Multimedia Security and Privacy

A special issue of Journal of Cybersecurity and Privacy (ISSN 2624-800X). This special issue belongs to the section "Security Engineering & Applications".

Deadline for manuscript submissions: 10 October 2025 | Viewed by 13107

Special Issue Editor

Special Issue Information

Dear Colleagues,

Multimedia communications play a significant role in various areas of present-day, society including politics, economics, defense, healthcare, business, and entertainment. The five core building blocks of multimedia are text, image, audio, video, and animation. Multimedia, however, is susceptible to security and privacy attacks. The communication of multimedia over wired and/or wireless channels, including the Internet, exacerbates the security and privacy challenges of multimedia. Therefore, it is imperative to secure multimedia data by providing confidentiality, integrity, identity or ownership, and privacy.

This Special Issue targets security and privacy topics in multimedia. This Special Issue invites original research articles and reviews that relate to security and privacy attacks on multimedia, including artificial intelligence (AI)-based attacks, encryption techniques for multimedia, steganography, digital watermarking, digital rights management, multimedia authentication, and AI-based attack mitigation techniques. Topics of interest include, but are not limited to, the following:

  • Multimedia encryption;
  • Homomorphic encryption;
  • Multimedia authentication;
  • Steganography;
  • Steganalysis;
  • Digital watermarking;
  • Digital rights management;
  • Multimedia forensics;
  • Biometric security;
  • Quantum-based multimedia cryptosystems;
  • AI-based multimedia security;
  • Fake multimedia generation and detection;
  • Adversarial attacks and defenses;
  • AI-based deepfake videos generation and detection;
  • Multimedia privacy

Dr. Arslan Munir
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Cybersecurity and Privacy is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

22 pages, 2821 KiB  
Article
Blockchain-Based Evidence Trustworthiness System in Certification
by Cristina Regueiro and Borja Urquizu
J. Cybersecur. Priv. 2025, 5(1), 1; https://doi.org/10.3390/jcp5010001 - 30 Dec 2024
Viewed by 1238
Abstract
Digital evidence is a critical component in today’s organizations, as it is the foundation on which any certification is based. This paper presents a risk assessment of evidence in the certification domain to identify the main security risks. To mitigate these risks, it [...] Read more.
Digital evidence is a critical component in today’s organizations, as it is the foundation on which any certification is based. This paper presents a risk assessment of evidence in the certification domain to identify the main security risks. To mitigate these risks, it also proposes an adaptation of an existing Blockchain-based audit trail system to create an evidence trustworthiness system enhancing security and usability. This system covers specific additional requirements from auditors: evidence confidentiality and integrity verification automation. The system has been validated with cloud service providers to increase the security of evidence for a cybersecurity certification process. However, it can be also extended to other certification domains. Full article
(This article belongs to the Special Issue Multimedia Security and Privacy)
Show Figures

Figure 1

Review

Jump to: Research

27 pages, 1397 KiB  
Review
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by Yousef Alghamdi and Arslan Munir
J. Cybersecur. Priv. 2024, 4(1), 126-152; https://doi.org/10.3390/jcp4010007 - 23 Feb 2024
Cited by 14 | Viewed by 10428
Abstract
Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks such as the internet. Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryption due to their slow [...] Read more.
Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks such as the internet. Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryption due to their slow encryption speeds and high computational requirements, researchers have proposed specialized algorithms for image encryption. This paper provides an introduction and overview of the image encryption algorithms and metrics used, aiming to evaluate them and help researchers and practitioners starting in this field obtain adequate information to understand the current state of image encryption algorithms. This paper classifies image encryption into seven different approaches based on the techniques used and analyzes the strengths and weaknesses of each approach. Furthermore, this paper provides a detailed review of a comprehensive set of security, quality, and efficiency evaluation metrics for image encryption algorithms, and provides upper and lower bounds for these evaluation metrics. Finally, this paper discusses the pros and cons of different image encryption approaches as well as the suitability of different image encryption approaches for different applications. Full article
(This article belongs to the Special Issue Multimedia Security and Privacy)
Show Figures

Figure 1

Back to TopTop