Wednesday, April 28, 2010

About the conferences acceptance rate


In this corner of the ring, the famous IEEE International Conference on Image Processing in its 17th edition, parallel sessions, poster sessions, plenary talks, exhibition hall, so many sponsors that they can't list them, more than a thousand attendees expected, and this year so many submissions that its PC was desperately looking for reviewers from the watermarking community -- even though some of your favorite reviewers didn't get any content security paper to review: that's the sad point in striving (or not being able) to manage such a huge event.

In the opposite corner, the small and dying Information Hiding workshop, single threaded session, no fancy poster, no big head speaking, no exhibition hall, one unique sponsor (Technicolor) and so few submissions that the acceptance rate is likely to be larger than 1/2.

Let us look at previous fights (thanks Google Scholar for the statistics):

  • Barni (SPIE 109 cit. , ICIP 87 cit., SPIE 77 cit., SPIE 77 cit.)
  • Cachin (IH 425 cit.),
  • Cox (IH 347 cit., ICIP 117cit.),
  • Delp. (ACM 133 cit., SPIE 123 cit., SPIE 115 cit.)
  • Fridrich (SPIE 256 cit., IH 239 cit., IH. 214 cit., ICIP 160 cit., ICIP 100 cit.),
  • Kalker (SPIE 199 cit., ICIP 96 cit.)
  • Kutter (ICIP 233 cit.)
  • Wong (ICIP 310 cit.)

So, which one of two will you attend?

Well, that big foreseen acceptance rate for IH is not very attractive. Some researchers discard such conferences, or are not given credits for their papers published in conference with so big acceptance rate. This is why I say "dying" IH: in our sad times, ROI on advertising might be considered more important than sound research.

HOWEVER, your favorite watermasked cucumbers have been reviewing for both events... and frankly, from what they've read, the IH papers were far, far better.

We do not say that there were all great, but significantly better than ICIP submissions on average (not to say: median). Therefore, judging a conference from its acceptance rate is just as silly as when judgments go on upon only one criterion (notice the alliteration).

Conclusion: if you are solely interested in data hiding and content security, you'd better go to IH. Period.

Miss Cucumber.

Friday, April 16, 2010

Truth hurts

If you want to convince people that digital Forensics can be useful, here is a collection of interesting links.

The most impressive ones are the tampering collection throughout history built by Hany Farid and the museum of Hoaxes.
A smaller and contemporary list can be found on this Spanish web site, and the top ten of doctored photos (a politically correct expression for fakes) presents event obvious fakes.

Tzatziki

Tuesday, April 13, 2010

SPIE get closer to the Village People

For 2010, the SPIE conference on Media Watermaking, Security and Forensics leaves San-Jose to meet San-Francisco (more exactly its International Airport).
On good trafic conditions, the Airport is 30mm far for downtown by car, and the same by the subway, which means possibly interesting after-sessions.


Deadline for extended abstract and summary: 28 June 2010.
More information Here.


Thursday, January 28, 2010

Stormy SPIE

From Mr Tsukemono,
Mr. Tsukemono was sad to see only 4 papers related to Steganography and Steganalysis on the whole conference. The general trend of the decreasing number of papers continues, as WIFS enjoyed only one such paper. But the good news is that the quality of papers was good. And quality is preferred over quantity. 
Mr. Tsukemono has enjoyed following two papers:
  - Application of Viterbi algorithm to asymptotically reach rate distortion bound due to T. Filler, J. Judas and J. Fridrich.  
 - YASS algorithm is finally broken by blind steganalysis, though 1200 features makes Mr. Tsukemono rather bitter.
 Remark: The session was dominated by Binghamton University, from which 3 out of 4 papers came. What are the other groups doing? Are they saving papers for IHW, ACM, WIFS, IWDW, ICIP, ICASP or what else? We should hope.  By considering number of papers and sessions, forget steganography and steganalysis, forensics is the hype now. Forensics was subject of  5 sessions. We could see great papers coming from Dartmouth, Dresden, Binghamton, Purdue, and others. It was not coincidence that 3 papers dealt with the same topic, i.e. how to efficiently search and match fingerprint in large database. Each paper approached the problem from completely different direction. 
Another important point: we could finally see an attempt to plant a new camera fingerprint to the image (and method to detect this forgery).  The watermarking is getting popular as well. The number of accepted papers was so large that the papers had to be presented in parallel sessions. Good for watermarking, bad for conference attendees.  Although tutorial talks this year lacked stunning pictures from deep sea or from deep inside of the human body, they made Mr. Tsukemono a goose flesh. He realized that his new shiny iPhone is spying on him... 

Wednesday, December 23, 2009

IH 2010 announcement

IH 2010 will be located in Calgary. Here is the website:
http://ih2010.cpsc.ucalgary.ca/

Note that the submission deadline is in 3 months.

Miss cucumber, a green dress for Xmas.

Wednesday, December 16, 2009

IEEE WIFS'09


Open drum roll. "Ladies and gentlemen, this is the first edition of IEEE Workshop on Information and Security (a.k.a. WIFS). This is the first day of the first edition. This is the first session of the first day of the first edition. This is the first..." Well, this first session will not go down in history, but, this conference was indeed very good:
- a conference theater looking like the "Who wants to be a millionaire" stage (thanks BT!),
- low acceptance ratio,
- high attendee per speaker ratio,
- a good mix of all that matters in information security (watermarking, forensics, traitor tracing, biometrics, steganography, fingerprinting, cryptography...)
- refreshing invited speakers: a judge with subliminal erotic pics (is that what is called the 'french touch'?), a megalo but introspective security expert, and a frightening virus hunter ("Stay away from computers!")
- nasty questions and hot sessions (especially the "We will rock you" traitor tracing speeches), may be too hot since it trigged the fire alarm (thanks BT!).
- the nice playlist in the control booth (thanks BT!).

Miss cucumber back from ye olde London


Thursday, November 26, 2009

Biodiversity


Modern times are hard times for bio-diversity, this also holds in the watermarking environment.
Here is the program of SPIE Media Forensics and Security XII.
New: invited talks, security of biometry, and (seemingly) awards.
Just like IEEE-WIFS?
- Same topics,
- Same community,
- Same bosses,
- Same period (december-january).

Miss cucumber