Research on Information Security Enhancement Approaches and the Applications on HCI Systems

With rapid development of computer techniques, the human computer interaction scenarios are becoming more and more frequent. The development history of the human-computer interaction is from a person to adapt to the computer to the computer and continually adapt to the rapid development. Facing the process of human-computer interaction, information system daily operation to produce huge amounts of data, how to ensure human-computer interaction interface clear, generated data safe and reliable, has become a problem to be solved in the world of information. To deal with the challenging, we propose the information security enhancement approaches and the core applications on HCI systems. Through reviewing the other state-of-the-art methods, we propose the data encryption system to deal with the issues that uses mixed encryption system to make full use of the symmetric cipher algorithm encryption speed and encryption intensity is high while the encryption of large amounts of data efficiently. Our method could enhance the general safety of the HCI system, the experimental result verities the feasibility and general robustness of our approach.

[1]  A. T. Papagiannakis,et al.  An improved image processing technique for asphalt concrete X-ray CT images , 2013 .

[2]  Changhe Yuan,et al.  Finding Optimal Bayesian Network Structures with Constraints Learned from Data , 2014, UAI.

[3]  Changhe Yuan,et al.  Tightening Bounds for Bayesian Network Structure Learning , 2014, AAAI.

[4]  Alida Mazzoli,et al.  Particle size, size distribution and morphological evaluation of airborne dust particles of diverse woods by Scanning Electron Microscopy and image processing program , 2012 .

[5]  Luciano Boquete,et al.  EOG-based eye movements codification for human computer interaction , 2012, Expert Syst. Appl..

[6]  D. Meng Data security in cloud computing , 2013, 2013 8th International Conference on Computer Science & Education.

[7]  Sateesh Kumar Peddoju,et al.  Access Control Based Data Security in Cloud Computing , 2012 .

[8]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[9]  Nam-Sik Kim,et al.  Dynamic characteristics of suspension bridge hanger cables using digital image processing , 2013 .

[10]  Anupam Agrawal,et al.  Vision based hand gesture recognition for human computer interaction: a survey , 2012, Artificial Intelligence Review.

[11]  Du meng Data security in cloud computing , 2013, ICCSE 2013.

[12]  Aleksandra Labus,et al.  Scaffolding Environment for Adaptive E-learning through Cloud Computing , 2013, J. Educ. Technol. Soc..

[13]  Maarten Bullynck,et al.  Computing Primes (1929-1949): Transformations in the Early Days of Digital Computing , 2015, IEEE Annals of the History of Computing.

[14]  Antorweep Chakravorty,et al.  Privacy Preserving Data Analytics for Smart Homes , 2013, 2013 IEEE Security and Privacy Workshops.

[15]  Giovani Rubert Librelotto,et al.  Applying Pervasive Computing in an Architecture for Homecare Environments , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[16]  Naif Alajlan,et al.  Differential Evolution Extreme Learning Machine for the Classification of Hyperspectral Images , 2014, IEEE Geoscience and Remote Sensing Letters.

[17]  Haoxiang Wang,et al.  An Effective Image Representation Method Using Kernel Classification , 2014, 2014 IEEE 26th International Conference on Tools with Artificial Intelligence.

[18]  Jinjun Chen,et al.  An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Tanushri Mittal,et al.  A Survey of Cryptographic based Security Algorithms for Cloud Computing , 2014 .

[20]  Farrukh Shahzad,et al.  State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.