A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications

被引:2
|
作者
Al-Ghaili, Abbas M. [1 ,2 ]
Gunasekaran, Saraswathy Shamini [2 ,3 ]
Jamil, Norziana [2 ,4 ]
Alyasseri, Zaid Abdi Alkareem [2 ,5 ]
Al-Hada, Naif Mohammed [6 ,7 ,8 ]
Bin Ibrahim, Zul-Azri [1 ]
Abu Bakar, Asmidar
Kasim, Hairoladenan [3 ]
Hosseini, Eghbal [2 ]
Omar, Ridha [3 ]
Kasmani, Rafiziana Md. [6 ]
Razali, Rina Azlin [1 ,2 ]
机构
[1] Univ Tenaga Nas, Coll Comp & Informat CCI, Dept Comp, Kajang 43000, Selangor, Malaysia
[2] Univ Tenaga Nas, Inst Informat & Comp Energy IICE, Kajang 43000, Selangor, Malaysia
[3] Univ Tenaga Nas, Coll Comp & Informat CCI, Dept Informat, Kajang 43000, Selangor, Malaysia
[4] United Arab Emirates Univ, Coll IT, Dept Informat Syst & Secur, Al Ain 15551, U Arab Emirates
[5] Univ Kufa, Informat Technol Res & Dev Ctr, Kufa, Iraq
[6] United Arab Emirates Univ, Coll IT, Dept Informat Syst & Secur, Al Ain 15551, U Arab Emirates
[7] Univ Teknol Malaysia, Sch Chem & Energy Engn, Skudai 81310, Johor, Malaysia
[8] Istanbul Tech Univ, Fac Elect & Elect Engn, Elect & Commun Engn Dept, TR-34467 Sariyer, Turkiye
关键词
Internet of Things; Security; Image processing; Privacy; Deep learning; Medical diagnostic imaging; Object recognition; Internet of Things (IoT); secure IoT applications; secure image-related IoT applications; energy IoT; CLASSIFICATION; INTERNET; PRIVACY; BLOCKCHAIN; RETRIEVAL; FRAMEWORK; SYSTEMS;
D O I
10.1109/ACCESS.2023.3312682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Once an image has been processed by, for example, a robot machine, for the purpose of, for example, features extraction or meaningful information retrieval, has a secure scheme been applied to preserve security and privacy of such information before sending it to another processing party? A huge number of image-related Internet of Things (IoT) applications face such an issue. But what are applied and potentially being applied image processing techniques that have contributed to enhance the security and privacy of IoT applications? There are numerous IoT applications that utilize image processing techniques in this direction. This article aims to survey and review a number of recently published papers and research studies that encompass proposed methods in which image processing techniques are applied to enhance the security, privacy, and safety of IoT applications. It also aims to help interested researchers in related fields have insights on what the role of image processing in enhancing the security of IoT applications is and what those techniques applied to enhance the security of IoT applications are. A comprehensive framework has been graphically extracted to give readers in the field of IoT security a map with the suitable image processing techniques that serve better to enhancing IoT applications in terms of security and privacy.
引用
收藏
页码:101924 / 101948
页数:25
相关论文
共 50 条
  • [1] The application of image processing techniques and technology for security and surveillance applications
    Smith, Moira I.
    Hickman, Duncan
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE VI, 2007, 6538
  • [2] Review of Different Encryptionand Decryption Techniques Used for Security and Privacy of IoT in Different Applications
    Hussain, Rashid
    Abdullah, Irfan
    2018 THE 6TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2018), 2018, : 293 - 297
  • [3] A Review: Image Processing Techniques' Roles towards Energy-Efficient and Secure IoT
    Al-Ghaili, Abbas M.
    Kasim, Hairoladenan
    Hassan, Zainuddin
    Al-Hada, Naif Mohammed
    Othman, Marini
    Kasmani, Rafiziana Md.
    Shayea, Ibraheem
    APPLIED SCIENCES-BASEL, 2023, 13 (04):
  • [4] A review on urban traffic cameras: Video image processing techniques and applications
    Barros D.
    Ferreira M.C.
    Silva A.R.
    Advances in Transportation Studies, 2023, 59 : 179 - 192
  • [5] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [6] Techniques for Enhancing the Security of Fuzzy Vault: A Review
    Panwar, Abhay
    Singla, Parveen
    Kaur, Manvjeet
    PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2, 2018, 719 : 205 - 213
  • [7] Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications
    Nadhan, Archana S.
    Jacob, Jeena
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 88
  • [8] Advanced Image Processing for Defense and Security Applications
    Du, Eliza Yingzi
    Ives, Robert
    van Nevel, Alan
    She, Jin-Hua
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [9] Advanced Image Processing for Defense and Security Applications
    ElizaYingzi Du
    Robert Ives
    Alan van Nevel
    Jin-Hua She
    EURASIP Journal on Advances in Signal Processing, 2010
  • [10] Review on Mosaicing Techniques in Image Processing
    Abraham, Rintu
    Simon, Philomina
    2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES (ACCT 2013), 2013, : 63 - 68