Recent Advances in Security and Privacy for Multimedia Systems

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Electronic Multimedia".

Deadline for manuscript submissions: 15 August 2024 | Viewed by 2262

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, Sejong University, Seoul 05006, Republic of Korea
Interests: application of DSP; information theory; data hiding
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Office of Research and Development, National Chengchi University, Taipei 11605, Taiwan
Interests: encryption; cryptography; information security; network security; blockchain and privacy technologies

Special Issue Information

Dear Colleagues,

Multimedia systems are now widely used in various fields; accordingly, the importance of security and privacy is increasing. It is necessary to develop and apply effective and reliable technologies and methods with which to respond to various threats and attacks that may occur during the creation, transmission, storage, processing, and sharing of multimedia data.

To this end, various efforts are being made to advance technology. We invite researchers working in relevant areas to submit their latest manuscripts which either design new technologies or apply technologies in different multimedia technologies and security areas.

Topics of interest include, but are not limited to, the following:

  • Technologies such as encryption, decryption, authentication, and integrity checking of multimedia data;
  • Technologies such as anonymization, pseudonymization, and de-identification of multimedia data;
  • Technologies such as steganography of multimedia data, digital watermarking and digital rights management;
  • Technologies such as multimedia data breach detection, analysis, and response;
  • Proposals for new models, frameworks and architectures for multimedia data security and privacy;
  • Case studies and applications related to multimedia data security and privacy;
  • Including research related to multimedia.

 Researchers interested in this Special Issue are invited to write and submit a paper.

Prof. Dr. Cheonshik Kim
Prof. Dr. Raylin Tso
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • encryption
  • decryption
  • authentication
  • integrity checking
  • anonymization
  • pseudonymization
  • de-identification
  • steganography
  • digital watermarking
  • frameworks
  • architectures
  • applications on security and privacy

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

13 pages, 643 KiB  
Article
Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2
by Gyeongju Song, Siwoo Eum, Hyeokdong Kwon, Minjoo Sim, Minwoo Lee and Hwajeong Seo
Electronics 2023, 12(21), 4485; https://doi.org/10.3390/electronics12214485 - 31 Oct 2023
Viewed by 755
Abstract
This paper explores the optimization of quantum circuits for Argon2, a memory-hard function used in password hashing applications. With the rise of quantum computers, the security of classical cryptographic systems is at risk. This paper emphasizes the need to accurately measure the quantum [...] Read more.
This paper explores the optimization of quantum circuits for Argon2, a memory-hard function used in password hashing applications. With the rise of quantum computers, the security of classical cryptographic systems is at risk. This paper emphasizes the need to accurately measure the quantum security strength of cryptographic schemes through highly optimized quantum circuits for the target cryptography algorithm. The proposed method focuses on two perspectives: qubit reduction (qubit-optimized quantum circuit) and depth reduction (depth-optimized quantum circuit). The qubit-optimized quantum circuit was designed to find a point where an appropriate inverse is possible and reuses the qubit through the inverse to minimize the number of qubits. The start and end points of the inverse are determined by identifying a point where qubits can be reused with minimal computation. The depth-optimized quantum circuit reduces the depth of the quantum circuit by using the minimum number of qubits necessary without performing an inverse operation. The trade-off between qubit and depth is confirmed by modifying the internal structure of the circuits and the quantum adders. The qubit optimization achieved up to a 12,229 qubit reduction, while the depth optimization resulted in an approximately 196,741 (approximately 69.02%) depth reduction. In conclusion, this research demonstrates the importance of implementing and analyzing quantum circuits from multiple optimization perspectives. The results contribute to the post-quantum strength analysis of Argon2 and provide valuable insights for future research on optimized quantum circuit design, considering the appropriate trade-offs of quantum resources in response to advancements in quantum computing technology. Full article
(This article belongs to the Special Issue Recent Advances in Security and Privacy for Multimedia Systems)
Show Figures

Figure 1

13 pages, 1629 KiB  
Article
Double Quantification of Template and Network for Palmprint Recognition
by Qizhou Lin, Lu Leng and Cheonshik Kim
Electronics 2023, 12(11), 2455; https://doi.org/10.3390/electronics12112455 - 29 May 2023
Viewed by 1102
Abstract
The outputs of deep hash network (DHN) are binary codes, so DHN has high retrieval efficiency in matching phase and can be used for high-speed palmprint recognition, which is a promising biometric modality. In this paper, the templates and network parameters are both [...] Read more.
The outputs of deep hash network (DHN) are binary codes, so DHN has high retrieval efficiency in matching phase and can be used for high-speed palmprint recognition, which is a promising biometric modality. In this paper, the templates and network parameters are both quantized for fast and light-weight palmprint recognition. The parameters of DHN are binarized to compress the network weight and accelerate the speed. To avoid accuracy degradation caused by quantization, mutual information is leveraged to optimize the ambiguity in Hamming space to obtain a tri-valued hash code as a palmprint template. Kleene Logic’s tri-valued Hamming distance measures the dissimilarity between palmprint templates. The ablation experiments are tested on the binarization of the network parameter, and the normalization and trivialization of the deep hash output value. The sufficient experiments conducted on several contact and contactless palmprint datasets confirm the multiple advantages of our method. Full article
(This article belongs to the Special Issue Recent Advances in Security and Privacy for Multimedia Systems)
Show Figures

Figure 1

Back to TopTop