Abstract
With the rapid advancement of internet, massive amounts of multimedia content are generated and/or exchanged via multiple Internet of Things (IoT) systems, devices, and applications. However, the privacy and security of multimedia information have surfaced as major problems that might compromise the effective adoption of IoT devices, particularly in data-sensitive scenarios. This paper provides an in-depth examination of multimedia content privacy and security protection in the IoT systems. A classification of multimedia information into various categories and security levels based on application fields is initially presented. Then, an examination and debate on the current multimedia content protection systems in the IoT, covering both conventional systems such as encryption and watermarking, and developing technologies such as blockchain and federated learning, is conducted. This work identifies certain challenges and opportunities, highlighting areas for future research based on an extensive examination of the research progress of IoT-related multimedia privacy and security protection research. Besides the work is aimed to, further assist the investigators in developing a greater understanding of the state-of-the-art in multimedia content protection in the IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Karie NM, Sahri NM, Haskell-Dowland P (2020) IoT threat detection advances, challenges and future directions. In: 2020 workshop on emerging technologies for security in IoT (ETSecIoT), April 2020. IEEE, pp 22–29
Zhou L, Chao HC (2011) Multimedia traffic security architecture for the internet of things. IEEE Netw 25(3):35–40
Yongliang L, Gao W, Liu S (2004) Multimedia security in the distributed environment. In: APCC/MDMC’04. The 2004 joint conference of the 10th Asia-Pacific conference on communications and the 5th international symposium on multi-dimensional mobile communications proceeding, August 2004, vol 2. IEEE, pp 639–642
Punia A, Gupta D, Jaiswal S (2017) A perspective on available security techniques in IoT. In: 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT), May 2017. IEEE, pp 1553–1559
Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A systemic approach for IoT security. In: 2013 IEEE international conference on distributed computing in sensor systems, May 2013. IEEE, pp 351–355
Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82
Parah SA, Sheikh JA, Bhat GM (2012) Data hiding in intermediate significant bit planes, a high capacity blind steganographic technique. In: 2012 international conference on emerging trends in science, engineering and technology (INCOSET), December 2012. IEEE, pp 192–197
Parah SA, Sheikh JA, Bhat GM (2014) A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am J Eng Technol Res 14(2):33
Parah SA, Sheikh JA, Bhat GM (2012) On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach. Comput Sci Eng 49:10141
Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour MM (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383–18413
Nahrstedt K, Dittmann J, Wohlmacher P (2000) Approaches to multimedia and security. In: 2000 IEEE international conference on multimedia and Expo. ICME2000. Proceedings. Latest advances in the fast changing world of multimedia (Cat. No. 00TH8532), July 2000, vol 3. IEEE, pp 1275–1278
Tzelepi S, Pangalos G, Nikolacopoulou G (2002) Security of medical multimedia. Med Inform Internet Med 27(3):169–184
Furht B, Socek D (2003) A survey of multimedia security. Comprehensive report.
Voloshynovskyy S, Koval O, Deguillaume F, Pun T (2005) Multimedia security: open problems and solutions. In: Proceedings of NATO-advanced study institute: security through science program 2005
Moravčík M, Segeč P, Hrabovský J, Papán J, Uramová J (2016) Survey of real-time multimedia security mechanisms. In: 2016 international conference on emerging eLearning technologies and applications (ICETA), November 2016. IEEE, pp 233–238
Ashour AS, Dey N (2017) Security of multimedia contents: a brief. In: Intelligent techniques in signal processing for multimedia security. Springer, Cham, pp 3–14
Li Y, Jeong YS, Shin BS, Park JH (2017) Crowdsensing multimedia data: security and privacy issues. IEEE Multimed 24(4):58–66
Alvi SA, Afzal B, Shah GA, Atzori L, Mahmood W (2015) Internet of multimedia things: vision and challenges. Ad Hoc Netw 33:87–111
Wang Q, Zhao Y, Wang W, Minoli D, Sohraby K, Zhu H, Occhiogrosso B (2017) Multimedia IoT systems and applications. In: 2017 global internet of things summit (GIoTS), June 2017. IEEE, pp 1–6
Kumar D, Kumar P, Ashok A (2020) Introduction to multimedia big data computing for IoT. In: Multimedia big data computing for IoT applications. Springer, Singapore, pp 3–36
Hurrah NN, Parah SA, Sheikh JA, Al-Turjman F, Muhammad K (2019) Secure data transmission framework for confidentiality in IoTs. Ad Hoc Netw 95:101989
Parah SA, Sheikh JA, Akhoon JA, Loan NA (2020) Electronic health record hiding in images for smart city applications: a computationally efficient and reversible information hiding technique for secure communication. Futur Gener Comput Syst 108:935–949
Nauman A, Qadri YA, Amjad M, Zikria YB, Afzal MK, Kim SW (2020) Multimedia internet of things: a comprehensive survey. IEEE Access 8:8202–8250
Verma S, Bhatia A, Chug A, Singh AP (2020) Recent advancements in multimedia big data computing for IoT applications in precision agriculture: opportunities, issues, and challenges. In: Multimedia big data computing for IoT applications. Springer, Singapore, pp 391–416
Nath MP, Priyadarshini SBB, Ray M, Das DS (2022) An overview of multimedia technologies in current era of internet of things (IoT). In: Multimedia technologies in the internet of things environment, vol 2, pp 1–23
Yu S (2016) Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4:2751–2763
Qu Y, Yu S, Zhou W, Peng S, Wang G, Xiao K (2018) Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel Commun 25(6):91–97
Alhirabi N, Rana O, Perera C (2021) Security and privacy requirements for the internet of things: a survey. ACM Trans Internet Things 2(1):1–37
Husnoo MA, Anwar A, Chakrabortty RK, Doss R, Ryan MJ (2021) Differential privacy for IoT-enabled critical infrastructure: a comprehensive survey. IEEE Access 9:153276–153304
Jiang B, Li J, Yue G, Song H (2021) Differential privacy for industrial internet of things: opportunities, applications, and challenges. IEEE Internet Things J 8(13):10430–10451
Oracevic A, Dilek S, Ozdemir S (2017) Security in internet of things: a survey. In: 2017 international symposium on networks, computers and communications (ISNCC), May 2017. IEEE, pp 1–6
Bhat GM, Mustafa M, Parah SA, Ahmad J (2010) Field programmable gate array (FPGA) implementation of novel complex PN-code-generator-based data scrambler and descrambler. Maejo Int J Sci Technol 4(1):125–135
Qu Y, Yu S, Gao L, Zhou W, Peng S (2018) A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans Comput Soc Syst 5(3):773–784
Zikria YB, Afzal MK, Kim SW (2020) Internet of multimedia things (IoMT): opportunities, challenges and solutions. Sensors 20(8):2334
Khattab A, Abdelgawad A, Yelmarthi K (2016) Design and implementation of a cloud-based IoT scheme for precision agriculture. In: 2016 28th international conference on microelectronics (ICM), December 2016. IEEE, pp 201–204
Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Procedia Comput Sci 93:931–939
Yang W, Wang S, Zheng G, Chaudhry J, Valli C (2018) ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures. J Supercomput 74(10):4893–4909
Ribaric S, Ariyaeeinia A, Pavesic N (2016) De-identification for privacy protection in multimedia content: a survey. Signal Process Image Commun 47:131–151
Lu Y, Wu S, Fang Z, Xiong N, Yoon S, Park DS (2017) Exploring finger vein based personal authentication for secure IoT. Futur Gener Comput Syst 77:149–160
Thilagavathi B, Suthendran K (2018) Boosting based implementation of biometric authentication in IoT. J Cyber Secur Mobil:131–144
Yang W, Wang S, Zheng G, Yang J, Valli C (2019) A privacy-preserving lightweight biometric system for internet of things security. IEEE Commun Mag 57(3):84–89
Xu J, Glicksberg BS, Su C, Walker P, Bian J, Wang F (2021) Federated learning for healthcare informatics. J Healthc Inform Res 5(1):1–19
Bhoomika BK, Muralidhara KN (2015) Secured smart healthcare monitoring system based on Iot. Int J Recent Innov Trends Comput Commun 3(7):4958–4961
Muhammad G, Rahman SMM, Alelaiwi A, Alamri A (2017) Smart health solution integrating IoT and cloud: a case study of voice pathology monitoring. IEEE Commun Mag 55(1):69–73
Parah SA, Kaw JA, Bellavista P, Loan NA, Bhat GM, Muhammad K, de Albuquerque VHC (2020) Efficient security and authentication for edge-based internet of medical things. IEEE Internet Things J 8(21):15652–15662
Rashid M, Singh H, Goyal V, Parah SA, Wani AR (2021) Big data based hybrid machine learning model for improving performance of medical internet of things data in healthcare systems. In: Healthcare paradigms in the internet of things ecosystem. Academic Press, pp 47–62
Sarosh P, Parah SA, Bhat GM, Heidari AA, Muhammad K (2021) Secret sharing-based personal health records management for the internet of health things. Sustain Cities Soc 74:103129
Obaidat MS, Rana SP, Maitra T, Giri D, Dutta S (2019) Biometric security and internet of things (IoT). In: Biometric-based physical and cybersecurity systems. Springer, Cham, pp 477–509
Hsu TH, Tung YM (2020) A social-aware P2P video transmission strategy for multimedia IoT devices. IEEE Access 8:95574–95584
Yu H, Wang J, Sun X (2019) Surveillance video online prediction using multilayer ELM with object principal trajectory. SIViP 13(6):1243–1251
Feng X, Ye M, Swaminathan V, Wei S (2017) Towards the security of motion detection-based video surveillance on IoT devices. In: Proceedings of the on thematic workshops of ACM multimedia, October 2017. Association for Computing Machinery, New York, NY, pp 228–235
Liu W, Zhang M, Luo Z, Cai Y (2017) An ensemble deep learning method for vehicle type classification on visual traffic surveillance sensors. IEEE Access 5:24417–24425
Zhao H, Qin J, Hu J (2012) An energy efficient key management scheme for body sensor networks. IEEE Trans Parallel Distrib Syst 24(11):2202–2210
Pandey C, Sharma S, Matta P (2021) Privacy techniques for body sensor network in healthcare internet of things (HIoT)-a critical survey. In: 2021 5th international conference on computing methodologies and communication (ICCMC), April 2021. IEEE, pp 385–389
Ren Y, Zhu F, Zhu K, Sharma PK, Wang J (2021) Blockchain-based trust establishment mechanism in the internet of multimedia things. Multimed Tools Appl 80(20):30653–30676
Vishwa A, Hussain FK (2018) A blockchain based approach for multimedia privacy protection and provenance. In: 2018 IEEE symposium series on computational intelligence (SSCI), November 2018. IEEE, pp 1941–1945
Li D, Liu W, Deng L, Qin B (2021) Design of multimedia blockchain privacy protection system based on distributed trusted communication. Trans Emerg Telecommun Technol 32(2):e3938
Abdur Rahman M, Loukas G, Maruf Abdullah S, Abdu A, Sadiqur Rahman S, Hassanain E, Arafa Y (2019) Blockchain and IoT-based secure multimedia retrieval system for a massive crowd: sharing economy perspective. In: Proceedings of the 2019 on international conference on multimedia retrieval, June 2019, pp 404–407
Rathee G, Sharma A, Saini H, Kumar R, Iqbal R (2020) A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology. Multimed Tools Appl 79(15):9711–9733
Maggo P, Chhillar RS (2013) Lightweight image encryption scheme for multimedia security. Int J Comput Appl 71(13)
Dhall S, Pal SK, Sharma K (2014) Cryptographic primitives for multimedia security. INROADS-Int J Jaipur National Univ 3(1s2):335–339
Wang X, Akgul A, Kacar S, Pham VT (2017) Multimedia security application of a ten-term chaotic system without equilibrium. Complexity 2017
Mekki N, Hamdi M, Aguili T, Kim TH (2018) A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system. In: 2018 international conference on advanced communication technologies and networking (CommNet), April 2018. IEEE, pp 1–10
Nie H, Jiang X, Tang W, Zhang S, Dou W (2020) Data security over wireless transmission for enterprise multimedia security with fountain codes. Multimed Tools Appl 79(15):10781–10803
Liu F, Li T (2018) A clustering-anonymity privacy-preserving method for wearable iot devices. Secur Commun Netw 2018
Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet Things J 6(2):1530–1540
Guo X, Lin H, Wu Y, Peng M (2020) A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems. Futur Gener Comput Syst 113:407–417
Onesimu JA, Karthikeyan J, Sei Y (2021) An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. Peer Peer Netw Appl 14(3):1629–1649
Tian Y, Zhang Z, Xiong J, Chen L, Ma J, Peng C (2021) Achieving graph clustering privacy preservation based on structure entropy in social IoT. IEEE Internet Things J 9(4):2761–2777
Xia Y, Chen W, Liu X, Zhang L, Li X, Xiang Y (2017) Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans Intell Transp Syst 18(10):2629–2641
Aljawarneh S, Yassein MB, Talafha WAA (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–22724
Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SK, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325
Kumari S, Om H (2017) Cryptanalysis and improvement of an anonymous multi-server authenticated key agreement scheme. Wirel Pers Commun 96(2):2513–2537
Deebak BD, Al-Turjman F, Mostarda L (2019) A hash-based RFID authentication mechanism for context-aware management in IoT-based multimedia systems. Sensors 19(18):3821
Omrani T, Rhouma R, Becheikh R (2019) LICID: a lightweight image cryptosystem for IoT devices. Cryptologia 43(4):313–343
Ma S, Zhang T, Wu A, Zhao X (2019) Lightweight and privacy-preserving data aggregation for mobile multimedia security. IEEE Access 7:114131–114140
Huang CT, Tsai MY, Lin LC, Wang WJ, Wang SJ (2018) VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. J Supercomput 74(9):4295–4314
Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Futur Gener Comput Syst 94:654–673
Wu HT, Zheng K, Huang Q, Hu J (2021) Contrast enhancement of multiple tissues in MR brain images with reversibility. IEEE Signal Processing Lett 28:160–164
Rani M, Germine Mary G, Rosemary Euphrasia K (2016) Multilevel multimedia security by integrating visual cryptography and steganography techniques. In: Computational intelligence, cyber security and computational models. Springer, Singapore, pp 403–412
Xu C, Ren J, Zhang D, Zhang Y (2018) Distilling at the edge: a local differential privacy obfuscation framework for IoT data analytics. IEEE Commun Mag 56(8):20–25
Qiao Y, Liu Z, Lv H, Li M, Huang Z, Li Z, Liu W (2019) An effective data privacy protection algorithm based on differential privacy in edge computing. IEEE Access 7:136203–136213
Zia MT, Khan MA, El-Sayed H (2020) Application of differential privacy approach in healthcare data–a case study. In: 2020 14th international conference on innovations in information technology (IIT), November 2020. IEEE, pp 35–39
Xue W, Shen Y, Luo C, Xu W, Hu W, Seneviratne A (2022) A differential privacy-based classification system for edge computing in IoT. Comput Commun 182:117–128
Pang J, Huang Y, Xie Z, Han Q, Cai Z (2020) Realizing the heterogeneity: a self-organized federated learning framework for IoT. IEEE Internet Things J 8(5):3088–3098
Imteaj A, Amini MH (2019) Distributed sensing using smart end-user devices: pathway to federated learning for autonomous IoT. In: 2019 international conference on computational science and computational intelligence (CSCI), December 2019. IEEE, pp 1156–1161
Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y (2019) Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Industr Inform 16(6):4177–4186
Wu Q, He K, Chen X (2020) Personalized federated learning for intelligent IoT applications: a cloud-edge based framework. IEEE Open J Comput Soc 1:35–44
Hamoudy MA, Qutqut MH, Almasalha F (2017) Video security in internet of things: an overview. IJCSNS 17(8):199
OVIC (2021) Internet of things and privacy – issues and challenges [Available Online] https://ovic.vic.gov.au/privacy/internet-of-things-and-privacy-issues-and-challenges/ (Accessed 30 July 2022)
Bodei C, Chessa S, Galletta L (2019) Measuring security in IoT communications. Theor Comput Sci 764:100–124
Shifa A, Asghar MN, Fleury M (2016) Multimedia security perspectives in IoT. In: 2016 sixth international conference on innovative computing technology (INTECH), August 2016. IEEE, pp 550–555
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Nisa, R., Baba, A. (2023). Breakthroughs and Challenges in Multimedia Privacy and Security in the Internet of Things (IoT). In: Parah, S.A., Hurrah, N.N., Khan, E. (eds) Intelligent Multimedia Signal Processing for Smart Ecosystems. Springer, Cham. https://doi.org/10.1007/978-3-031-34873-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-34873-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34872-3
Online ISBN: 978-3-031-34873-0
eBook Packages: Computer ScienceComputer Science (R0)