Face Privacy Protection Method for Autonomous Sensors Based on Hierarchical Format-Preserving Encryption
- PMID: 41374744
- PMCID: PMC12694654
- DOI: 10.3390/s25237369
Face Privacy Protection Method for Autonomous Sensors Based on Hierarchical Format-Preserving Encryption
Abstract
Advanced sensors in connected automated vehicles (CAVs) increasingly collect facial biometric information for environmental perception, posing serious privacy leakage risks. However, existing privacy protection methods for automotive data primarily focus on strict security mechanisms and fail to fully balance data usability. This paper presents a hierarchical format-preserving encryption (H-FPE) method for face privacy protection in autonomous sensors. The proposed method constructs a privacy-preserving framework for face detection based on YOLOv11 by employing a region-specific encryption strategy where the encryption strength is tailored to the importance of different facial regions. The encryption algorithm employs SM4-based Feistel structures with pseudo-random functions to ensure RGB value constraints while maintaining image format integrity. Experimental evaluation results in diverse scenarios demonstrate that the proposed privacy encryption method achieves superior privacy protection performance. In terms of encryption strength, the method achieves entropy efficiency exceeding 98%, with an average entropy increase of 0.77 bits, representing an improvement of approximately 9.4% over the traditional thumbnail-preserving encryption (TPE) method. Considering the usability of downstream tasks, the proposed method preserves pedestrian detection performance, with F1-scores exceeding 97% in selected scenarios, demonstrating a 0.5% difference compared to TPE while providing substantially stronger privacy protection. The H-FPE method effectively balances privacy protection and functional usability, offering a robust solution for facial data protection in autonomous sensor applications while preserving essential detection capabilities.
Keywords: data security; face privacy; format-preserving encryption; functional usability; pedestrian detection.
Conflict of interest statement
The authors declare no conflicts of interest.
Figures
References
-
- Fan J., Fan L., Ni Q., Wang J., Liu Y., Li R., Wang Y., Wang S. Perception and planning of intelligent vehicles based on BEV in extreme Off-Road scenarios. IEEE Trans. Intell. Veh. 2024;9:4568–4572. doi: 10.1109/TIV.2024.3392753. - DOI
-
- Falaschetti L., Manoni L., Palma L., Pierleoni P., Turchetti C. Embedded real-time vehicle and pedestrian detection using a compressed tiny YOLO v3 architecture. IEEE Trans. Intell. Transp. Syst. 2024;25:19399–19414. doi: 10.1109/TITS.2024.3447453. - DOI
-
- Irfan M.S., Dasgupta S., Rahman M. Toward transportation digital twin systems for traffic safety and mobility: A review. IEEE Internet Things J. 2024;11:24581–24603. doi: 10.1109/JIOT.2024.3395186. - DOI
-
- Chen X., Yin J., Tang K., Tian Y., Sun J. Vehicle trajectory reconstruction at signalized intersections under connected and automated vehicle environment. IEEE Trans. Intell. Transp. Syst. 2022;23:17986–18000. doi: 10.1109/TITS.2022.3150577. - DOI
-
- Zhao J., Yang X., Zhang C. Vehicle trajectory reconstruction for intersections: An integrated wavelet transform and Savitzky-Golay filter approach. Transp. A. 2024;20:2163207. doi: 10.1080/23249935.2022.2163207. - DOI
LinkOut - more resources
Full Text Sources
