DOI QR코드

DOI QR Code

Design of Security Method for Network Rendering of Augmented Reality Object

홀로그램 용 증강현실 객체의 네트워크 랜더링을 위한 보안 기법 설계

  • Received : 2018.11.26
  • Accepted : 2019.01.20
  • Published : 2019.01.28

Abstract

Due to the development of hologram display technology, various studies are being conducted to provide realistic contents for augmented reality. In the case of the HMD for hologram, since augmented reality objects must be rendered by a small processor, it is necessary to use a low-capacity content. To solve this problem, there is a need for a technique of rendering resources by providing resources through a network. In the case of the existing augmented reality system, there is no problem of contents modulation because the resources are loaded and rendered in the internal storage space. However, when providing resources through the network, security problems such as content tampering and malicious code insertion should be considered. Therefore, in this paper, we propose a network rendering technique applying security techniques to provide augmented reality contents in a holographic HMD device.

홀로그램 디스플레이 기술의 발전으로 인하여 증강현실에 대한 실감형 콘텐츠를 제공하기 위한 다양한 연구들이 진행되고 있다. 홀로그램용 HMD의 경우 소형의 프로세서에서 증강현실의 객체를 랜더링하여 제공하여야 하기 때문에 저용량의 콘텐츠를 사용해야하는 문제점이 있어 이를 해결하고자 네트워크를 통해 콘텐츠의 리소스를 제공하여 랜더링하는 기술이 필요하다. 기존의 증강현실 시스템의 경우 내부 저장 공간에서 리소스를 불러와 랜더링하기 때문에 콘텐츠 변조의 문제점이 없으나 네트워크를 통해 리소스를 제공할 경우 콘텐츠의 변조, 악의적인 코드 삽입 등 보안의 문제점을 고려해야 한다. 따라서 본 논문에서는 홀로그램 HMD 디바이스에서 증강현실 콘텐츠를 제공함에 있어 보안 기법을 적용한 네트워크 랜더링 기법을 제안한다.

Keywords

JKOHBZ_2019_v9n1_92_f0001.png 이미지

Fig. 1. System Structure

JKOHBZ_2019_v9n1_92_f0002.png 이미지

Fig. 2. Progressive Probabilistic Hough Transform Method in Vector

JKOHBZ_2019_v9n1_92_f0003.png 이미지

Fig. 3 Basic Pattern File

JKOHBZ_2019_v9n1_92_f0004.png 이미지

Fig. 4 Pattern Array Text

JKOHBZ_2019_v9n1_92_f0005.png 이미지

Fig. 5. Object Resource Vector using Watermarking

Table 1. XML tag of contents resource

JKOHBZ_2019_v9n1_92_t0001.png 이미지

References

  1. K. J. Lee & W. S. Jeong. (2011). An Analysis of the Economic Effects for the Immersive Media Industry. The Journal of Korean Institute of Communications and Information Sciences, 36(7), 795-805. https://doi.org/10.7840/KICS.2011.36B.7.795
  2. S. Jonathan. (1992). Defining virtual reality: Dimensions determining telepresence. Journal of communication 42(4), 73-93. https://doi.org/10.1111/j.1460-2466.1992.tb00812.x
  3. E. Damiani, S. Vimercati, S. Paraboschi & P. Samarati. (2000). Securing XML Documents. Proceedings of the 2000 International Conference on Extending Database Technology(EDBT2000).
  4. Q. Wen, Y. Wang & P. Li. (2018). Two Zero-Watermark methods for XML documents. Journal of Real-Time Image Processing, 14(1), 183-192. https://doi.org/10.1007/s11554-016-0647-2
  5. J. L. Raheja, A. Chaudhary, K. Singal. (2011). Tracking of fingertips and centers of palm using kinect. In Computational intelligence, modelling and simulation (CIMSiM), 248-252.
  6. S. A. Kumar. (2017). Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications 76(6), 8881-8900. https://doi.org/10.1007/s11042-016-3514-z
  7. S. H. Kim. (2016). Realtime 3D Human Full-Body Convergence Motion Capture using a Kinect Sensor. Journal of Digital Convergence, 14(1), 189-194. https://doi.org/10.14400/JDC.2016.14.1.189
  8. K. W. Park & J. Y. Lee. (2015). A Morphology Technique-Based Boundary Detection in a Two-Dimensional QR Code. Journal of Digital Convergence, 13(12), 159-175.
  9. S. M. Jung., J. G. Song, D. J. Hwang, J. Y. Aan & S. S. Kim. (2010). A Study on Software-based Sensing Technology for Multiple Object Control in AR Video. Sensors, 10(11), 9857-9871. https://doi.org/10.3390/s101109857
  10. J. U. Hou, D. G. Kim & H. K. Lee. (2017). Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. IEEE Transactions on Information Forensics and Security, 12(11), 2712-2725. https://doi.org/10.1109/TIFS.2017.2718482
  11. A. F. Tawfiq & J. Lu. (2017). Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques: A Smart Fuzzy-Based Model for Financial XML Transactions Security Using XML Encryption. Ontologies and Big Data Considerations for Effective Intelligence. IGI Global, 201, 214-326.
  12. K. Fatma. (2017). High Performance and Reliable Fault Detection Scheme for the Secure Hash Algorithm. Indian Journal of Science and Technology 10(19).
  13. S. R. Kokate & S. G. Salunke. (2017). Implementation of Intelligent Malware Detection System Using Post Processing Techniques. 2017 International Conference on Computing, Communication. Control and Automation (ICCUBEA), 1-4
  14. S. W. Jeong, U. R. Chio & I. G. Lee. (2018). Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things. Journal of Digital Convergence, 16(9), 179-185. https://doi.org/10.14400/JDC.2018.16.9.179
  15. H. U. Kim, H. J. Kim, J. H. Kang & M. S. Jun. (2017). A Study on Analysis and Countermeasure of Security threat in NFC. Journal of Digital Convergence, 14(12), 183-191. https://doi.org/10.14400/JDC.2016.14.12.183
  16. K. H. Ko. (2018). An Estimating Algorithm of Vehicle Collision Speed Through Images of Blackbox. Journal of Digital Convergence, 16(9), 173-178. https://doi.org/10.14400/JDC.2018.16.5.173