%0 Journal Article %T Editorial %A Fei Yu %A Chin-Chen Chang %A Deng-Yi Zhang %A Jie-Xian Zeng %J Journal of Multimedia %D 2009 %I Academy Publisher %R 10.4304/jmm.4.3.101-103 %X This special issue comprises of eight selected papers from the International Symposium on Electronic Commerce Security (ISECS 2009), Nanchang, China, 22-24 May 2009. The conference received 1050 paper submissions from 19 countries and regions, of which 487 were selected for presentation after a rigorous review process. From these 487 research papers, through two rounds of reviewing, the guest editors selected twelve as the best papers on the Computers track of the Conference. The candidates of the Special Issue are all the authors, whose papers have been accepted and presented at the ISECS 2009 and WISA 2009, with the contents not been published elsewhere before. The ISECS 2009 and WISA 2009 are sponsored by Nanchang HangKong University, China, Peoples' Friendship University of Russia, Nanchang University (China), Jiangxi Normal University (China), Wuhan University (China), National Chung Hsing University (Taiwan), Institute of Software, Chinese Academy of Sciences, Sichuan University (China), and Jiaxing University (China). Technical Co-Sponsors of the conference are IEEE, IEEE Computer Society, and IEEE Computer Society Technical Committee on E-Commerce. ˇ°A Novel Ideal Contrast Visual Secret Sharing Scheme with Reversingˇ±, by Haibo Zhang, Xiaofei Wang and Youpeng Huang, proposes a scheme with reversing based on a PBVSS scheme. It achieves really ideal contrast within only [m/h] runs and encodes the secret image block by block without pixel expansion. It is suitable for any access structure and also can be applied to encrypt gray-scale and chromatic images. ˇ°A Robust Watermarking and Image Authentication Scheme used for Digital Contant Applicationˇ±, by C. M. Kung, S. T. Chao, Y. C. Tu, Y. H. Yan, and C. H. Kung, proposes a frequency domain scheme developed expressly for oblivious watermarking and signature process are presented. It uses the self-information of coefficients of the middle frequency in the host image, and explicitly takes in the cross-correlation between coefficients of the middle frequency and the watermark. And signature process that input is the edge properties extracted from the image. The signature can be correctly verified when the image is incidentally damaged such as lossy compression.