JOURNAL OF MULTIMEDIA (JMM)
ISSN : 1796-2048
Volume : 4 Issue : 3 Date : June 2009
Special Issue: Recent Advances in Electronic Commerce and Security & Web Information Systems and Applications -
Track on Multimedia
Guest Editors: Fei Yu, Chin-Chen Chang, Deng-Yi Zhang, Jie-Xian Zeng, and Jun Zhang
Fei Yu, Chin-Chen Chang, Deng-Yi Zhang, Jie-Xian Zeng, and Jun Zhang
Full Text: PDF (384 KB)
This special issue comprises of eight selected papers from the International Symposium on Electronic Commerce Security
(ISECS 2009), Nanchang, China, 22-24 May 2009. The conference received 1050 paper submissions from 19 countries and
regions, of which 487 were selected for presentation after a rigorous review process. From these 487 research papers,
through two rounds of reviewing, the guest editors selected twelve as the best papers on the Computers track of the
Conference. The candidates of the Special Issue are all the authors, whose papers have been accepted and presented at
the ISECS 2009 and WISA 2009, with the contents not been published elsewhere before.
The ISECS 2009 and WISA 2009 are sponsored by Nanchang HangKong University, China, Peoples' Friendship University
of Russia, Nanchang University (China), Jiangxi Normal University (China), Wuhan University (China), National Chung Hsing
University (Taiwan), Institute of Software, Chinese Academy of Sciences, Sichuan University (China), and Jiaxing University
(China). Technical Co-Sponsors of the conference are IEEE, IEEE Computer Society, and IEEE Computer Society Technical
Committee on E-Commerce.
“A Novel Ideal Contrast Visual Secret Sharing Scheme with Reversing”, by Haibo Zhang, Xiaofei Wang and Youpeng Huang,
proposes a scheme with reversing based on a PBVSS scheme. It achieves really ideal contrast within only [m/h] runs and
encodes the secret image block by block without pixel expansion. It is suitable for any access structure and also can be
applied to encrypt gray-scale and chromatic images.
“A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application”, by C. M. Kung, S. T. Chao,
Y. C. Tu, Y. H. Yan, and C. H. Kung, proposes a frequency domain scheme developed expressly for oblivious watermarking
and signature process are presented. It uses the self-information of coefficients of the middle frequency in the host image,
and explicitly takes in the cross-correlation between coefficients of the middle frequency and the watermark. And signature
process that input is the edge properties extracted from the image. The signature can be correctly verified when the image is
incidentally damaged such as lossy compression.
“A Powerful Partial Relevance Feedback for 3D Model Retrieval”, by Baokun Hu, Yusheng Liu, Shuming Gao, Jing Hu, Rui
Sun, proposes the PRF in 3D model retrieval proposed in previous work. In the proposed PRF method, each model is
decomposed into several local parts, and the global similarity of two models is regarded as the total similarity of all the local
“DSA Image Fusion Based on Dynamic Fuzzy Logic and Curvelet Entropy”, by Guangming Zhang, Zhiming Cui, Fanzhang Li,
Jian Wu, analyzes the characters of DSA medical image, and proposes a novel approach for DSA medical image fusion,
which is using curvelet information entropy and dynamic fuzzy logic.
“Off-Line Persian Signature Identification and Verification Based On Image Registeration and Fusion”, by Samaneh
Ghandali, Mohsen Ebrahimi Moghaddam, a method for off-line Persian signature identification and verification is proposed
that is based on Image Registration, DWT (Discrete Wavelet Transform) and Image Fusion.
“Lossless data hiding scheme using adjacent pixel difference based on scan path”, by Xianting Zeng, Lingdi Ping, Zhuo Li,
proposes a new lossless data hiding scheme using adjacent pixel difference based on scan path. Nine basic scan paths
are defined, and this means all-directional adjacent pixel differences can be obtained.
“A Novel Self-adaptation Differential Energy Video Watermarking Scheme in Copyright Protection” by Tanfeng Sun, Xinghao
Jiang, Shusen Shi, Zhigao Lin, Guanglei Fu, proposes a novel self-adaptation differential energy watermarking based on the
Watson visual model, which inserts robust watermark into video streaming according to the differential energy theory.
“A Secure and Efficient Buyer-Seller Watermarking Protocol”, by Yuping Hu, Jun Zhang,a novel buyer-seller watermarking
protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA) can offer a number of
watermarks for a buyer simultaneously, avoiding itself being involved in each digital transaction operated between the buyer
and the seller.
We are particularly grateful to Guangnan Ni, Chin-Chen Chang, Jen-Yao Chung, Ben M. Chen, and Dongfen Yuan for
accepting our invitation to deliver invited talks at this year’s conference. We wish to thank the Nanchang HangKong
University, China for providing the venue to host the conference. In particular, we would like to acknowledge School of
Computing, Nanchang HangKong University, China, who has worked throughout the year in preparation for this conference.
We would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and for
their valuable contributions. We wish to express our deepest gratitude to the program committee members for their help in
selecting papers for this issue and especially the referees of the extended versions of the selected papers for their thorough
reviews under a tight time schedule. Last, but not least, our thanks go to the Editorial Board of the Journal of Multimedia for
the exceptional effort they did throughout this process.
In closing, we sincerely hope that you will enjoy reading this special issue.
Special Issue, Electronic Commerce, Security, Web Information Systems