)
sendMessage() function.

Now let's take a closer look at the capCreateCaptureWindow() function. To her
six arguments are required:

  1. lpszWindowName is a null-terminal string containing the name of the capture window;
  2. dwStyle - window style;
  3. x – X coordinate;
  4. y is the Y coordinate;
  5. nWidth - window width;
  6. nHeight - window height;
  7. hWnd - parent window handle;
  8. nID is the window identifier.

The result of the function execution will be the handle of the created window or NULL in case
errors. Since this function also applies to WinAPI, it is again necessary
import. I will not provide the import code, since it is practically
is identical to what I wrote for the capGetDriverDescription() function. Better right away
Let's take a look at the camera initialization process:

deviceHandle = capCreateCaptureWindowA(ref deviceIndex, WS_VISIBLE |
WS_CHILD, 0, 0, windowWidth, windowHeight, handle, 0);

if (SendMessage(deviceHandle, WM_CAP_DRIVER_CONNECT, this.index, 0) > 0)
{
SendMessage(deviceHandle, WM_CAP_SET_SCALE, -1, 0);
SendMessage(deviceHandle, WM_CAP_SET_PREVIEWRATE, 0x42, 0);
SendMessage(deviceHandle, WM_CAP_SET_PREVIEW, -1, 0);

SetWindowPos(deviceHandle, 1, 0, 0, windowWidth, windowHeight, 6);
}

In this code, immediately after the window is created, an attempt is made to send a message
WM_CAP_DRIVER_CONNECT. A non-zero result of executing the function will tell
us about its success.

Now imagine that today the gods are on our side and produce
immediate sending of several messages: WM_CAP_SET_SCALE,
WM_CAP_SET_PREVIEWRATE, WM_CAP_SET_PREVIEW. Alas, as is the case with functions, C#
knows nothing about the existence of these constants. You will have to define them again
on one's own. I have given a list of all necessary constants with comments below.

//Custom message
private const int WM_CAP = 0x400;
//Connect to the video capture device driver
private const int WM_CAP_DRIVER_CONNECT = 0x40a;
// Break connection with the video capture driver
private const int WM_CAP_DRIVER_DISCONNECT = 0x40b;
//Copy frame to clipboard
private const int WM_CAP_EDIT_COPY = 0x41e;
//Enable/disable preview mode
private const int WM_CAP_SET_PREVIEW = 0x432;
//Enable/disable overlay mode
private const int WM_CAP_SET_OVERLAY = 0x433;
// preview rate
private const int WM_CAP_SET_PREVIEWRATE = 0x434;
//Enable/disable scaling
private const int WM_CAP_SET_SCALE = 0x435;
private const int WS_CHILD = 0x40000000;
private const int WS_VISIBLE = 0x10000000;
//Set callback function for preview
private const int WM_CAP_SET_CALLBACK_FRAME = 0x405;
//Receiving a single frame from the video capture driver
private const int WM_CAP_GRAB_FRAME = 0x43c;
//Save the frame from the camera to a file
private const int WM_CAP_SAVEDIB = 0x419;

I will omit the further description of the class for working with the webcam. frame i
considered, and with everything else you can easily figure it out by lighting up my
well commented source. The only thing I don't want to leave
behind the scenes is an example of using the library.

In total, I implemented (more precisely, added) a couple of methods in the library: GetAllDevices
(already considered), GetDevice (getting a video capture device driver by
index), ShowWindow (show webcam image), GetFrame (capture
individual frame to a graphic file) and GetCapture (video stream capture).

As a demonstration of the performance of the manufactured lib, I sketched
small application. I placed one ComboBox component on the form
(used to store a list of available video capture devices) and several
buttons - "Refresh", "Start", "Stop" and "Screenshot". Oh yeah, still on my uniform
dazzles the Image component. I use it to display video from the camera.

Let's start the debriefing with the "Update" button. On clicking it, I get a list
all installed video capture devices. The inside of this event handler:

Device devices = DeviceManager.GetAllDevices();
foreach (Device in devices)
{
cmbDevices.Items.Add(d);
}

Is it really that simple? The library we developed takes care of all the black
work and we can only enjoy the object-oriented
programming. The code for enabling the display of the video stream looks even simpler.
from camera:


selectedDevice.ShowWindow(this.picCapture);

Again, everything is simpler than a steamed turnip. Well, now let's take a look at the code for the "Screenshot" button:

Device selectedDevice = DeviceManager.GetDevice(cmbDevices.SelectedIndex);
selectedDevice.FrameGrabber();

I didn't pay much attention to the FrameGrabber() method. In my source
calling the method saves the current frame directly to the root of the system
disk. Of course, this is not very correct, so before combat use
do not forget to make any necessary corrections.

Ready #3

Now it's time to talk about how to build a simple but reliable
video surveillance system. Typically, such systems are based on two algorithms:
difference between two frames and simple background modeling. Their implementation (code)
quite voluminous, so at the very last moment I decided to go for more
simple way. By the easy way is meant the use of the powerful, but so far
little-known framework for .NET - AForge.NET.

AForge.NET is primarily intended for developers and researchers.
With its help, developers can significantly facilitate their work in the development
projects for the following areas: neural networks, work with images (overlay
filters, image editing, per-pixel filtering, changing
size, image rotation), genetics, robotics, video interaction
devices, etc. The framework comes with good documentation. In her
describes absolutely all the features of the product. Don't be too lazy with her
familiarize. I especially want to note the quality of the code of this product. Everything
it is written civilly and digging into the code is a pleasure.

Now back to our immediate problem. To be honest, the means
framework, it is solved as two times two. "Then why did you soar my brain WinAPI
functions?" - you will ask with displeasure. And so that you are not in anything
limited. You yourself know that projects are different. Somewhere more convenient to apply
colossus.NET, and somewhere it's easier to get by with the good old WinAPI.

Let's return to our problem. To implement the motion detector, we have to
use the MotionDetector class from the above framework. Class
works well with objects of the Bitmap type and allows you to quickly calculate the percentage
discrepancies between the two images. In code it would look something like
So:

MotionDetector detector = new MotionDetector(
new TwoFramesDifferenceDetector(),
new MotionAreaHighlighting());

//Processing the next frame
if (detector != null)
{
float motionLevel = detector.ProcessFrame(image);

if (motionLevel > motionAlarmLevel)
{
flash = (int) (2 * (1000 / alarmTimer.Interval));
}

if (detector.MotionProcessingAlgorithm is BlobCountingObjectsProcessing)
{
BlobCountingObjectsProcessing countingDetector = (BlobCountingObjectsProcessing)
detector.MotionProcessingAlgorithm;
objectsCountLabel.Text = "Objects: " + countingDetector.ObjectsCount.ToString(
);
}
else
{
objectsCountLabel.Text = "";
}

The above code (not counting the initialization of the MotionDetector class) I have
is executed when the next frame is received from the webcam. After receiving the frame, I
I perform a banal comparison (ProcessFrame method): if the value of the variable
motionlevel is greater than motionLevelAlarm (0.015f), which means you need to sound the alarm!
Motion detected. On one of the screenshots, the work demonstration is clearly visible.
motion detector.

Ready #4

The webcam can easily be adapted to recognize faces and create
an advanced way to log it into the system? If, after digesting all this material, you
If you think it's difficult, then you're wrong! At the end of March on the site
http://codeplex.com (hosting
for OpenSource projects from MS) an example appeared (and then a link to the article),
demonstrating the implementation of a program for face recognition using
webcams. The example itself is based on using new .NET features and
Silver light. It is unrealistic to analyze this example within the framework of a journal article, since
The author of the source tried and did everything as chic as possible. Here you and
algorithms for working with images (blur filter, noise reduction,
pixel-by-pixel comparison, stretching, etc.) and a demonstration of new SilverLight and
a lot more. In a word, must use! See the link to the project and article below.

The end of the film

The examples given in the article will serve as a good starting point for you. On them
based on easy to bungle as a professional webcam utility, and
raise several hundred bucks a quarter on its sale or write a sly and
malicious Trojan spyware.

Remember the article about . In it, I said that the days of keyloggers have already passed.
Now audio and video data are especially relevant. Given that today
a webcam is a mandatory attribute of any laptop, it is easy to imagine
how many interesting videos can you shoot by giving the victim a "useful
program" ... However, I did not tell you this :). Good luck in programming, and
there will be questions - write.

www

http://blogs.msdn.com/
– Russian version of the article "Silverlight 4 real-time Face Detection"
(real-time face recognition with SilverLight).


http://facelight.codeplex.com/ - this is where the "Facelight" project is hosted,
allowing face recognition in real time. If you are going to code
serious software for identifying faces or logon into the system, then look at
this project is a must.


http://www.aforgenet.com/framework/ - here you are
you will find AForge .NET - a great and easy to use framework for working with
videos, images, etc.

http://vr-online.ru
- all the source codes of examples, as well as a bunch of additional information you
you can merge from the VR-Online project website.