Thursday, January 28, 2010

Stormy SPIE

From Mr Tsukemono,
Mr. Tsukemono was sad to see only 4 papers related to Steganography and Steganalysis on the whole conference. The general trend of the decreasing number of papers continues, as WIFS enjoyed only one such paper. But the good news is that the quality of papers was good. And quality is preferred over quantity. 
Mr. Tsukemono has enjoyed following two papers:
  - Application of Viterbi algorithm to asymptotically reach rate distortion bound due to T. Filler, J. Judas and J. Fridrich.  
 - YASS algorithm is finally broken by blind steganalysis, though 1200 features makes Mr. Tsukemono rather bitter.
 Remark: The session was dominated by Binghamton University, from which 3 out of 4 papers came. What are the other groups doing? Are they saving papers for IHW, ACM, WIFS, IWDW, ICIP, ICASP or what else? We should hope.  By considering number of papers and sessions, forget steganography and steganalysis, forensics is the hype now. Forensics was subject of  5 sessions. We could see great papers coming from Dartmouth, Dresden, Binghamton, Purdue, and others. It was not coincidence that 3 papers dealt with the same topic, i.e. how to efficiently search and match fingerprint in large database. Each paper approached the problem from completely different direction. 
Another important point: we could finally see an attempt to plant a new camera fingerprint to the image (and method to detect this forgery).  The watermarking is getting popular as well. The number of accepted papers was so large that the papers had to be presented in parallel sessions. Good for watermarking, bad for conference attendees.  Although tutorial talks this year lacked stunning pictures from deep sea or from deep inside of the human body, they made Mr. Tsukemono a goose flesh. He realized that his new shiny iPhone is spying on him... 

Wednesday, December 23, 2009

IH 2010 announcement

IH 2010 will be located in Calgary. Here is the website:
http://ih2010.cpsc.ucalgary.ca/

Note that the submission deadline is in 3 months.

Miss cucumber, a green dress for Xmas.

Wednesday, December 16, 2009

IEEE WIFS'09


Open drum roll. "Ladies and gentlemen, this is the first edition of IEEE Workshop on Information and Security (a.k.a. WIFS). This is the first day of the first edition. This is the first session of the first day of the first edition. This is the first..." Well, this first session will not go down in history, but, this conference was indeed very good:
- a conference theater looking like the "Who wants to be a millionaire" stage (thanks BT!),
- low acceptance ratio,
- high attendee per speaker ratio,
- a good mix of all that matters in information security (watermarking, forensics, traitor tracing, biometrics, steganography, fingerprinting, cryptography...)
- refreshing invited speakers: a judge with subliminal erotic pics (is that what is called the 'french touch'?), a megalo but introspective security expert, and a frightening virus hunter ("Stay away from computers!")
- nasty questions and hot sessions (especially the "We will rock you" traitor tracing speeches), may be too hot since it trigged the fire alarm (thanks BT!).
- the nice playlist in the control booth (thanks BT!).

Miss cucumber back from ye olde London


Thursday, November 26, 2009

Biodiversity


Modern times are hard times for bio-diversity, this also holds in the watermarking environment.
Here is the program of SPIE Media Forensics and Security XII.
New: invited talks, security of biometry, and (seemingly) awards.
Just like IEEE-WIFS?
- Same topics,
- Same community,
- Same bosses,
- Same period (december-january).

Miss cucumber





Wednesday, October 7, 2009

Cucumber spirit hits SPIE Optical Engineering





By Cucumber without spiced ham


Ever feared checking your Inbox for a request to review another spam paper? Spam papers in watermarking commonly share the following features:
  • The author is not concerned with frivolousnesses like the difference between zero-bit and multi-bit watermarking;
  • While the technique is not designed to survive geometrical distortions, a 3° rotation generally "demonstrates the high robustness of the proposed approach to geometrical transforms" -- and, of course, pseudo-cropping is always meant for plain regular cropping;
  • For zero-bit watermarking (which is definitely the same as multi-bit), the threshold is always taken from the Barni et al. paper [1] ensuring a 1e-8 probability of false alarm. No threshold is ever allowed to include another constant than 3.97 which is engraved in the holy Eq. 15 of the said paper. Whether the computation actually applies straightforwardly to the submitted paper is of secondary interest;
  • Explicit distortion specification is generally omitted for the sake of simplicity (oh! and Lena looks good anyway when printed on a 2 inch square!);
  • Security is ensured by the use of a secret key;
  • Spell-checking is left to the reviewer;
  • The results always clearly and unconditionally demonstrate the superiority of the proposed method in any area of comparison.
It appears however that the times they are a-changin' [2]. A Cucumber of ours recently received the new instructions for reviewers from SPIE Optical Engineering, as part of an invitation to review another spam paper. Hell! These new instructions read:

"Although this paper need not be exceptional, it should add
significantly to the field for you to recommend acceptance or revision.
Lately, a substantial number of papers have been submitted that can be
called "not wrong" papers. These are papers that contain no errors, but
they also lack any new and useful information that would move your field
forward; they may provide no citable results, or document so little
progress that researchers in your field will ignore them. These papers
take up your time and ours; they clutter up the literature; and they do
not advance research in the field. If you find this paper fits this
description, you should recommend that the paper be rejected."

That's pretty good news it finally got written in plain English.

References

[1] M. Barni, F. Bartolini and A. Piva, Improved wavelet-based watermarking through pixel-wise masking, IEEE Trans. Image Proc., vol. 10, issue 5, pp. 783--791, May 2001.
[2] R.A. Zimmerman, The times they are a-changin', Columbia Trans. on Bob Dylan, Special Issue on The Times They Are A-Changin', January 1964.

Tuesday, September 15, 2009

ACM mmsec 09, the hidden (and fun) parts

By Tsatsiki
Miss cucumber is right, there were interesting papers in the ACM workshop on Multimedia and Security. And the participants had some fun as well. This is mainly thanks to one guy: Scoot Craver, the co-chair of the conference.

Scott is born data-hider, let me tell you why.
Firstly, when the participants arrived to register, they were offered a nice usb key like this one:


- these were the two first hidden messages. (look at it upside down)







Secondly, Scoot launched the workshop saying that there was a hidden (and cyphered) message on the building of the conference (the Friend Center in Princeton). This was true indeed since during the next coffee break the participants were able to see this:

- this was the second hidden message! Did Scoot add the bricks just for the conference? François Cayre, knowing ASCII code by heart, succeeded to decipher the message, while some others asked Google for the solutions.


Of course the talks of the workshop were also filled with hidden information (it was voluntary or not) and two of them were rather fun:
- the magic display cable (Atakli et al.) which is able to recognize, descramble and display encrypted images of a computer desktop on the fly,
- during the rump session, a teaser of the first contest on steganography was presented by T. Pevny. According to him it will be launch in 2010 and called BOSS (for Break Our Steganographic Scheme). I think that this contest is going to be rather popular.

Let's hope that WIFS 2009, the next conference on data-hiding, will be as fun as this one.

Monday, September 14, 2009

ACM mmsec 2009: the rise of the dragon?


ACM mmsec took place under the black and orange flags of the amazing campus of Princeton University, 7-8 september.
The general chair was Ed Felten, Prof. of Computer Science and Public Affairs (might be the only one to have this title), and the director of the brand new Center for Information Technology Policy.
He made a very good introduction speech calling for more discussions between computer scientists and law makers, and then, he almost disappeared from the conference (I could understand, after all, Monday was Labor day)! Never mind, Scott Craver organized a very good social event between nowhere and goodbye in a house near the lake and the lunch in Prospect House was also terrific.

Helas, there were only 40 to 50 attendees! Scott Craver defended the idea that, despite the decline of submissions, their overall quality was good. Therefore, good papers don't fear the financial crisis (if this is the real reason for the submission number decrease).
Like in IH'09, there were indeed quite few papers of lower interest so that the idea of S. Craver holds.

So, what is hot? MP3 quality assessment! The scenario is as follows: a low bitrate MP3 file is transcoded at a higher bitrate and sold as a pretendedly high quality tune. How to detect this? By revealing the signs of a double compression. Actually, H. Farid also presented a talk about double compression to detect video edition. Three speeches, three different approaches: from the "I don't know what happens, but my SVM will tell" heuristic to a more convincing statistical modeling.

The asian dragon? The era of old asian professors reading with difficulty their slides full of approximative english long sentences is over. We are witnessing, in multimedia security (it is probably the case for a long time in other fields), a new generation of young, convincing communicator and quite good researchers. Among the speakers but also in the audience. Some aggressive but very relevant questions were asked.

We also met the future leaders in steganalysis: Jan Kodovsky and Jan Judas replacing the two Tomas evil twins leaving Binghamton (Tomas has already left for Grenoble and soon Praha, while Tomas is finishing his ph.D). The Czech eagle vs. the asian dragon... An interesting battle is coming.

Talks I liked:

- "Two Key Estimation for the Borken Arrows watermarking Scheme", P. Bas and A. Westfeld. Another evil twin couple is born. How to break Broken Arrows (the watermarking technique used for BOWS-2) again and again. I guess, since P. Bas is one of the inventor, it is easier to analyze one's own scheme.

- "Additive Spread-spectrum watermarking detection in demosaicked images", P. Meerwald and A. Uhl. Hack your camera! The Austrian team modified the firmware of a camera so that watermark embedding is done in the device just after the CFA capture. Cool hack! This rises the challenge of watermark detection after demosaicking.

- "Exposing digital forgeries in video by detecting double quantization", W. Wang and H. Farid.
The best paper of all the "double compression" works in this conference. Nice but oversimple talk (as always), which plays the role of a teaser to read the paper for further information. The paper is indeed good: statistical model, identification of the parameters with an 'E-M' like algorithm, hypothesis test.

- "Calibration revisited" J. Kodovsky and J. Fridrich. My understanding about calibration is that natural images follow no statistical model or a so flat pdf p(X) that no hypothesis test will work with so few discrimination. Calibration is about estimating a set of parameters P specializing the model, switching from the flat marginal p(X) to the much more contrasted conditional p(X|P). Calibration is about statistical modeling. Whereas this paper uses calibration with SVM, which is, IMHO, the contrary of statistical modeling. SVM means "I don't know how to model things but, once trained, the SVM will find its way". Therefore, I was a little confused by this approach. But the results are there.

- "Square Root Law" A. Ker. During IH'09, I was not convinced by the talks about the square root law: It is was not enough formalized, the assumptions were not clearly delimited, so that if the law indeed holds, we could not tell the real reasons. This is exactly what Andrew Ker did in between the two conferences, and now, this became serious math with theorem (conditions and results) and proofs.

- "Detection of seam carving and localization of seam insertions an digital images" A. Sarkar, L. Natarj, and B. Manjunath. Seam carving is this image processing tool. It a priori seems a 'mission impossible' to detect seam carving, but a heavy tool (a 324 Markov features classifier) starts producing good results. Work in progress. A maybe too dense presentation.

Miss Cucumber