• Title/Summary/Keyword: visual sharing

Search Result 142, Processing Time 0.028 seconds

Sharing Eye Gaze in Mixed Reality Remote Collaboration System (원격협업 시스템에서 협력자 눈 시점 공유)

  • Jeong, Jaejoon;Kim, Seungwon
    • Smart Media Journal
    • /
    • v.11 no.6
    • /
    • pp.30-36
    • /
    • 2022
  • This paper explored the effect of using eye gaze pointer in addition to the hand gesture visual communication cue in remote collaboration. We recruited 24 participants and conducted a user study comparing two conditions: (1) only hand gesture visual communication cue, and (2) eye gaze pointer with hand gesture visual cue. The results showed that the added eye gaze pointer cue reduced the workload and increased the co-presence when using it together with hand gesture cue.

Optical Visual Cryptography based on Binary Phase Exctraction JTC (BPEJTC를 이용한 광 비쥬얼 크립토그래피)

  • 이상이;이승현
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.8
    • /
    • pp.589-597
    • /
    • 2003
  • Visual cryptography made it possible to decrypt thresholding scheme with not digital system but human vision system. This method, however, has some limit in it. Optical visual cryptography was proposed which used laser instead of human eyesight. As a result, it was possible to adapt cryptography to optical system. However, it also had some difficulties because it did not overcome the existing problem of visual cryptography completely. These problems occurred in the process of transferring data processing system from visual to optics. Therefore, it is appropriate to approach these problems in terms of optics. This paper analyzes the level of noise and the security characteristics for optical visual cryptography in terms of frequency based on joint transform correlator.

Variable Queue Sharing Mechanism for ATM Traffic (ATM 트래픽을 위한 가변큐공유(VQS) 메카니즘)

  • An, Jeong-Hui;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.742-749
    • /
    • 1999
  • This paper proposes the mechanism of cell buffering in the output buffer of ATM switch for the traffic with the different QOS in the ATM environment. The proposed mechanism, VQS(Variable Queue Sharing) can minimize the cell loss ratio(CLR) of bursty traffic through the sharing of CBR queue, VBR queue, ABR queue to maximize the utilization of queue resource. To evaluate VQS performance, we make simulator using Visual Slam 2.0. We compare the CLP and cell average delay of VQS and HOL, QLT_HOL using the bursty traffic patterns.

  • PDF

Visual Cryptography Using the Number of $_nC_2$ (조합 $_nC_2$을 이용한 시각암호의 구현)

  • Kim, Moon-Soo;Kang, Mee-Kwang
    • Communications of Mathematical Education
    • /
    • v.22 no.4
    • /
    • pp.515-531
    • /
    • 2008
  • The visual cryptography scheme is a simple method which can be decoded directly the secret information in human visual system without performing any cryptographic computations. For some secret of image type, we scatter them to random n images and if any threshold (or more) of them are stacked together then original image is visible. In this paper we consider (2,n) visual cryptography scheme and show a construction method of the sample matrix using the rule of binomial coefficients $_nC_2$. This scheme can contribute interesting and effectiveness to the study of mathematics.

  • PDF

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

The Characteristics of User Created Content(UCC) for Virtual Band K/DA (가상밴드 K/DA에 대한 사용자 제작 콘텐츠(UCC) 특성)

  • Zhe, Han;Lee, Hyun Seok
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.74-84
    • /
    • 2020
  • In November 2018, virtual pop band K/DA, with the use of holograms and actual K-pop girl group members, performed its debut album titled "POP/STARS" at the opening ceremony of the League of Legends S8 final, hosted by Riot Games. The fan culture that exists for real singers adapts itself to virtual bands, and K/DA, consisting of virtual characters, encouraging the production of user created content (UCC). However, this form of UCC is different from the most common one, meaning that this type of band generates another way of consuming content. Therefore, this study examines how K/DA's digital characters are transformed and reproduced by UCC and how the original producers' content differs from them. Firstly, the development of this study considers the open characteristics of UCC, such as user type, created motivation, created process, content type and sharing method. In the second part, the virtual idol Hatsune Miku and virtual band Pentakill will be analysed to understand UCC. Thirdly, K/DA will be analyzed as a case study based on three factors: created motivation, content type and sharing method. In this manner, this study aims to explain how UCC for virtual bands reproduce and consume original content and expand their commercial value.

GML Map Visualization on Mobile Devices

  • Song, Eun-Ha;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.33-42
    • /
    • 2010
  • GIS can only be applied to certain areas by storing format. It is subordinate to a system when displaying geographic information data. It is therefore inevitable for GIS to use GML that supports efficient usage of various geographic information data and interoperability for integration and sharing. The paper constructs VisualGML that translates currently-used geographic information such as DXF (Drawing Exchange Format), DWG (DraWinG), or SHP (Shapefile) into GML format for visualization. VisualGML constructs an integrated map pre-process module, which filters geographic information data according to its tag and properties, to provide the flexibility of a mobile device. VisualGML also provides two major GIS services for the user and administrator. It can enable visualizing location search. This is applied with a 3-Layer POI structure for the user. It has trace monitoring visualization through moving information of mobile devices for the administrator.

An Analysis of Collaborative Visualization Processing of Text Information for Developing e-Learning Contents

  • SUNG, Eunmo
    • Educational Technology International
    • /
    • v.10 no.1
    • /
    • pp.25-40
    • /
    • 2009
  • The purpose of this study was to explore procedures and modalities on collaborative visualization processing of text information for developing e-Learning contents. In order to investigate, two research questions were explored: 1) what are procedures on collaborative visualization processing of text information, 2) what kinds of patterns and modalities can be found in each procedure of collaborative visualization of text information. This research method was employed a qualitative research approaches by means of grounded theory. As a result of this research, collaborative visualization processing of text information were emerged six steps: identifying text, analyzing text, exploring visual clues, creating visuals, discussing visuals, elaborating visuals, and creating visuals. Collaborative visualization processing of text information came out the characteristic of systemic and systematic system like spiral sequencing. Also, another result of this study, modalities in collaborative visualization processing of text information was divided two dimensions: individual processing by internal representation, social processing by external representation. This case study suggested that collaborative visualization strategy has full possibility of providing ideal methods for sharing cognitive system or thinking system as using human visual intelligence.

New Construction Scheme for Improving Contrast in Visual Cryptography (시각암호의 휘도 개선을 위한 새로운 구성법)

  • 양신석;김문수;박지환
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.2
    • /
    • pp.136-144
    • /
    • 2001
  • visual cryptography is a simple method in which secret information can be directly decoded in human visual system without any cryptographic computations. This scheme is a kind of secret sharing scheme in which secret of image type is distributed to n random image(we call it share). When the secret image is distributed to n shares, the original pixel is expanded as much as the size of column in basis matrix. It causes the deterioration of contrast in docoded secret image. Therefore, many researches have performed to reduce the size of pixel expansion and to improve the contrast by overlapping the row in basis matrix for (k, n) visual cryptography. In addition, we show that the proposed method can construct the (k, n) visual cryptography with multiple contrasts depending on selecting k out of n slides in a group.

  • PDF

VNC-Based Screen Sharing System for Android Smart Devices (VNC 기반의 안드로이드 스마트 기기 화면 공유 시스템)

  • Park, Jong-Eun;Lee, You-Dong;Lee, Hong-Chang;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.522-532
    • /
    • 2012
  • Smartphones and smartpads have a lot of advantages such as high convenience and portability. Also, they can effectively manage enormous amounts of information based on their high performance and plentiful applications. As such devices have been frequently used, many users manage various types of information using the devices. Recently, during conferences or seminars, smart device users often try to utilize stored resources on their devices and present them visually. Unfortunately, since smart devices have small displays, there is an essential difficulty in visual sharing of information. In this paper, we propose a method which integrates screens of several android smart devices and supports sharing of the integrated screen through a large display, presenting a screen sharing system for android smart devices. The developed system integrates display screens of several smart devices into a screen and shows the integrated screen through a large display connected to a desktop computer. In addition, to support the effective sharing of screens, the system provides functions for adjusting the number and the size of screens on a large display. The functions are controlled on a smart device and/or a desktop computer.