Problem
When working remotely, a good quality audio/video setup can be very handy in effective communication. Unfortunately, most of the non-Apple laptops come with underwhelming webcams even in 2024. I considered buying a better quality webcam but shelling out about $100 for a decent 1080p webcam didn’t make much sense. While looking for alternate solutions, I realized that I had a couple of older Android smartphones laying around with decent cameras.
Enter: this post.
Essential components:
- An Android smartphone with ‘Developer Options’ enabled
- A Linux workstation/laptop with
v4l2loopback
,adb
, andscrcpy
utilities.
Solution
v4l2loopback
builds upon the Video4Linux
platform. The Video4Linux
toolset
allows you to capture realtime video from a myriad of sources. The
v4l2loopback
kernel module allows us to create loopback video capture devices.
Another important part of the solution is the scrcpy
utility that can be
configured to mirror an Android smartphone’s display, and sink the incoming
video from the Android smartphone to the loopback video device created using
v4l2loopback
. This explanation probably seems far more complex than the actual
setup, so let’s move on to the required commands:
Setting up prereqs:
- Enabling ‘Developer Options’ on your Android device: The exact procedure may vary from vendor to vendor. On my device, it involved finding the ‘Build Number’ details in the phone Settings, and then tapping the ‘Build Number’ seven times.
- Installing required tools on Linux workstation:
You need to install
v4l2loopback
kernel module andscrcpy
andadb
utilities. Different distros package these utilities differently. On Arch Linux, I had to dopacman -S v4l2loopback-dkms android-tools scrcpy
.
Setting up a v4l2loopback device
sudo /usr/bin/modprobe v4l2loopback devices=1 video_nr=2 exclusive_caps=1 card_label="AndroidWebCam"
Here is a brief explanation of the tricky parts:
- The
video_nr=2
parameter tellsv4l2loopback
that I want the loopback device to be accessible at/dev/video2
exclusive_caps=1
resolves issues with Chrome/Chromium browsers- The
card_label
sets the name of the webcam as it will be shown in Google Meets and other video conferencing tools
Mirroring Android display
Now that the video loopback device has been created, we can use scrcpy
to
mirror the Android screen and dump the incoming traffic to /dev/video2
:
/usr/bin/scrcpy --v4l2-sink=/dev/video2 --no-audio-playback
The --no-audio-playback
switch tells scrcpy
not to mirror audio from the
Android device as I have a separate headset setup as my audio out and mic.
Note: The scrcpy
utility simply mirrors your Android display. You can use
Open Camera, and set the ‘Immersive Mode’ to ‘Hide everything’ so your Android
display shows your camera. Another troubleshooting hint is that scrcpy
mirrors your entire Android display by default. You can change this behavior by
passing the --crop
argument.
Script for automatic launch
To avoid entering all those commands manually, I have setup this script that I
can execute whenever I want to start the AndroidWebcam
.
#!/bin/bash
sudo /usr/bin/modprobe -r v4l2loopback
sudo /usr/bin/modprobe v4l2loopback devices=1 video_nr=2 exclusive_caps=1 card_label="AndroidWebCam"
sudo -u $USER /usr/bin/scrcpy --v4l2-sink=/dev/video2 --no-audio-playback
Results
I haven’t had an issue with this setup for the last couple of months. My video quality, including the color accuracy, refresh rate, skin texture, has improved considerably compared to my old 720p Logitech webcam. Perhaps thanks to the higher resolution and better color quality, the background blur effects also work much better now.