Multimedia Security and Privacy

A special issue of Journal of Cybersecurity and Privacy (ISSN 2624-800X). This special issue belongs to the section "Security Engineering & Applications".

Deadline for manuscript submissions: 30 September 2024 | Viewed by 2082

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science, Kansas State University, Manhattan, KS 66506, USA
Interests: artificial intelligence; computer vision; parallel computing; embedded systems; secure and trustworthy systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Multimedia communications play a significant role in various areas of present-day, society including politics, economics, defense, healthcare, business, and entertainment. The five core building blocks of multimedia are text, image, audio, video, and animation. Multimedia, however, is susceptible to security and privacy attacks. The communication of multimedia over wired and/or wireless channels, including the Internet, exacerbates the security and privacy challenges of multimedia. Therefore, it is imperative to secure multimedia data by providing confidentiality, integrity, identity or ownership, and privacy.

This Special Issue targets security and privacy topics in multimedia. This Special Issue invites original research articles and reviews that relate to security and privacy attacks on multimedia, including artificial intelligence (AI)-based attacks, encryption techniques for multimedia, steganography, digital watermarking, digital rights management, multimedia authentication, and AI-based attack mitigation techniques. Topics of interest include, but are not limited to, the following:

  • Multimedia encryption;
  • Homomorphic encryption;
  • Multimedia authentication;
  • Steganography;
  • Steganalysis;
  • Digital watermarking;
  • Digital rights management;
  • Multimedia forensics;
  • Biometric security;
  • Quantum-based multimedia cryptosystems;
  • AI-based multimedia security;
  • Fake multimedia generation and detection;
  • Adversarial attacks and defenses;
  • AI-based deepfake videos generation and detection;
  • Multimedia privacy

Dr. Arslan Munir
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Cybersecurity and Privacy is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

27 pages, 1397 KiB  
Review
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by Yousef Alghamdi and Arslan Munir
J. Cybersecur. Priv. 2024, 4(1), 126-152; https://doi.org/10.3390/jcp4010007 - 23 Feb 2024
Viewed by 1304
Abstract
Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks such as the internet. Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryption due to their slow [...] Read more.
Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks such as the internet. Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryption due to their slow encryption speeds and high computational requirements, researchers have proposed specialized algorithms for image encryption. This paper provides an introduction and overview of the image encryption algorithms and metrics used, aiming to evaluate them and help researchers and practitioners starting in this field obtain adequate information to understand the current state of image encryption algorithms. This paper classifies image encryption into seven different approaches based on the techniques used and analyzes the strengths and weaknesses of each approach. Furthermore, this paper provides a detailed review of a comprehensive set of security, quality, and efficiency evaluation metrics for image encryption algorithms, and provides upper and lower bounds for these evaluation metrics. Finally, this paper discusses the pros and cons of different image encryption approaches as well as the suitability of different image encryption approaches for different applications. Full article
(This article belongs to the Special Issue Multimedia Security and Privacy)
Show Figures

Figure 1

Back to TopTop