Abstract
With the development of computer network, people could obtain information through the network with stronger impulsion, the dependence of the requirements also becomes higher, this is not only reflected in the increase of information, but to obtain and submit more reflected in real-time and easy to access to information on the pressing needs of the. Therefore, people devoted all aspects from the terminal, network and software platforms to make unremitting efforts. Under this basis, we conduct synthetic research on the data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework in this paper. We firstly introduce the discrete-time Hopfield neural network based data encryption algorithm beyond the analysis on the information flow security and type based model, data security review and attack model under mobile computing environment. We improve learning algorithm of the MD method to avoid the sample mobile and cross interference problems of Hebb rule. Later, we integrate the multi-channel concept to propose the new multi-channel man–machine interaction. In our framework, the 3D interactive technology, speech recognition and synthesis technology, natural language understanding and processing technology, eye tracking technology, posture, input, tactile, force display basic technology are taken into consideration for the synthetic analysis. The result from the experimental simulation proves that our methodology obtains better effectiveness and feasibility from both the angels of data security and interface experience.
Similar content being viewed by others
References
Abolfazli S et al (2014) Rich mobile applications: genesis, taxonomy, and open issues. J Netw Comput Appl 40:345–362
Ahmad A, Maynard SB, Park S (2014) Information security strategies: towards an organizational multi-strategy perspective. J Intell Manuf 25(2):357–370
Baccarelli E et al (2016) Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study. IEEE Netw 30(2):54–61
Balliu M, Dam M, Le Guernic G (2012) Encover: symbolic exploration for information flow security. 2012 I.E. 25th Computer Security Foundations Symposium (CSF), IEEE
Bao G, Zeng Z (2016) Global asymptotical stability analysis for a kind of discrete-time recurrent neural network with discontinuous activation functions. Neurocomputing
Ben-Artzi G, Werman M, Peleg S (2014) Event matching from significantly different views using motion barcodes. arXiv preprint arXiv:1412.1455
Berger BJ, Sohr K, Koschke R (2013) Extracting and analyzing the implemented security architecture of business applications. 2013 17th European Conference on Software Maintenance and Reengineering (CSMR). IEEE
Bialkowski A et al (2012) A database for person re-identification in multi-camera surveillance networks. 2012 International Conference on Digital Image Computing Techniques and Applications (DICTA), IEEE
Boche H, Schaefer RF, Vincent Poor H (2015) On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels. IEEE Trans Inf Forensic Secur 10(12):2531–2546
Carli V et al (2012) Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure. J Med Ethics 38(2):127–129
Charisis V et al (2015) EmoActivity-An EEG-based gamified emotion HCI for augmented artistic expression: the i-Treasures paradigm.Universal Access in Human-Computer Interaction. Access to the Human Environment and Culture. Springer International Publishing, 29–40
Cheng Y et al (2012) Voice and emotion processing in the human neonatal brain. J Cogn Neurosci 24(6):1411–1419
Coutaz J, Calvary G (2012) Hci and software engineering for user interface plasticity. Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications, Third Edition, 1195–1220
Dwivedi A et al (2013) A cryptographic algorithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system. In Advances in computing and information technology. Springer Berlin Heidelberg, 367–379
Fatemi Moghaddam F, Karimi O, Alrashdan MT (2013) A comparative study of applying real-time encryption in cloud computing environments. 2013 I.E. 2nd International Conference on Cloud Networking (CloudNet), IEEE
Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Futur Gener Comput Syst 29(1):84–106
Gallos LK, Makse HA, Sigman M (2012) A small world of weak ties provides optimal global integration of self-similar modules in functional brain networks. Proc Natl Acad Sci 109(8):2825–2830
Gaver WW et al (2013) Indoor weather stations: investigating a ludic approach to environmental HCI through batch prototyping. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM
Gikas J, Grant MM (2013) Mobile computing devices in higher education: student perspectives on learning with cellphones, smartphones & social media. Internet High Educ 19:18–26
Gkatzikis L, Koutsopoulos I (2013) Migrate or not? Exploiting dynamic task migration in mobile cloud computing systems. IEEE Wirel Commun 20(3):24–32
Greisen P et al (2013) Evaluation and FPGA implementation of sparse linear solvers for video processing applications. IEEE Trans Circ Syst Video Technol 23(8):1402–1407
Gupta N, Agarwal A (2015) Context aware mobile cloud computing: review. 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE
Harrison R, Flood D, Duce D (2013) Usability of mobile applications: literature review and rationale for a new usability model. J Interaction Sci 1(1):1–16
Hedin D, Sabelfeld A (2012) Information-flow security for a core of JavaScript. 2012 I.E. 25th Computer Security Foundations Symposium (CSF), IEEE
Hong X et al (2015) Capturing correlations of local features for image representation. Neurocomputing
Hu Q et al (2012) Managing employee compliance with information security policies: the critical role of top management and organizational culture*. Decis Sci 43(4):615–660
Hu W et al (2015) Global stability analysis of fractional-order Hopfield neural networks with time delay. Neurocomputing 154:15–23
Huang D, Xing T, Wu H (2013) Mobile cloud computing service models: a user-centric approach. IEEE Netw 27(5):6–11
Iacob C, Harrison R (2013) Retrieving and analyzing mobile apps feature requests from online reviews. 2013 10th IEEE Working Conference on Mining Software Repositories (MSR), IEEE
Ifinedo P (2012) Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput Secur 31(1):83–95
Jararweh Y et al (2013) Resource efficient mobile computing using cloudlet infrastructure. 2013 I.E. Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN), IEEE
Jinye L, Lize G, Shoushan L (2012) An anonymous authentication scheme for mobile communication based on third-party. Int J Adv Comput Technol 4(16)
Karapanos E, Jain J, Hassenzahl M (2012) Theories, methods and case studies of longitudinal HCI research. CHI’12 Extended Abstracts on Human Factors in Computing Systems. ACM
Kim N-U, Jung S-M, Chung T-M (2013) A remote control architecture for thin-client in mobile cloud computing. 2013 International Conference on Information Science and Applications (ICISA), IEEE
Kim C et al (2013) On-site construction management using mobile computing technology. Autom Constr 35:415–423
Kovács M, Seidl H (2012) Runtime enforcement of information flow security in tree manipulating processes. Engineering secure software and systems. Springer Berlin Heidelberg, 46–59
Kulshreshth A, Zorn C, LaViola JJ (2013) Poster: real-time markerless kinect based finger tracking and hand gesture recognition for HCI. 2013 I.E. Symposium on 3D User Interfaces (3DUI), IEEE
Kuo C-H, Sun S-W, Chang P-C (2013) A skeleton-based pairwise curve matching scheme for people tracking in a multi-camera environment. 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), IEEE
Li S, Chen W, Shang Z (2013) Research on the performance of encryption techniques for high-bandwidth multicast video streaming
Long M et al (2013) Transfer sparse coding for robust image representation. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition
Lopes O et al (2014) Spherical blurred shape model for 3-d object and pose recognition: quantitative analysis and hci applications in smart environments. IEEE Trans Cybern 44(12):2379–2390
Ma B, Su Y, Jurie F (2012) Bicov: a novel image representation for person re-identification and face verification. British Machive Vision Conference
Mandal S, Bhattacharyya S (2015) Secret data sharing in cloud environment using steganography and encryption using GA. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), IEEE
Mathiyalagan K et al (2015) Exponential filtering for discrete-time switched neural networks with random delays. IEEE Trans Cybern 45(4):676–687
Mathur A (2012) A Research paper: an ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. Int J Comput Sci Eng 4(9):1650
Mazrooei-Sebdani R, Farjami S (2013) RETRACTED: bifurcations and chaos in a discrete-time-delayed hopfield neural network with ring structures and different internal decays. Neurocomputing 99:154–162
Melicher W et al (2016) Usability and security of text passwords on mobile devices. Proceedings of the 2016 Annual ACM Conference on Human Factors in Computing Systems, CHI. Vol. 16
Mu D et al (2014) A bottom-up approach to verifiable embedded system information flow security. IET Inf Secur 8(1):12–17
Nasseri M, Alam M, Green RC (2013) MDP based optimal policy for collaborative processing using mobile cloud computing. 2013 I.E. 2nd International Conference on Cloud Networking (CloudNet), IEEE
Parsons KM et al (2015) The influence of organizational information security culture on information security decision making. J Cogn Eng Decis Mak 9(2):117–129
Qi H, Gani A (2012) Research on mobile cloud computing: review, trend and perspectives. 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), IEEE
Sanaei Z et al (2012) Tripod of requirements in horizontal heterogeneous mobile cloud computing. arXiv preprint arXiv:1205.3247
Sanaei Z et al (2012) SAMI: service-based arbitrated multi-tier infrastructure for Mobile Cloud Computing. 2012 1st IEEE International Conference on Communications in China Workshops (ICCC), IEEE
Sandulescu V et al (2015) Mobile app for stress monitoring using voice features. 2015 E-Health and Bioengineering Conference (EHB), IEEE
Shafiu I, Wang WYC, Singh H (2016) Information security compliance behaviour of supply chain stakeholders: influences and differences. Int J Inf Syst Supply Chain Manag (IJISSCM) 9(1):1–16
Shaikh AA, Karjaluoto H (2015) Mobile banking adoption: a literature review. Telematics Inform 32(1):129–142
Shi P, Zhang Y, Agarwal RK (2015) Stochastic finite-time state estimation for discrete time-delay neural networks with Markovian jumps. Neurocomputing 151:168–174
Shiraz M et al (2013) A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Commun Surv Tutorials 15(3):1294–1313
Subramanyan P, Arora D (2014) Formal verification of taint-propagation security properties in a commercial SoC design. Proceedings of the conference on Design, Automation & Test in Europe. European Design and Automation Association
Wang H, Shkjezi F, Hoxha E (2013) Distance metric learning for multi-camera people matching. 2013 Sixth International Conference on Advanced Computational Intelligence (ICACI), IEEE
Wang H, Wang J (2014) An effective image representation method using kernel classification. 2014 I.E. 26th International Conference on Tools with Artificial Intelligence (ICTAI), IEEE
Williams PAH, McCauley VB (2013) A rapidly moving target: conformance with e-health standards for mobile computing
Williams A et al (2014) Multisited design: an analytical lens for transnational HCI. Hum Comput Interact 29(1):78–108
Xiong H et al (2012) Anonymous authentication protocols for vehicular ad hoc networks: an overview. Applied Cryptography and Network Security
Xu C, Corso JJ (2012) Evaluation of super-voxel methods for early video processing. 2012 I.E. Conference on Computer Vision and Pattern Recognition (CVPR), IEEE
Xu Y, Fan Z, Zhu Q (2012) Feature space-based human face image representation and recognition. Opt Eng 51(1):017205-1
Yamada K, Miyawaki Y, Kamitani Y (2015) Inter-subject neural code converter for visual image representation. NeuroImage 113:289–297
Yang L et al (2013) A framework for partitioning and execution of data stream applications in mobile cloud computing. ACM SIGMETRICS Perform Eval Rev 40(4):23–32
Yang Y et al (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. Computer Security--ESORICS 2015. Springer International Publishing, 146–166
Zanin M, Pisarchik AN (2014) Gray code permutation algorithm for high-dimensional data encryption. Inf Sci 270:288–297
Zhang Y et al (2015) An evaluation of combustion and emissions performance with low cetane naphtha fuels in a multi-cylinder heavy-duty diesel engine. ASME 2015 Internal Combustion Engine Division Fall Technical Conference. American Society of Mechanical Engineers
Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, J. A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework. Multimed Tools Appl 76, 16963–16987 (2017). https://doi.org/10.1007/s11042-016-3662-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3662-1