Yamuna Mundru,
Atti Manga Devi,
Manas Kumar Yogi,
- Assistant Professor, Department of Computer Science and Engineering-Artificial Intelligence & Machine Learning, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India
- Assistant Professor, Department of Information Technology, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India
- Assistant Professor, Department of Computer Science and Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India
Abstract
This comprehensive review explores the current landscape of privacy preservation techniques in multimedia applications, offering a detailed examination of their effectiveness, limitations, and future directions. As the use of multimedia data continues to grow across diverse sectors such as healthcare, surveillance, social media, and entertainment, ensuring the confidentiality and integrity of this data has become a pressing concern. The study covers a broad spectrum of privacy-preserving approaches, from conventional cryptographic methods to more recent advancements leveraging artificial intelligence and machine learning. By analyzing a wide range of scholarly literature and technical implementations, this review highlights significant trends, unresolved challenges, and emerging opportunities in the field. One of the critical findings is the inherent trade-off between maintaining user privacy and preserving multimedia quality. Many state-of-the-art methods offer strong protection but at the cost of high computational overhead and reduced usability. This study presents a nuanced perspective on how complexity and quality are balanced, suggesting areas for innovation and optimization in future multimedia privacy research.
Keywords: Privacy, multimedia, cryptography, steganography, anonymization
[This article belongs to Journal of Multimedia Technology & Recent Advancements ]
Yamuna Mundru, Atti Manga Devi, Manas Kumar Yogi. Privacy Preservation Methods in Multimedia Applications: A Comprehensive Review. Journal of Multimedia Technology & Recent Advancements. 2025; 12(02):33-41.
Yamuna Mundru, Atti Manga Devi, Manas Kumar Yogi. Privacy Preservation Methods in Multimedia Applications: A Comprehensive Review. Journal of Multimedia Technology & Recent Advancements. 2025; 12(02):33-41. Available from: https://journals.stmjournals.com/jomtra/article=2025/view=222334
References
- Romansky R. A survey of digital world opportunities and challenges for user’s privacy. International Journal on Information Technologies and Security (IJITS). 2017 Dec 1; 9(4): 97–112.
- Tran HY, Hu J. Privacy-preserving big data analytics a comprehensive survey. J Parallel Distrib Comput. 2019 Dec 1; 134: 207–18.
- Roberts S. Learning lessons from data breaches. Network Security. 2018 Nov; 2018(11): 8–11.
- Hosny KM, Zaki MA, Lashin NA, Fouda MM, Hamza HM. Multimedia security using encryption: A survey. IEEE Access. 2023 Jun 20; 11: 63027–56.
- Mao Y, Wu M. A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process. 2006 Jun 19; 15(7): 2061–75.
- Amin MM, Salleh M, Ibrahim S, Katmin MR, Shamsuddin MZ. Information hiding using steganography. In 4th IEEE National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings. 2003 Jan 14; 21–25.
- Zhu T, Li G, Zhou W, Philip SY. Differential privacy and applications. Cham, Switzerland: Springer International Publishing; 2017 Jan 1.
- Sankar L, Rajagopalan SR, Poor HV. Utility-privacy tradeoffs in databases: An information-theoretic approach. IEEE Trans Inf Forensics Secur. 2013 Mar 19; 8(6): 838–52.
- Lin WS, Zhao HV, Liu KR. Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks. IEEE Trans Multimed. 2010 Dec 30; 13(2): 191–205.
- Lian S. Multimedia content encryption: techniques and applications. Auerbach Publications; Florida, United States. 2008 Sep 17.
- Abunadi I, Abdullah Mengash H, S. Alotaibi S, Asiri MM, Ahmed Hamza M, Zamani AS, Motwakel A, Yaseen I. Optimal multikey homomorphic encryption with steganography approach for multimedia security in Internet of everything environment. Appl Sci. 2022 Apr 15; 12(8): 4026.
- Zhao C, Zhao S, Zhao M, Chen Z, Gao CZ, Li H, Tan YA. Secure multi-party computation: theory, practice and applications. Inf Sci. 2019 Feb 1; 476: 357–72.
- Bayatbabolghani F, Blanton M. Secure multi-party computation. In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security. 2018 Oct 15; 2157–2159.
- Yang W, Wang S, HuHu J, Karie NM. Multimedia security and privacy protection in the internet of things: research developments and challenges. International Journal of Multimedia Intelligence and Security (IJMIS). 2022; 4(1): 20–46.
- Huang H, Zhang D, Xiao F, Wang K, Gu J, Wang R. Privacy-preserving approach PBCN in social network with differential privacy. IEEE Trans Netw Serv Manag. 2020 Mar 23; 17(2): 931–45.
- Dorgham O, Al-Rahamneh B, Almomani A, Khatatneh KF. Enhancing the security of exchanging and storing DICOM medical images on the cloud. Int J Cloud Appl Comput. 2018 Jan 1; 8(1): 154–72.

Journal of Multimedia Technology & Recent Advancements
| Volume | 12 |
| Issue | 02 |
| Received | 26/05/2025 |
| Accepted | 31/05/2025 |
| Published | 13/06/2025 |
| Publication Time | 18 Days |
Login
PlumX Metrics