Academic Journals Database
Disseminating quality controlled scientific knowledge


Author(s): Fei Yu | Chin-Chen Chang | Deng-Yi Zhang | Jie-Xian Zeng | Jun Zhang

Journal: Journal of Multimedia
ISSN 1796-2048

Volume: 4;
Issue: 3;
Start page: 101;
Date: 2009;
Original page

Keywords: Special Issue | Electronic Commerce | Security | Web Information Systems

This special issue comprises of eight selected papers from the International Symposium on Electronic Commerce Security (ISECS 2009), Nanchang, China, 22-24 May 2009. The conference received 1050 paper submissions from 19 countries and regions, of which 487 were selected for presentation after a rigorous review process. From these 487 research papers, through two rounds of reviewing, the guest editors selected twelve as the best papers on the Computers track of the Conference. The candidates of the Special Issue are all the authors, whose papers have been accepted and presented at the ISECS 2009 and WISA 2009, with the contents not been published elsewhere before.The ISECS 2009 and WISA 2009 are sponsored by Nanchang HangKong University, China, Peoples' Friendship University of Russia, Nanchang University (China), Jiangxi Normal University (China), Wuhan University (China), National Chung Hsing University (Taiwan), Institute of Software, Chinese Academy of Sciences, Sichuan University (China), and Jiaxing University (China). Technical Co-Sponsors of the conference are IEEE, IEEE Computer Society, and IEEE Computer Society Technical Committee on E-Commerce.“A Novel Ideal Contrast Visual Secret Sharing Scheme with Reversing”, by Haibo Zhang, Xiaofei Wang and Youpeng Huang, proposes a scheme with reversing based on a PBVSS scheme. It achieves really ideal contrast within only [m/h] runs and encodes the secret image block by block without pixel expansion. It is suitable for any access structure and also can be applied to encrypt gray-scale and chromatic images.“A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application”, by C. M. Kung, S. T. Chao, Y. C. Tu, Y. H. Yan, and C. H. Kung, proposes a frequency domain scheme developed expressly for oblivious watermarking and signature process are presented. It uses the self-information of coefficients of the middle frequency in the host image, and explicitly takes in the cross-correlation between coefficients of the middle frequency and the watermark. And signature process that input is the edge properties extracted from the image. The signature can be correctly verified when the image is incidentally damaged such as lossy compression.“A Powerful Partial Relevance Feedback for 3D Model Retrieval”, by Baokun Hu, Yusheng Liu, Shuming Gao, Jing Hu, Rui Sun, proposes the PRF in 3D model retrieval proposed in previous work. In the proposed PRF method, each model is decomposed into several local parts, and the global similarity of two models is regarded as the total similarity of all the local parts.“DSA Image Fusion Based on Dynamic Fuzzy Logic and Curvelet Entropy”, by Guangming Zhang, Zhiming Cui, Fanzhang Li, Jian Wu, analyzes the characters of DSA medical image, and proposes a novel approach for DSA medical image fusion, which is using curvelet information entropy and dynamic fuzzy logic. “Off-Line Persian Signature Identification and Verification Based On Image Registeration and Fusion”, by Samaneh Ghandali, Mohsen Ebrahimi Moghaddam, a method for off-line Persian signature identification and verification is proposed that is based on Image Registration, DWT (Discrete Wavelet Transform) and Image Fusion.“Lossless data hiding scheme using adjacent pixel difference based on scan path”, by Xianting Zeng, Lingdi Ping, Zhuo Li, proposes a new lossless data hiding scheme using adjacent pixel difference based on scan path. Nine basic scan paths are defined, and this means all-directional adjacent pixel differences can be obtained. “A Novel Self-adaptation Differential Energy Video Watermarking Scheme in Copyright Protection” by Tanfeng Sun, Xinghao Jiang, Shusen Shi, Zhigao Lin, Guanglei Fu, proposes a novel self-adaptation differential energy watermarking based on the Watson visual model, which inserts robust watermark into video streaming according to the differential energy theory.“A Secure and Efficient Buyer-Seller Watermarking Protocol”, by Yuping Hu, Jun Zhang,a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA) can offer a number of watermarks for a buyer simultaneously, avoiding itself being involved in each digital transaction operated between the buyer and the seller.We are particularly grateful to Guangnan Ni, Chin-Chen Chang, Jen-Yao Chung, Ben M. Chen, and Dongfen Yuan for accepting our invitation to deliver invited talks at this year’s conference. We wish to thank the Nanchang HangKong University, China for providing the venue to host the conference. In particular, we would like to acknowledge School of Computing, Nanchang HangKong University, China, who has worked throughout the year in preparation for this conference. We would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and for their valuable contributions. We wish to express our deepest gratitude to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for their thorough reviews under a tight time schedule. Last, but not least, our thanks go to the Editorial Board of the Journal of Multimedia for the exceptional effort they did throughout this process.In closing, we sincerely hope that you will enjoy reading this special issue.

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions