• Login / Register
    View Item 
    •   Home
    • Computer, Engineering and Natural Sciences
    • Electronic and Electrical Engineering
    • Electronic and Electrical Engineering
    • View Item
    •   Home
    • Computer, Engineering and Natural Sciences
    • Electronic and Electrical Engineering
    • Electronic and Electrical Engineering
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of ChesterRepCommunitiesTitleAuthorsPublication DateSubmit DateSubjectsPublisherJournalThis CollectionTitleAuthorsPublication DateSubmit DateSubjectsPublisherJournalProfilesView

    My Account

    LoginRegister

    About

    AboutUniversity of Chester

    Statistics

    Display statistics

    Invisible identities: Privacy-aware object detection for autonomous vehicles and public surveillance

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    ISSC_2025_Paper.pdf
    Size:
    8.457Mb
    Format:
    PDF
    Request:
    Accepted version
    Download
    Authors
    Yousuf, Muhammad Jehanzaib
    Asghar, Mamoona
    Ansari, Mohammad Samar
    Lee, Brian
    Kanwal, Nadia
    Affiliation
    Software Research Institute, TU Shannon; University of Galway; University of Chester; Keele University
    Publication Date
    2025-12-22
    
    Metadata
    Show full item record
    Abstract
    Anonymising visual data dynamically presents challenges for achieving privacy and security by design, as currently addressed by Privacy-Enhancing Technologies (PETs) and Security-Enhancing Technologies (SETs). The need to decrypt data before applying anonymization or masking techniques introduces potential vulnerabilities, where data could be exposed during processing. This article provides a comprehensive solution to implement robust security measures throughout the entire data lifecycle, including training machine learning models on data without applying differential privacy. Our approach ensures end-to-end encryption to protect data at rest, during processing, and in transit. We encrypt the region of interest in visual imagery at the source, allowing machine learning or deep learning models to use it directly for training purposes. This ensures models focus on abstract visual information rather than private details such as facial features or clothing colour. Our work demonstrates that machine learning models trained on privacy-aware data can be as accurate as those trained on raw data. We employed widely used AES encryption and object detectors like YOLO, Single Shot MultiBox Detector (SSD-MobileNetv1-FPN-640x640, SSD-ResNet101-FPN-640x640), and the EfficientDet family (EfficientDet-D0 and EfficientDet-D1) for detection and classification of visual objects.
    Citation
    Yousuf, M. J., Asghar, M., Ansari, M. S., Lee, B., & Kanwal, N. (2025, 9–10 June 2025). Invisible identities: Privacy-aware object detection for autonomous vehicles and public surveillance. 2025 35th Irish Signals and Systems Conference (ISSC), Letterkenny, Ireland. https://doi.org/10.1109/ISSC67739.2025.11291326
    Publisher
    IEEE
    URI
    http://hdl.handle.net/10034/629826
    DOI
    10.1109/issc67739.2025.11291326
    Additional Links
    https://ieeexplore.ieee.org/document/11291326
    Type
    Conference Contribution
    Description
    © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
    Sponsors
    unfunded
    ae974a485f413a2113503eed53cd6c53
    10.1109/issc67739.2025.11291326
    Scopus Count
    Collections
    Electronic and Electrical Engineering

    entitlement

     
    DSpace software (copyright © 2002 - 2026)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.