Research enhances online security

Jan 21, 2014 by Keith Hautala

As the digital world becomes more and more integrated with day-to-day life, computer scientist Samson Cheung's research is helping to provide necessary safeguards, without sacrificing the benefits brought forth by new technologies.

Cheung, an associate professor in the Department of Electrical and Computer Engineering at the University of Kentucky, focuses on developing efficient, robust and secure systems to analyze, process and communicate information. Cheung and his research group are working on visual privacy protection, secure computation, multimedia content management and networking.

It is a challenging area. Most multimedia applications require handling large volumes of data, at a very high rate, to meet demand for truly realistic user experiences. However, this massive river of data—including photos, audio and video recordings and other types of new digital media—can be challenging to analyze and interpret.

This video is not supported by your browser at this time.

Cheung's work is featured in the above video, produced by UK's Center for Visualization and Virtual Environments (the Vis Center) as part of the "What's Next" series. It may also be viewed at "Reveal," the official website for UK Research Media, at http://reveal.uky.edu.

Explore further: Solving the 'cocktail party problem'

add to favorites email to friend print save as pdf

Related Stories

New exercise guidelines developed for people with MS

Oct 11, 2013

According to new research out of Queen's University, an active lifestyle has many benefits for adults living with multiple sclerosis. Based on that research, Amy Latimer-Cheung (School of Kinesiology and Health Studies) has ...

Recommended for you

Ten ways to stay safe while shopping online

9 hours ago

As the holiday shopping season gets underway, the importance of avoiding hackers, phishing scams and phony websites while buying online becomes increasingly important.

Automakers aim to drive away car computer hackers

Nov 24, 2014

Against the team of hackers, the poor car stood no chance. Meticulously overwhelming its computer networks, the hackers showed that—given time—they would be able to pop the trunk and start the windshield ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.