Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2019.9.3.022

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality  

Kim, Donghyun (Multimedia, Hannam University)
Lim, Jaehyun (Multimedia, Hannam University)
Kim, Seoksoo (Multimedia, Hannam University)
Publication Information
Journal of Convergence for Information Technology / v.9, no.3, 2019 , pp. 22-29 More about this Journal
Abstract
Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.
Keywords
Mixed Reality; Contents; Security Agent; Mobile Networking; Rendering;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 K. Fatma. (2017). High Performance and Reliable Fault Detection Scheme for the Secure Hash Algorithm. Indian Journal of Science and Technology 10.19 (2017).
2 S. R. Kokate & S. G. Salunke. (2017). Implementation of Intelligent Malware Detection System Using Post Processing Techniques. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). (pp. 1-4).
3 S. W Jeong, U. R Chio & I. G. Lee. (2018). Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things. Journal of Digital Convergence, 16(9), 179-185.   DOI
4 H. U. Kim, H. J. Kim, J. H. Kang & M. S. Jun. (2017). A Study on Analysis and Countermeasure of Security threat in NFC. Journal of Digital Convergence, 14(12), 183-191.   DOI
5 K. H Ko. (2018). An Estimating Algorithm of Vehicle Collision Speed Through Images of Blackbox. Journal of Digital Convergence, 16(9), 173-178.   DOI
6 K. J. Lee & W. S. Jeong. (2011). An Analysis of the Economic Effects for the Immersive Media Industry. The Journal of Korean Institute of Communications and Information Sciences, 36(7), 795-805.   DOI
7 J. L. Raheja, A. Chaudhary, K. Singal. (2011). Tracking of fingertips and centers of palm using kinect. In Computational intelligence, modelling and simulation (CIMSiM), 248-252.
8 S. Jonathan (1992). Defining virtual reality: Dimensions determining telepresence. Journal of communication, 42(4), 73-93.   DOI
9 E. Damiani, S. Vimercati, S. Paraboschi & P. Samarati (2000). Securing XML Documents. Proceedings of the 2000 International Conference on Extending Database Technology(EDBT2000).
10 Wen, Quan, Yufei Wang & Peng Li. (2018). Two Zero-Watermark methods for XML documents. Journal of Real-Time Image Processing, 14(1), 183-192.   DOI
11 S. A. Kumar. (2017). Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications, 76(6), 8881-8900.   DOI
12 S. H. Kim. (2016). Realtime 3D Human Full-Body Convergence Motion Capture using a Kinect Sensor. Journal of Digital Convergence, 14(1), 189-194.   DOI
13 K. W. Park & J. Y. Lee. (2015). A Morphology Technique-Based Boundary Detection in a Two-Dimensional QR Code. Journal of Digital Convergence, 13(12), 159-175.
14 S. M. Jung, J. G. Song, D. J. Hwang, J. Y. Aan & S. S. Kim. (2010). A Study on Software-based Sensing Technology for Multiple Object Control in AR Video. Sensors, 10(11), 9857-9871.   DOI
15 J. U. Hou, D. G. Kim & H. K. Lee. (2017). Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. IEEE Transactions on Information Forensics and Security, 12(11), 2712-2725.   DOI
16 A. F. Tawfiq & J. Lu. (2017). Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques: A Smart Fuzzy-Based Model for Financial XML Transactions Security Using XML Encryption. Ontologies and Big Data Considerations for Effective Intelligence. IGI Global, 2017, 214-326.