Full Text

Turn on search term navigation

© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

The goal of this review paper is to highlight the image processing techniques’ role in the Internet of Things (IoT), aiming to attain an energy-efficient and secure IoT. IoT-dependent systems (IoTSs) cause heavy usage of energy. This is one of the biggest issues associated with IoTSs. Another issue is that the security of digital content is a big challenge and difficulty. Image processing has recently played an essential role in resolving these difficulties. Several researchers have made efforts to improve future IoTSs, which are summarized in this article. Day-by-day, proposed methods are developed, and thus IoT deployment has been plainly engaged in our everyday activities. Several efficient image-processing techniques that can be utilized by IoTSs to overcome such issues have been proposed. This review paper aims to highlight those proposed methods that can make contributions in this direction. Thus, this study aims to review numerous research studies on this subject. This study looks at 36 publications relevant to image-processing techniques utilized by several types of IoTSs. The innovative work of this review paper is to provide readers with a map of suitable image processing techniques to be used with certain types of IoT systems (i.e., scenarios). Both methodology and analysis have come out with a suggested mind map highlighting a number of proposed solutions (i.e., image processing techniques) that can be suitable to help design an energy-efficient, secure, and intelligent IoT system. We have made some conclusions and projections for future research work.

Details

Title
A Review: Image Processing Techniques’ Roles towards Energy-Efficient and Secure IoT
Author
Al-Ghaili, Abbas M 1 ; Kasim, Hairoladenan 2 ; Zainuddin Hassan 2 ; Naif Mohammed Al-Hada 3   VIAFID ORCID Logo  ; Marini Othman 4 ; Rafiziana Md Kasmani 5 ; Ibraheem Shayea 6   VIAFID ORCID Logo 

 Institute of Informatics and Computing in Energy (IICE), Universiti Tenaga Nasional (UNITEN), Kajang 43000, Selangor, Malaysia; Department of Informatics, College of Computing and Informatics (CCI), Universiti Tenaga Nasional (UNITEN), Kajang 43000, Selangor, Malaysia; Department of Computing, College of Computing and Informatics (CCI), Universiti Tenaga Nasional (UNITEN), Kajang 43000, Selangor, Malaysia 
 Department of Informatics, College of Computing and Informatics (CCI), Universiti Tenaga Nasional (UNITEN), Kajang 43000, Selangor, Malaysia 
 Shandong Key Laboratory of Biophysics, Institute of Biophysics, Dezhou University, Dezhou 253023, China; School of Chemical and Energy Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Malaysia; Electronics and Communication Engineering Department, Faculty of Electrical and Electronics Engineering, Istanbul Technical University, 34467 Sarıyer, Turkey 
 Faculty of Data Science and Information Technology, INTI International University, Nilai 71800, Negeri Sembilan, Malaysia 
 School of Chemical and Energy Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor Bahru, Malaysia 
 Electronics and Communication Engineering Department, Faculty of Electrical and Electronics Engineering, Istanbul Technical University, 34467 Sarıyer, Turkey 
First page
2098
Publication year
2023
Publication date
2023
Publisher
MDPI AG
e-ISSN
20763417
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2779525753
Copyright
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.