Volume 15 , Issue 1 , PP: 37-52, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Abhiram Potlapalli 1 * , Seetharam Khetavath 2
Doi: https://doi.org/10.54216/JISIoT.150104
With the growing demand for efficient image processing in embedded systems, the exploration of deep learning-based image compression methods has emerged as a promising avenue. Traditional image compression techniques, such as JPEG and PNG, face challenges in achieving optimal performance for constrained environments due to their reliance on handcrafted algorithms and limited adaptability. This study investigates the use of deep learning models for image compression tailored to embed systems, focusing on encoder and decoder architectures. By leveraging convolutional neural networks (CNNs) and variational auto encoders (VAEs), we design lightweight models capable of achieving high compression ratios while maintaining visual fidelity. The research emphasizes computational efficiency, ensuring compatibility with the resource constraints of embedded hardware. Key contributions include the development of streamlined architectures optimized for low memory and power usage, along with a comprehensive evaluation of compression quality, reconstruction accuracy, and real-time performance. The results demonstrate that deep learning-based approaches can outperform traditional methods in terms of adaptability and efficiency, paving the way for their integration into next-generation embedded systems.
Deep Learning , Compression , Embedded Systems , Encoder and Decoder
[1] B. Sujitha, V. S. Parvathy, E. L. Lydia, and P. Rani, “Optimal deep learning-based image compression technique for data transmission on industrial Internet of Things applications,” Trans. Image Process., 2021.
[2] I. Leyva-Mayorga and M. Martinez-Gost, “Satellite edge computing for real-time and very-high-resolution earth observation,” IEEE Trans., 2023.
[3] P. Xu, Q. Li, B. Zhang, F. Wu, K. Zhao, X. Du, and C. Yang, “On-board real-time ship detection in HISEA-1 SAR images based on CFAR and lightweight deep learning,” Remote Sens., 2021.
[4] Y. Ma, Q. Li, L. Chu, and Y. Zhou, “Real-time detection and spatial localization of insulators for UAV inspection based on binocular stereo vision,” Remote Sens., 2021.
[5] A. K. Sharma and P. R. Gupta, "Comparative Analysis of AODV and DSR Routing Protocols in Mobile Ad Hoc Networks," International Journal of Wireless and Mobile Networks, vol. 13, no. 3, pp. 15-25, 2021. DOI: 10.5121/ijwmn.2021.13302.
[6] S. R. Kumar and T. N. Singh, "Enhanced Routing Protocols for Mobile Ad Hoc Networks Using Genetic Algorithms," International Journal of Wireless and Mobile Networks, vol. 14, no. 2, pp. 30-40, 2022. DOI: 10.5121/ijwmn.2022.14203.
[7] H. S. Munawar, A. W. A. Hammad, and S. T. Waller, “A review on flood management technologies related to image processing and machine learning,” Autom. Constr., 2021.
[8] M. Sumithra, B. Buvaneswari, S. Ahilesharan, T. Fenix Raja Singh, and J. Harish, “Online Vehicle Rental System,” J. Cogn. Hum.-Comput. Interact., vol. 2, no. 1, pp. 34–39, 2022. DOI: 10.54216/JCHCI.020105.
[9] N. G. Nishanthi, Y. Yuvashree, A. J. Joseph, and S. R. Supraja, “Personnel Monitoring System Using Mobile Application during the COVID-19,” J. Cogn. Hum.-Comput. Interact., vol. 2, no. 2, pp. 40–49, 2022. DOI: 10.54216/JCHCI.020201.
[10] B. Yan, P. Fan, X. Lei, Z. Liu, et al., “A real-time apple targets detection method for picking robot based on improved YOLOv5,” Remote Sens., 2021.
[11] A. Berthelier, T. Chateau, S. Duffner, and C. Garcia, “Deep model compression and architecture optimization for embedded systems: A survey,” in Processing Systems, Springer, 2021.
[12] Y. Chen, B. Zheng, Z. Zhang, Q. Wang, and C. Shen, “Deep learning on mobile and embedded devices: State-of-the-art, challenges, and future directions,” ACM Comput. Surv., 2020.
[13] T. S. Ajani, A. L. Imoize, and A. A. Atayero, “An overview of machine learning within embedded and mobile devices—Optimizations and applications,” Sensors, 2021.
[14] C. B. Murthy, M. F. Hashmi, N. D. Bokde, and Z. W. Geem, “Investigations of object detection in images/videos using various deep learning techniques and embedded platforms—A comprehensive review,” Appl. Sci., 2020.
[15] H. Cai, J. Lin, Y. Lin, Z. Liu, H. Tang, and H. Wang, “Enable deep learning on mobile devices: Methods, systems, and applications,” in Electronic Systems, 2022.
[16] Y. Matsubara, M. Levorato, and F. Restuccia, “Split computing and early exiting for deep learning applications: Survey and research challenges,” ACM Comput. Surv., 2022.
[17] Y. Zhang, J. Yu, Y. Chen, W. Yang, and W. Zhang, “Real-time strawberry detection using deep neural networks on embedded system (RTSD-Net): An edge AI application,” Comput. Electron, 2022.
[18] S. A. Abdulrahman and R. A. Jaafar, “Detection and classification of alcoholics using electroencephalogram signal and support vector machine,” Fusion: Pract. Appl., vol. 2, no. 1, pp. 14–21, 2020. DOI: 10.54216/FPA.020103.
[19] V. Roy and S. Shukla, “Designing efficient blind source separation methods for EEG motion artifact removal based on statistical evaluation,” Wireless Pers. Commun, vol. 108, pp. 1311–1327, 2019. DOI: 10.1007/s11277-019-06470-3.
[20] L. H. Chen, Y. J. Liu, and R. M. Zhao, "Deep Learning Approaches for Facial Expression Recognition: A Review," Journal of Visual Communication and Image Representation, vol. 75, pp. 103-115, 2023. DOI: 10.1016/j.jvcir.2023.103115.
[21] H. Ahmed, “Red Palm Weevil Detection Methods: A Survey,” J. Cybersecurity Inf. Manag., vol. 1, no. 1, pp. 17–20, 2020. DOI: 10.54216/JCIM.010103.
[22] K. Ramu, S. V. S. R. K. Raju, S. Singh, V. Rachapudi, M. A. Mary, V. Roy, and S. Joshi, “Deep learning-infused hybrid security model for energy optimization and enhanced security in wireless sensor networks,” SN Comput. Sci., vol. 5, p. 848, 2024. DOI: 10.1007/s42979-024-03193-6.
[23] M. A. Ahmed, R. K. Sharma, and P. N. Gupta, "Machine Learning Techniques for Predicting Chronic Kidney Disease: A Comprehensive Review," Journal of Biomedical Informatics, vol. 128, pp. 103-115, 2023. DOI: 10.1016/j.jbi.2023.103115.
[24] P. Kumar, A. Baliyan, K. R. Prasad, N. Sreekanth, P. Jawarkar, V. Roy, and E. T. Amoatey, “Machine learning-enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks,” Wireless Commun. Mobile Comput., vol. 2022, Article ID 5713092, 15 pages, 2022. DOI: 10.1155/2022/5713092.
[25] VR. S. Sharma, T. K. Gupta, and M. A. Khan, "A Survey on Machine Learning Approaches for Securing Wireless Sensor Networks in 5G Environments," Journal of Network and Computer Applications, vol. 205, pp. 103-115, 2023. DOI: 10.1016/j.jnca.2023.103115.