【摘 要】 This special issue comprises of eight selected papers from the International Symposium on Electronic Commerce Security (ISECS 2009), Nanchang, China, 22-24 May 2009. The conference received 1050 paper submissions from 19 countries and regions, of whi... 更多 >> This special issue comprises of eight selected papers from the International Symposium on Electronic Commerce Security (ISECS 2009), Nanchang, China, 22-24 May 2009. The conference received 1050 paper submissions from 19 countries and regions, of which 487 were selected for presentation after a rigorous review process. From these 487 research papers, through two rounds of reviewing, the guest editors selected twelve as the best papers on the Computers track of the Conference. The candidates of the Special Issue are all the authors, whose papers have been accepted and presented at the ISECS 2009 and WISA 2009, with the contents not been published elsewhere before. The ISECS 2009 and WISA 2009 are sponsored by Nanchang HangKong University, China, Peoples' Friendship University of Russia, Nanchang University (China), Jiangxi Normal University (China), Wuhan University (China), National Chung Hsing University (Taiwan), Institute of Software, Chinese Academy of Sciences, Sichuan University (China), and Jiaxing University (China). Technical Co-Sponsors of the conference are IEEE, IEEE Computer Society, and IEEE Computer Society Technical Committee on E-Commerce. “A Novel Ideal Contrast Visual Secret Sharing Scheme with Reversing”, by Haibo Zhang, Xiaofei Wang and Youpeng Huang, proposes a scheme with reversing based on a PBVSS scheme. It achieves really ideal contrast within only [m/h] runs and encodes the secret image block by block without pixel expansion. It is suitable for any access structure and also can be applied to encrypt gray-scale and chromatic images. “A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application”, by C. M. Kung, S. T. Chao, Y. C. Tu, Y. H. Yan, and C. H. Kung, proposes a frequency domain scheme developed expressly for oblivious watermarking and signature process are presented. It uses the self-information of coefficients of the middle frequency in the host image, and explicitly takes in the cross-correlation between coefficients of the middle frequency and the watermark. And signature process that input is the edge properties extracted from the image. The signature can be correctly verified when the image is incidentally damaged such as lossy compression. “A Powerful Partial Relevance Feedback for 3D Model Retrieval”, by Baokun Hu, Yusheng Liu, Shuming Gao, Jing Hu, Rui Sun, proposes the PRF in 3D model retrieval proposed in previous work. In the proposed PRF method, each model is decomposed into several local parts, and the global similarity of two models is regarded as the total similarity of all the local parts. “DSA Image Fusion Based on Dynamic Fuzzy Logic and Curvelet Entropy”, by Guangming Zhang, Zhiming Cui, Fanzhang Li, Jian Wu, analyzes the characters of DSA medical image, and proposes a novel approach for DSA medical image fusion, which is using curvelet information entropy and dynamic fuzzy logic. “Off-Line Persian Signature Identification and Verification Based On Image Registeration and Fusion”, by Samaneh Ghandali, Mohsen Ebrahimi Moghaddam, a method for off-line Persian signature identification and verification is proposed that is based on Image Registration, DWT (Discrete Wavelet Transform) and Image Fusion. “Lossless data hiding scheme using adjacent pixel difference based on scan path”, by Xianting Zeng, Lingdi Ping, Zhuo Li, proposes a new lossless data hiding scheme using adjacent pixel difference based on scan path. Nine basic scan paths are defined, and this means all-directional adjacent pixel differences can be obtained. “A Novel Self-adaptation Differential Energy Video Watermarking Scheme in Copyright Protection” by Tanfeng Sun, Xinghao Jiang, Shusen Shi, Zhigao Lin, Guanglei Fu, proposes a novel self-adaptation differential energy watermarking based on the Watson visual model, which inserts robust watermark into video streaming according to the differential energy theory. “A Secure and Effic << 收起