A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework

被引:10
|
作者
Li, Jun [1 ]
机构
[1] Chinese Acad Sci, Quanzhou Inst Equipment Mfg, Haixi Inst, Quanzhou 362200, Peoples R China
关键词
Data encryption; Mobile computing; Security enhancement; Human computer interaction; Mobile multimedia; Multi-channel framework; NEURAL-NETWORKS; INFORMATION; INTEGRATION; MANAGEMENT;
D O I
10.1007/s11042-016-3662-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of computer network, people could obtain information through the network with stronger impulsion, the dependence of the requirements also becomes higher, this is not only reflected in the increase of information, but to obtain and submit more reflected in real-time and easy to access to information on the pressing needs of the. Therefore, people devoted all aspects from the terminal, network and software platforms to make unremitting efforts. Under this basis, we conduct synthetic research on the data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework in this paper. We firstly introduce the discrete-time Hopfield neural network based data encryption algorithm beyond the analysis on the information flow security and type based model, data security review and attack model under mobile computing environment. We improve learning algorithm of the MD method to avoid the sample mobile and cross interference problems of Hebb rule. Later, we integrate the multi-channel concept to propose the new multi-channel man-machine interaction. In our framework, the 3D interactive technology, speech recognition and synthesis technology, natural language understanding and processing technology, eye tracking technology, posture, input, tactile, force display basic technology are taken into consideration for the synthetic analysis. The result from the experimental simulation proves that our methodology obtains better effectiveness and feasibility from both the angels of data security and interface experience.
引用
收藏
页码:16963 / 16987
页数:25
相关论文
共 17 条
  • [1] A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework
    Jun Li
    [J]. Multimedia Tools and Applications, 2017, 76 : 16963 - 16987
  • [2] Research of multi-channel multimedia data transmission based on TCP/IP protocol
    Zhang, JH
    Li, FP
    [J]. ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 5292 - 5295
  • [3] Research of Multi-interface Data Encryption Equipment Based on Mobile Terminal
    Wan, Zhong
    Yin, Weifeng
    Sun, Ronggao
    [J]. CISST'09: PROCEEDINGS OF THE 3RD WSEAS INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, SIGNAL AND TELECOMMUNICATIONS, 2009, : 126 - 129
  • [4] A security integration model for private data of intelligent mobile communication based on edge computing
    Chen, Xiang
    [J]. COMPUTER COMMUNICATIONS, 2020, 162 : 204 - 211
  • [5] Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing
    Daesung Moon
    Ikkyun Kim
    Jae Woong Joo
    Hyung Jin Im
    Jong Hyuk Park
    Young-Sik Jeong
    [J]. Wireless Personal Communications, 2016, 91 : 1697 - 1710
  • [6] Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing
    Moon, Daesung
    Kim, Ikkyun
    Joo, Jae Woong
    Im, Hyung Jin
    Park, Jong Hyuk
    Jeong, Young-Sik
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (04) : 1697 - 1710
  • [7] A Novel Nodes Data Security Communication Model of Internet of Vehicles Based on Mobile Edge Computing
    Xu, Zengyong
    [J]. International Journal of Network Security, 2024, 26 (02) : 329 - 337
  • [8] Research on Mobile-Agent Based Data Access Model in Pervasive Computing Environment
    Li Fan
    Jiang WeiJian
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1523 - +
  • [9] Research on the Three-Dimensional Human-Computer Interaction based on the Mobile Internet Terminal
    Xiang, Lu Ji
    Ping, Wang
    Ling, Tong
    Bei, Zhang
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL I, 2011, : 366 - 368
  • [10] Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing
    Zhang, Yinghui
    Zheng, Dong
    Li, Qi
    Li, Jin
    Li, Hui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3688 - 3702