A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications

Once an image has been processed by, for example, a robot machine, for the purpose of, for example, features extraction or meaningful information retrieval, has a secure scheme been applied to preserve security and privacy of such information before sending it to another processing party? A huge num...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili A.M., Gunasekaran S.S., Jamil N., Alyasseri Z.A.A., Al-Hada N.M., Ibrahim Z.-A.B., Bakar A.A., Kasim H., Hosseini E., Omar R., Kasmani R.M., Razali R.A.
Other Authors: 26664381500
Format: Article
Published: Institute of Electrical and Electronics Engineers Inc. 2024
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
id my.uniten.dspace-34481
record_format dspace
spelling my.uniten.dspace-344812024-10-14T11:20:05Z A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications Al-Ghaili A.M. Gunasekaran S.S. Jamil N. Alyasseri Z.A.A. Al-Hada N.M. Ibrahim Z.-A.B. Bakar A.A. Kasim H. Hosseini E. Omar R. Kasmani R.M. Razali R.A. 26664381500 55652730500 36682671900 57862594800 55976109600 57203863738 35178991300 57203863798 57212521533 37012659000 55249573600 35146685400 energy IoT Image processing Internet of Things (IoT) secure image-related IoT applications secure IoT applications Deep learning Diagnosis Image enhancement Medical imaging Object recognition Deep learning Energy internet Energy internet of thing Images processing Internet of thing Medical diagnostic imaging Objects recognition Privacy Secure image-related internet of thing application Secure internet of thing application Security Internet of things Once an image has been processed by, for example, a robot machine, for the purpose of, for example, features extraction or meaningful information retrieval, has a secure scheme been applied to preserve security and privacy of such information before sending it to another processing party? A huge number of image-related Internet of Things (IoT) applications face such an issue. But what are applied and potentially being applied image processing techniques that have contributed to enhance the security and privacy of IoT applications? There are numerous IoT applications that utilize image processing techniques in this direction. This article aims to survey and review a number of recently published papers and research studies that encompass proposed methods in which image processing techniques are applied to enhance the security, privacy, and safety of IoT applications. It also aims to help interested researchers in related fields have insights on what the role of image processing in enhancing the security of IoT applications is and what those techniques applied to enhance the security of IoT applications are. A comprehensive framework has been graphically extracted to give readers in the field of IoT security a map with the suitable image processing techniques that serve better to enhancing IoT applications in terms of security and privacy. � 2013 IEEE. Final 2024-10-14T03:20:05Z 2024-10-14T03:20:05Z 2023 Article 10.1109/ACCESS.2023.3312682 2-s2.0-85171531039 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85171531039&doi=10.1109%2fACCESS.2023.3312682&partnerID=40&md5=5e6804bcc2b97e873477d21ac209e762 https://irepository.uniten.edu.my/handle/123456789/34481 11 101924 101948 All Open Access Gold Open Access Institute of Electrical and Electronics Engineers Inc. Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic energy IoT
Image processing
Internet of Things (IoT)
secure image-related IoT applications
secure IoT applications
Deep learning
Diagnosis
Image enhancement
Medical imaging
Object recognition
Deep learning
Energy internet
Energy internet of thing
Images processing
Internet of thing
Medical diagnostic imaging
Objects recognition
Privacy
Secure image-related internet of thing application
Secure internet of thing application
Security
Internet of things
spellingShingle energy IoT
Image processing
Internet of Things (IoT)
secure image-related IoT applications
secure IoT applications
Deep learning
Diagnosis
Image enhancement
Medical imaging
Object recognition
Deep learning
Energy internet
Energy internet of thing
Images processing
Internet of thing
Medical diagnostic imaging
Objects recognition
Privacy
Secure image-related internet of thing application
Secure internet of thing application
Security
Internet of things
Al-Ghaili A.M.
Gunasekaran S.S.
Jamil N.
Alyasseri Z.A.A.
Al-Hada N.M.
Ibrahim Z.-A.B.
Bakar A.A.
Kasim H.
Hosseini E.
Omar R.
Kasmani R.M.
Razali R.A.
A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
description Once an image has been processed by, for example, a robot machine, for the purpose of, for example, features extraction or meaningful information retrieval, has a secure scheme been applied to preserve security and privacy of such information before sending it to another processing party? A huge number of image-related Internet of Things (IoT) applications face such an issue. But what are applied and potentially being applied image processing techniques that have contributed to enhance the security and privacy of IoT applications? There are numerous IoT applications that utilize image processing techniques in this direction. This article aims to survey and review a number of recently published papers and research studies that encompass proposed methods in which image processing techniques are applied to enhance the security, privacy, and safety of IoT applications. It also aims to help interested researchers in related fields have insights on what the role of image processing in enhancing the security of IoT applications is and what those techniques applied to enhance the security of IoT applications are. A comprehensive framework has been graphically extracted to give readers in the field of IoT security a map with the suitable image processing techniques that serve better to enhancing IoT applications in terms of security and privacy. � 2013 IEEE.
author2 26664381500
author_facet 26664381500
Al-Ghaili A.M.
Gunasekaran S.S.
Jamil N.
Alyasseri Z.A.A.
Al-Hada N.M.
Ibrahim Z.-A.B.
Bakar A.A.
Kasim H.
Hosseini E.
Omar R.
Kasmani R.M.
Razali R.A.
format Article
author Al-Ghaili A.M.
Gunasekaran S.S.
Jamil N.
Alyasseri Z.A.A.
Al-Hada N.M.
Ibrahim Z.-A.B.
Bakar A.A.
Kasim H.
Hosseini E.
Omar R.
Kasmani R.M.
Razali R.A.
author_sort Al-Ghaili A.M.
title A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
title_short A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
title_full A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
title_fullStr A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
title_full_unstemmed A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
title_sort review on role of image processing techniques to enhancing security of iot applications
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2024
_version_ 1814061182685806592