Skip to main content

Advertisement

Log in

A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the development of computer network, people could obtain information through the network with stronger impulsion, the dependence of the requirements also becomes higher, this is not only reflected in the increase of information, but to obtain and submit more reflected in real-time and easy to access to information on the pressing needs of the. Therefore, people devoted all aspects from the terminal, network and software platforms to make unremitting efforts. Under this basis, we conduct synthetic research on the data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework in this paper. We firstly introduce the discrete-time Hopfield neural network based data encryption algorithm beyond the analysis on the information flow security and type based model, data security review and attack model under mobile computing environment. We improve learning algorithm of the MD method to avoid the sample mobile and cross interference problems of Hebb rule. Later, we integrate the multi-channel concept to propose the new multi-channel man–machine interaction. In our framework, the 3D interactive technology, speech recognition and synthesis technology, natural language understanding and processing technology, eye tracking technology, posture, input, tactile, force display basic technology are taken into consideration for the synthetic analysis. The result from the experimental simulation proves that our methodology obtains better effectiveness and feasibility from both the angels of data security and interface experience.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abolfazli S et al (2014) Rich mobile applications: genesis, taxonomy, and open issues. J Netw Comput Appl 40:345–362

    Article  Google Scholar 

  2. Ahmad A, Maynard SB, Park S (2014) Information security strategies: towards an organizational multi-strategy perspective. J Intell Manuf 25(2):357–370

    Article  Google Scholar 

  3. Baccarelli E et al (2016) Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study. IEEE Netw 30(2):54–61

    Article  Google Scholar 

  4. Balliu M, Dam M, Le Guernic G (2012) Encover: symbolic exploration for information flow security. 2012 I.E. 25th Computer Security Foundations Symposium (CSF), IEEE

  5. Bao G, Zeng Z (2016) Global asymptotical stability analysis for a kind of discrete-time recurrent neural network with discontinuous activation functions. Neurocomputing

  6. Ben-Artzi G, Werman M, Peleg S (2014) Event matching from significantly different views using motion barcodes. arXiv preprint arXiv:1412.1455

  7. Berger BJ, Sohr K, Koschke R (2013) Extracting and analyzing the implemented security architecture of business applications. 2013 17th European Conference on Software Maintenance and Reengineering (CSMR). IEEE

  8. Bialkowski A et al (2012) A database for person re-identification in multi-camera surveillance networks. 2012 International Conference on Digital Image Computing Techniques and Applications (DICTA), IEEE

  9. Boche H, Schaefer RF, Vincent Poor H (2015) On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels. IEEE Trans Inf Forensic Secur 10(12):2531–2546

    Article  Google Scholar 

  10. Carli V et al (2012) Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure. J Med Ethics 38(2):127–129

    Article  Google Scholar 

  11. Charisis V et al (2015) EmoActivity-An EEG-based gamified emotion HCI for augmented artistic expression: the i-Treasures paradigm.Universal Access in Human-Computer Interaction. Access to the Human Environment and Culture. Springer International Publishing, 29–40

  12. Cheng Y et al (2012) Voice and emotion processing in the human neonatal brain. J Cogn Neurosci 24(6):1411–1419

    Article  Google Scholar 

  13. Coutaz J, Calvary G (2012) Hci and software engineering for user interface plasticity. Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications, Third Edition, 1195–1220

  14. Dwivedi A et al (2013) A cryptographic algorithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system. In Advances in computing and information technology. Springer Berlin Heidelberg, 367–379

  15. Fatemi Moghaddam F, Karimi O, Alrashdan MT (2013) A comparative study of applying real-time encryption in cloud computing environments. 2013 I.E. 2nd International Conference on Cloud Networking (CloudNet), IEEE

  16. Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Futur Gener Comput Syst 29(1):84–106

    Article  Google Scholar 

  17. Gallos LK, Makse HA, Sigman M (2012) A small world of weak ties provides optimal global integration of self-similar modules in functional brain networks. Proc Natl Acad Sci 109(8):2825–2830

    Article  Google Scholar 

  18. Gaver WW et al (2013) Indoor weather stations: investigating a ludic approach to environmental HCI through batch prototyping. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM

  19. Gikas J, Grant MM (2013) Mobile computing devices in higher education: student perspectives on learning with cellphones, smartphones & social media. Internet High Educ 19:18–26

    Article  Google Scholar 

  20. Gkatzikis L, Koutsopoulos I (2013) Migrate or not? Exploiting dynamic task migration in mobile cloud computing systems. IEEE Wirel Commun 20(3):24–32

    Article  Google Scholar 

  21. Greisen P et al (2013) Evaluation and FPGA implementation of sparse linear solvers for video processing applications. IEEE Trans Circ Syst Video Technol 23(8):1402–1407

    Article  Google Scholar 

  22. Gupta N, Agarwal A (2015) Context aware mobile cloud computing: review. 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE

  23. Harrison R, Flood D, Duce D (2013) Usability of mobile applications: literature review and rationale for a new usability model. J Interaction Sci 1(1):1–16

    Article  Google Scholar 

  24. Hedin D, Sabelfeld A (2012) Information-flow security for a core of JavaScript. 2012 I.E. 25th Computer Security Foundations Symposium (CSF), IEEE

  25. Hong X et al (2015) Capturing correlations of local features for image representation. Neurocomputing

  26. Hu Q et al (2012) Managing employee compliance with information security policies: the critical role of top management and organizational culture*. Decis Sci 43(4):615–660

    Article  Google Scholar 

  27. Hu W et al (2015) Global stability analysis of fractional-order Hopfield neural networks with time delay. Neurocomputing 154:15–23

    Article  Google Scholar 

  28. Huang D, Xing T, Wu H (2013) Mobile cloud computing service models: a user-centric approach. IEEE Netw 27(5):6–11

    Article  Google Scholar 

  29. Iacob C, Harrison R (2013) Retrieving and analyzing mobile apps feature requests from online reviews. 2013 10th IEEE Working Conference on Mining Software Repositories (MSR), IEEE

  30. Ifinedo P (2012) Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput Secur 31(1):83–95

    Article  Google Scholar 

  31. Jararweh Y et al (2013) Resource efficient mobile computing using cloudlet infrastructure. 2013 I.E. Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN), IEEE

  32. Jinye L, Lize G, Shoushan L (2012) An anonymous authentication scheme for mobile communication based on third-party. Int J Adv Comput Technol 4(16)

  33. Karapanos E, Jain J, Hassenzahl M (2012) Theories, methods and case studies of longitudinal HCI research. CHI’12 Extended Abstracts on Human Factors in Computing Systems. ACM

  34. Kim N-U, Jung S-M, Chung T-M (2013) A remote control architecture for thin-client in mobile cloud computing. 2013 International Conference on Information Science and Applications (ICISA), IEEE

  35. Kim C et al (2013) On-site construction management using mobile computing technology. Autom Constr 35:415–423

    Article  Google Scholar 

  36. Kovács M, Seidl H (2012) Runtime enforcement of information flow security in tree manipulating processes. Engineering secure software and systems. Springer Berlin Heidelberg, 46–59

  37. Kulshreshth A, Zorn C, LaViola JJ (2013) Poster: real-time markerless kinect based finger tracking and hand gesture recognition for HCI. 2013 I.E. Symposium on 3D User Interfaces (3DUI), IEEE

  38. Kuo C-H, Sun S-W, Chang P-C (2013) A skeleton-based pairwise curve matching scheme for people tracking in a multi-camera environment. 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), IEEE

  39. Li S, Chen W, Shang Z (2013) Research on the performance of encryption techniques for high-bandwidth multicast video streaming

  40. Long M et al (2013) Transfer sparse coding for robust image representation. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition

  41. Lopes O et al (2014) Spherical blurred shape model for 3-d object and pose recognition: quantitative analysis and hci applications in smart environments. IEEE Trans Cybern 44(12):2379–2390

    Article  Google Scholar 

  42. Ma B, Su Y, Jurie F (2012) Bicov: a novel image representation for person re-identification and face verification. British Machive Vision Conference

  43. Mandal S, Bhattacharyya S (2015) Secret data sharing in cloud environment using steganography and encryption using GA. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), IEEE

  44. Mathiyalagan K et al (2015) Exponential filtering for discrete-time switched neural networks with random delays. IEEE Trans Cybern 45(4):676–687

    Article  MathSciNet  Google Scholar 

  45. Mathur A (2012) A Research paper: an ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. Int J Comput Sci Eng 4(9):1650

    Google Scholar 

  46. Mazrooei-Sebdani R, Farjami S (2013) RETRACTED: bifurcations and chaos in a discrete-time-delayed hopfield neural network with ring structures and different internal decays. Neurocomputing 99:154–162

    Article  Google Scholar 

  47. Melicher W et al (2016) Usability and security of text passwords on mobile devices. Proceedings of the 2016 Annual ACM Conference on Human Factors in Computing Systems, CHI. Vol. 16

  48. Mu D et al (2014) A bottom-up approach to verifiable embedded system information flow security. IET Inf Secur 8(1):12–17

    Article  Google Scholar 

  49. Nasseri M, Alam M, Green RC (2013) MDP based optimal policy for collaborative processing using mobile cloud computing. 2013 I.E. 2nd International Conference on Cloud Networking (CloudNet), IEEE

  50. Parsons KM et al (2015) The influence of organizational information security culture on information security decision making. J Cogn Eng Decis Mak 9(2):117–129

    Article  MathSciNet  Google Scholar 

  51. Qi H, Gani A (2012) Research on mobile cloud computing: review, trend and perspectives. 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), IEEE

  52. Sanaei Z et al (2012) Tripod of requirements in horizontal heterogeneous mobile cloud computing. arXiv preprint arXiv:1205.3247

  53. Sanaei Z et al (2012) SAMI: service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing. 2012 1st IEEE International Conference on Communications in China Workshops (ICCC), IEEE

  54. Sandulescu V et al (2015) Mobile app for stress monitoring using voice features. 2015 E-Health and Bioengineering Conference (EHB), IEEE

  55. Shafiu I, Wang WYC, Singh H (2016) Information security compliance behaviour of supply chain stakeholders: influences and differences. Int J Inf Syst Supply Chain Manag (IJISSCM) 9(1):1–16

    Article  Google Scholar 

  56. Shaikh AA, Karjaluoto H (2015) Mobile banking adoption: a literature review. Telematics Inform 32(1):129–142

    Article  Google Scholar 

  57. Shi P, Zhang Y, Agarwal RK (2015) Stochastic finite-time state estimation for discrete time-delay neural networks with Markovian jumps. Neurocomputing 151:168–174

    Article  Google Scholar 

  58. Shiraz M et al (2013) A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Commun Surv Tutorials 15(3):1294–1313

    Article  Google Scholar 

  59. Subramanyan P, Arora D (2014) Formal verification of taint-propagation security properties in a commercial SoC design. Proceedings of the conference on Design, Automation & Test in Europe. European Design and Automation Association

  60. Wang H, Shkjezi F, Hoxha E (2013) Distance metric learning for multi-camera people matching. 2013 Sixth International Conference on Advanced Computational Intelligence (ICACI), IEEE

  61. Wang H, Wang J (2014) An effective image representation method using kernel classification. 2014 I.E. 26th International Conference on Tools with Artificial Intelligence (ICTAI), IEEE

  62. Williams PAH, McCauley VB (2013) A rapidly moving target: conformance with e-health standards for mobile computing

  63. Williams A et al (2014) Multisited design: an analytical lens for transnational HCI. Hum Comput Interact 29(1):78–108

    Article  Google Scholar 

  64. Xiong H et al (2012) Anonymous authentication protocols for vehicular ad hoc networks: an overview. Applied Cryptography and Network Security

  65. Xu C, Corso JJ (2012) Evaluation of super-voxel methods for early video processing. 2012 I.E. Conference on Computer Vision and Pattern Recognition (CVPR), IEEE

  66. Xu Y, Fan Z, Zhu Q (2012) Feature space-based human face image representation and recognition. Opt Eng 51(1):017205-1

    Article  Google Scholar 

  67. Yamada K, Miyawaki Y, Kamitani Y (2015) Inter-subject neural code converter for visual image representation. NeuroImage 113:289–297

    Article  Google Scholar 

  68. Yang L et al (2013) A framework for partitioning and execution of data stream applications in mobile cloud computing. ACM SIGMETRICS Perform Eval Rev 40(4):23–32

    Article  Google Scholar 

  69. Yang Y et al (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. Computer Security--ESORICS 2015. Springer International Publishing, 146–166

  70. Zanin M, Pisarchik AN (2014) Gray code permutation algorithm for high-dimensional data encryption. Inf Sci 270:288–297

    Article  Google Scholar 

  71. Zhang Y et al (2015) An evaluation of combustion and emissions performance with low cetane naphtha fuels in a multi-cylinder heavy-duty diesel engine. ASME 2015 Internal Combustion Engine Division Fall Technical Conference. American Society of Mechanical Engineers

  72. Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, J. A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework. Multimed Tools Appl 76, 16963–16987 (2017). https://doi.org/10.1007/s11042-016-3662-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3662-1

Keywords

Navigation