Invisible identities: Privacy-aware object detection for autonomous vehicles and public surveillance
Affiliation
Software Research Institute, TU Shannon; University of Galway; University of Chester; Keele UniversityPublication Date
2025-12-22
Metadata
Show full item recordAbstract
Anonymising visual data dynamically presents challenges for achieving privacy and security by design, as currently addressed by Privacy-Enhancing Technologies (PETs) and Security-Enhancing Technologies (SETs). The need to decrypt data before applying anonymization or masking techniques introduces potential vulnerabilities, where data could be exposed during processing. This article provides a comprehensive solution to implement robust security measures throughout the entire data lifecycle, including training machine learning models on data without applying differential privacy. Our approach ensures end-to-end encryption to protect data at rest, during processing, and in transit. We encrypt the region of interest in visual imagery at the source, allowing machine learning or deep learning models to use it directly for training purposes. This ensures models focus on abstract visual information rather than private details such as facial features or clothing colour. Our work demonstrates that machine learning models trained on privacy-aware data can be as accurate as those trained on raw data. We employed widely used AES encryption and object detectors like YOLO, Single Shot MultiBox Detector (SSD-MobileNetv1-FPN-640x640, SSD-ResNet101-FPN-640x640), and the EfficientDet family (EfficientDet-D0 and EfficientDet-D1) for detection and classification of visual objects.Citation
Yousuf, M. J., Asghar, M., Ansari, M. S., Lee, B., & Kanwal, N. (2025, 9–10 June 2025). Invisible identities: Privacy-aware object detection for autonomous vehicles and public surveillance. 2025 35th Irish Signals and Systems Conference (ISSC), Letterkenny, Ireland. https://doi.org/10.1109/ISSC67739.2025.11291326Publisher
IEEEAdditional Links
https://ieeexplore.ieee.org/document/11291326Type
Conference ContributionDescription
© 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Sponsors
unfundedae974a485f413a2113503eed53cd6c53
10.1109/issc67739.2025.11291326

