Image Anomaly Detection Based on Adaptive Iteration and Feature Extraction in Edge-Cloud IoT

被引:0
|
作者
Zhang, Weiwei [1 ]
Tang, Xinhua [2 ]
Zhang, Jiwei [3 ]
机构
[1] Shandong Jianzhu Univ, Sch Sci, Jinan 250101, Peoples R China
[2] Shandong Univ Polit Sci & Law, Sch Cyberspace Secur, Jinan 250014, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Comp Sci, Natl Pilot Software Engn Sch, Beijing 100876, Peoples R China
关键词
FORGERY;
D O I
10.1155/2022/7715753
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has penetrated into various application fields. If the multimedia information obtained by the IoT device is tampered with, the subsequent information processing will be affected, resulting in an incorrect service and even security threat. Therefore, it is very necessary to study multimedia forensics technology for IoT security. In the edge-cloud IoT environment, an image anomaly detection technology for security service is proposed in this paper. First, preprocessing is performed before image anomaly detection. Then, we extracted sparse features from the image to roughly localize the region of anomaly detection. Feature extraction based on the polar cosine transform (PCT) is then performed only on the candidate region of anomaly detection. To further improve the detection accuracy, we use iterative updating. This method makes use of the feature that the edge node is closer to the multimedia source in physical location and migrates the complex computing task of image anomaly detection from the cloud computing center to the edge node. Provide a security service for abnormal data and deploy it to the edge-cloud server to reduce the pressure on the cloud. Overall, preprocessing improves the ability of feature extraction in smooth or small region of anomaly detections, and the iterative strategy enhances the security service. Experimental results demonstrate that the proposed method outperforms state-of-the-art methods.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Scientific Workflows in IoT Environments: A Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing
    Du, Xin
    Tang, Songtao
    Lu, Zhihui
    Gai, Keke
    Wu, Jie
    Hung, Patrick C. K.
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (04)
  • [42] An adaptive implementation of the SUSAN method for image edge and feature detection
    Perez, MM
    Dennis, TJ
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL II, 1997, : 394 - 397
  • [43] Rotation Feature Extraction for Moving Targets Based on Temporal Differencing and Image Edge Detection
    Li, Zhangfeng
    Zhao, Guoqiang
    Li, Shiyong
    Sun, Houjun
    Tao, Ran
    Huang, Xiaojing
    Guo, Y. Jay
    IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2016, 13 (10) : 1512 - 1516
  • [44] UFKLDA: An unsupervised feature extraction algorithm for anomaly detection under cloud environment
    Wang, GuiPing
    Yang, JianXi
    Li, Ren
    ETRI JOURNAL, 2019, 41 (05) : 684 - 695
  • [45] Edge-cloud collaborative fabric defect detection based on industrial internet architecture
    Zhao, Shuxuan
    Wang, Junliang
    Zhang, Jie
    Bao, Jinsong
    Zhong, Ray
    2020 IEEE 18TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), VOL 1, 2020, : 483 - 487
  • [46] Cooperative Cloud-Edge Feature Extraction Architecture for Mobile Image Retrieval
    He, Chao
    Ma, Gang
    COMPLEXITY, 2021, 2021
  • [47] Data management framework for IoT edge-cloud architecture for resource-constrained IoT application
    Sharma, Gajanand
    Hemrajani, Naveen
    Sharma, Satyajeet
    Upadhyay, Aditya
    Bhardwaj, Yogesh
    Kumar, Ashutosh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1093 - 1103
  • [48] Image anomaly detection for IoT equipment based on deep learning
    Hou Rui
    Pan MingMing
    Zhao YunHao
    Yang Yang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 64
  • [49] Realtime Feature Engineering for Anomaly Detection in IoT Based MQTT Networks
    Imran
    Zuhairi, Megat F.
    Ali, Syed Mubashir
    Shahid, Zeeshan
    Alam, Muhammad Mansoor
    Su'ud, Mazliham Mohd
    IEEE ACCESS, 2024, 12 : 25700 - 25718
  • [50] An edge computing based anomaly detection method in IoT industrial sustainability
    Yu, Xiang
    Yang, Xianfei
    Tan, Qingji
    Shan, Chun
    Lv, Zhihan
    APPLIED SOFT COMPUTING, 2022, 128