TY - JOUR
T1 - A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
AU - Al-Ghaili, Abbas M.
AU - Gunasekaran, Saraswathy Shamini
AU - Jamil, Norziana
AU - Alyasseri, Zaid Abdi Alkareem
AU - Al-Hada, Naif Mohammed
AU - Ibrahim, Zul Azri Bin
AU - Bakar, Asmidar Abu
AU - Kasim, Hairoladenan
AU - Hosseini, Eghbal
AU - Omar, Ridha
AU - Kasmani, Rafiziana Md
AU - Razali, Rina Azlin
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2023
Y1 - 2023
N2 - Once an image has been processed by, for example, a robot machine, for the purpose of, for example, features extraction or meaningful information retrieval, has a secure scheme been applied to preserve security and privacy of such information before sending it to another processing party? A huge number of image-related Internet of Things (IoT) applications face such an issue. But what are applied and potentially being applied image processing techniques that have contributed to enhance the security and privacy of IoT applications? There are numerous IoT applications that utilize image processing techniques in this direction. This article aims to survey and review a number of recently published papers and research studies that encompass proposed methods in which image processing techniques are applied to enhance the security, privacy, and safety of IoT applications. It also aims to help interested researchers in related fields have insights on what the role of image processing in enhancing the security of IoT applications is and what those techniques applied to enhance the security of IoT applications are. A comprehensive framework has been graphically extracted to give readers in the field of IoT security a map with the suitable image processing techniques that serve better to enhancing IoT applications in terms of security and privacy.
AB - Once an image has been processed by, for example, a robot machine, for the purpose of, for example, features extraction or meaningful information retrieval, has a secure scheme been applied to preserve security and privacy of such information before sending it to another processing party? A huge number of image-related Internet of Things (IoT) applications face such an issue. But what are applied and potentially being applied image processing techniques that have contributed to enhance the security and privacy of IoT applications? There are numerous IoT applications that utilize image processing techniques in this direction. This article aims to survey and review a number of recently published papers and research studies that encompass proposed methods in which image processing techniques are applied to enhance the security, privacy, and safety of IoT applications. It also aims to help interested researchers in related fields have insights on what the role of image processing in enhancing the security of IoT applications is and what those techniques applied to enhance the security of IoT applications are. A comprehensive framework has been graphically extracted to give readers in the field of IoT security a map with the suitable image processing techniques that serve better to enhancing IoT applications in terms of security and privacy.
KW - energy IoT
KW - Image processing
KW - Internet of Things (IoT)
KW - secure image-related IoT applications
KW - secure IoT applications
UR - http://www.scopus.com/inward/record.url?scp=85171531039&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85171531039&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2023.3312682
DO - 10.1109/ACCESS.2023.3312682
M3 - Article
AN - SCOPUS:85171531039
SN - 2169-3536
VL - 11
SP - 101924
EP - 101948
JO - IEEE Access
JF - IEEE Access
ER -