1 |
K. J. Lee & W. S. Jeong. (2011). An Analysis of the Economic Effects for the Immersive Media Industry. The Journal of Korean Institute of Communications and Information Sciences, 36(7), 795-805.
DOI
|
2 |
S. Jonathan. (1992). Defining virtual reality: Dimensions determining telepresence. Journal of communication 42(4), 73-93.
DOI
|
3 |
E. Damiani, S. Vimercati, S. Paraboschi & P. Samarati. (2000). Securing XML Documents. Proceedings of the 2000 International Conference on Extending Database Technology(EDBT2000).
|
4 |
Q. Wen, Y. Wang & P. Li. (2018). Two Zero-Watermark methods for XML documents. Journal of Real-Time Image Processing, 14(1), 183-192.
DOI
|
5 |
J. L. Raheja, A. Chaudhary, K. Singal. (2011). Tracking of fingertips and centers of palm using kinect. In Computational intelligence, modelling and simulation (CIMSiM), 248-252.
|
6 |
S. A. Kumar. (2017). Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications 76(6), 8881-8900.
DOI
|
7 |
S. H. Kim. (2016). Realtime 3D Human Full-Body Convergence Motion Capture using a Kinect Sensor. Journal of Digital Convergence, 14(1), 189-194.
DOI
|
8 |
K. W. Park & J. Y. Lee. (2015). A Morphology Technique-Based Boundary Detection in a Two-Dimensional QR Code. Journal of Digital Convergence, 13(12), 159-175.
|
9 |
S. M. Jung., J. G. Song, D. J. Hwang, J. Y. Aan & S. S. Kim. (2010). A Study on Software-based Sensing Technology for Multiple Object Control in AR Video. Sensors, 10(11), 9857-9871.
DOI
|
10 |
J. U. Hou, D. G. Kim & H. K. Lee. (2017). Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. IEEE Transactions on Information Forensics and Security, 12(11), 2712-2725.
DOI
|
11 |
A. F. Tawfiq & J. Lu. (2017). Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques: A Smart Fuzzy-Based Model for Financial XML Transactions Security Using XML Encryption. Ontologies and Big Data Considerations for Effective Intelligence. IGI Global, 201, 214-326.
|
12 |
K. Fatma. (2017). High Performance and Reliable Fault Detection Scheme for the Secure Hash Algorithm. Indian Journal of Science and Technology 10(19).
|
13 |
S. R. Kokate & S. G. Salunke. (2017). Implementation of Intelligent Malware Detection System Using Post Processing Techniques. 2017 International Conference on Computing, Communication. Control and Automation (ICCUBEA), 1-4
|
14 |
S. W. Jeong, U. R. Chio & I. G. Lee. (2018). Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things. Journal of Digital Convergence, 16(9), 179-185.
DOI
|
15 |
H. U. Kim, H. J. Kim, J. H. Kang & M. S. Jun. (2017). A Study on Analysis and Countermeasure of Security threat in NFC. Journal of Digital Convergence, 14(12), 183-191.
DOI
|
16 |
K. H. Ko. (2018). An Estimating Algorithm of Vehicle Collision Speed Through Images of Blackbox. Journal of Digital Convergence, 16(9), 173-178.
DOI
|