Academic Journals Database
Disseminating quality controlled scientific knowledge

Guest Editorial

Author(s): Shiguo Lian | Zhu Li | Stefanos Gritzalis | Xi Chen

Journal: Journal of Multimedia
ISSN 1796-2048

Volume: 6;
Issue: 4;
Start page: 317;
Date: 2011;
Original page

Keywords: Special Issue | Multimedia Information Networking and Security

1 IntroductionWith the development of multimedia technology and network technology, multimedia services become more and more popular. In nowadays, multimedia information refers to not only text, image, video or audio but also graphics, flash, web, 3D data, etc. Multimedia information is networked in various modes, e.g., fixed network, wireless network, mobile network, etc. Multimedia information may be generated, processed, transmitted, retrievaled, consumed or shared in various environments. Additionally, security becomes an important issue for information networking. During the past decades, many works have been done in multimedia information networking and security.This special issue aims to expose the readership to the latest research results on Multimedia Information Networking and Security, demonstrate pioneer work, investigate novel solutions and discuss the future trends in this field. It is composed of 8 papers, most of which are selected from best papers recommended by international conference - MINES2010, covering the topics of multimedia computing, intelligence, communication, copyright protection, and security. Additionally, all these submissions have been reviewed by at least two reviewers for each paper.2 The papers in this special issueThe first paper, "Code Syntax-Comparison Algorithm based on Type-Redefinition-Preprocessing and Rehash Classification" by B. Cui et al., proposes code comparison technologies for large-scale software plagiarism detection. The first technology is based on type redefinition plagiarism detection, which could detect the level of simple type redefinition, repeating pattern redefinition, and the redefinition of type with pointer. Another one is based on rehash classification, which enhances the node storage structure of the syntax tree, and greatly improves the efficiency. The technologies can be used for software security protection and plagiarism detection.In the second paper, "Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis" by Y. Zeng et al., a software watermarking scheme robust against various attacks including collusion attacks is proposed based on obfuscated interpretation. This scheme spreads the watermark over the entire program by modifying instruction frequencies, in which, the obfuscated interpretation technique is adopted to hide the functionality of a given program and provide an alternative simple way to manipulate the instruction frequencies. Some experimental results are given to show the proposed watermark scheme’s robustness against various attacks.The third paper, "A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction" by C. Guo et al., proposes a new secret image sharing scheme by employing the exploiting modification direction method. This method can recover both the secret image and the cover image without distortion, and effectively avoids underflow and overflow. Comparative experimental results show that this method obtains better visual quality of shadow images than previous methods. The scheme can be used for secret image communication.In the fourth paper, "Reversible Image Data Hiding Using Quad-tree Segmentation and Histogram Shifting" by Y.-C. Lin and T.-S. Li, Ni’s histogram shifting based reversible data hiding scheme is improved by the spatial-domain quad-tree segmentation. This method divides an input image into many different sized blocks, and utilizes the zero or minimum points of the histograms of the blocks to expand hiding capacity. Compared with existing works, the proposed method can embed more data, retain the high quality feature of histogram shifting, and be easily used for a wide range of natural images.The fifth paper, "Oblivious Image Watermarking in Discrete Multiwavelet Domain using QIMM" by N. Leelavathy et al., proposes an oblivious image watermarking technique for copyright protection and authentication. This technique is based on Discrete Multiwavelet Transform (DMWT) and Quantization Index Modulus Modulation (QIMM). The multiwavelet coefficients of an image are quantized using QIMM and the coefficients are modified according to the binary watermark logo. Comparative experimental results show that, the proposed watermarking scheme is robust to some rotational attacks, and gets better performance in terms of Peak Signal to Noise Ratio (PSNR) and Bit Error Rate (BER).In the sixth paper, "On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking" by X. Chen and S. Lian, the fingerprinting algorithm based on additive embedding is investigated, which focuses on the robustness against collusion attacks that aim to remove the embedded fingerprint code by combining several marked media copies by e.g., averaging. The theoretical results are given, together with some simulation results. It shows that, the considered fingerprinting algorithm is robust against some of the collusion attacks, while becomes fragile to some other collusion attacks with the rise of the number of colluders. The work may provide some valuable information to design or analyze fingerprinting algorithms.The seventh paper, “Usage Control Model for Digital Rights Management in Digital Home Networks” by Z. Zhang et al., proposes a role-based cross-domain usage control model (RCDUCM) for digital home network (DHN). This model employs the means both for role-based access control and for security domain constraint management. And, it is also visually modeled by Unified Modeling Language to shorten the gap between the theoretical model and digital rights management applications. An application case denotes that the proposed model can implement consumer-contents-device license binding and transferring.In the eighth paper, “Caricature Generation with Different Styles” by W. Chen et al., a caricature generation technique with different styles is proposed, which consists of shape exaggeration, relationship exaggeration and style transfer algorithm of caricature. Among them, an interactive tool for local texture transfer is presented, in which, a brush is used to draw strokes on the source and target images to indicate corresponding regions, and multiple local texture transfer method is presented to transfer the texture from the source region to the destination region through patch-based texture synthesis. Some experiments and done and the results show the proposed caricature generation algorithm’s effectiveness.AcknowledgmentsThe guest editors wish to thank the Editor-in-Chief of Journal of Multimedia, Dr. Jiebo Luo for providing the opportunity to edit this special issue on Recent Advances in Multimedia Information Networking and Security, and the Managing Editor, Dr. George Sun for providing latest publishing information and making this issue published. We would also like to thank the authors for submitting their works as well as the referees who have critically evaluated the papers within the short stipulated time. Finally, we hope the reader will share our joy and find this special issue very useful.
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona