IEEE-JSTSP special Issue: Spoofing and Countermeasures for Automatic Speaker Verification (Md Sahidullah )


Subject: IEEE-JSTSP special Issue: Spoofing and Countermeasures for Automatic Speaker Verification
From:    Md Sahidullah  <sahidullahmd@xxxxxxxx>
Date:    Mon, 16 May 2016 12:14:20 +0300
List-Archive:<http://lists.mcgill.ca/scripts/wa.exe?LIST=AUDITORY>

--001a1136f866bbb61f0532f20c0d Content-Type: text/plain; charset=UTF-8 We are happy to announce the following call-for-papers. Please accept our apologies if you receive multiple copies of this email. *Call for Papers* *IEEE Journal of Selected Topics in Signal Processing* *Special Issue on Spoofing and Countermeasures for Automatic Speaker Verification* Automatic speaker verification (ASV) offers a low-cost and flexible biometric solution to person authentication. While the reliability of ASV systems is now considered sufficient to support mass-market adoption, there are concerns that the technology is vulnerable to spoofing, also referred to as presentation attacks. Replayed, synthesized and converted speech spoofing attacks can all project convincing, high-quality speech signals that are representative of other, specific speakers and thus present a genuine threat to the reliability of ASV systems. Recent years have witnessed a movement in the community to develop spoofing countermeasures, or presentation attack detection (PAD) technology to help protect ASV systems from fraud. These efforts culminated in the first standard evaluation platform for the assessment of spoofing and countermeasures of automatic speaker verification --- the Automatic Speaker Verification Spoofing and Countermeasures Challenge (ASVspoof) --- which was held as a special session at Interspeech 2015. This special issue is expected to present original papers describing the very latest developments in spoofing and countermeasures for ASV. The focus of the special issue includes, but is not limited to the following topics related to spoofing and countermeasures for ASV: * vulnerability analysis of previously unconsidered spoofing methods; * advanced methods for standalone countermeasures; * advanced methods for joint ASV and countermeasure modelling; * information theoretic approaches for the assessment of spoofing and countermeasures; * spoofing and countermeasures in adverse acoustic and channel conditions; * generalized and speaker-dependent countermeasures; * speaker obfuscation, impersonation, de-identification, disguise, evasion and adapted countermeasures; * analysis and comparison of human performance in the face of spoofing; * new evaluation protocols, datasets, and performance metrics for the assessment of spoofing and countermeasures for ASV; * countermeasure methods using other modality or multimodality that are applicable to speakerverification Also invited are submissions of exceptional quality with a tutorial or overview nature. Creative papers outside the areas listed above but related to the overall scope of the special issue are also welcome. Prospective authors can contact the Guest Editors to ascertain interest on such topics. Prospective authors should visit http://www.signalprocessingsociety.org/publications/periodicals/jstsp/ for submission information. Manuscripts should be submitted at http://mc.manuscriptcentral.com/jstsp-ieee and will be peer reviewed according to standard IEEE processes. *Important Dates*: * Manuscript submission due: August 1, 2016 * First review completed: October 15, 2016 * Revised manuscript due: December 1, 2016 * Second review completed: February 1, 2017 * Final manuscript due: March 1, 2017 * Publication date: June, 2017 *Guest Editors:* Junichi Yamagishi, National Institute of Informatics, Japan, email: jyamagis@xxxxxxxx Nicholas Evans, EURECOM, France, email: evans@xxxxxxxx Tomi Kinnunen, University of Eastern Finland, Finland, email: tomi.kinnunen@xxxxxxxx Phillip L. De Leon, New Mexico State University & VoiceCipher, USA, email: pdeleon@xxxxxxxx Isabel Trancoso, INESC-ID / IST, University of Lisbon, Portugal, email: Isabel.Trancoso@xxxxxxxx -- Dr. Md Sahidullah Post-doctoral researcher School of Computing University of Eastern Finland Joensuu, P.O. Box 111 Finland- 80101 tel. +358-466250731 website: http://cs.joensuu.fi/~sahid/ --001a1136f866bbb61f0532f20c0d Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable <div dir=3D"ltr"><div style=3D"color:rgb(33,33,33);font-family:&#39;Segoe U= I&#39;,&#39;Segoe WP&#39;,&#39;Segoe UI WPC&#39;,Tahoma,Arial,sans-serif;fo= nt-size:15px"><div style=3D"text-align:center"><span style=3D"text-align:st= art">We are happy to announce the following call-for-papers. Please accept = our apologies if you receive multiple copies of this email.</span><br></div= ><div style=3D"text-align:center"><span style=3D"text-align:start"><br></sp= an></div><div style=3D"text-align:center"><b>Call for Papers</b></div><div = style=3D"text-align:center"><br></div><font color=3D"#ff2600"><div style=3D= "text-align:center"><b>IEEE Journal of Selected Topics in Signal Processing= </b></div></font><div style=3D"text-align:center"><br></div><b><div style= =3D"text-align:center"><b><i><font color=3D"#0433ff">Special Issue on Spoof= ing and Countermeasures for Automatic Speaker Verification</font></i></b></= div></b><br>Automatic speaker verification (ASV) offers a low-cost and flex= ible biometric solution to person authentication. While the reliability of = ASV systems is=C2=A0now considered sufficient to support mass-market adopti= on, there are concerns that the technology is vulnerable to spoofing, also = referred to as=C2=A0presentation attacks. Replayed, synthesized and convert= ed speech spoofing attacks can all project convincing, high-quality speech = signals that are=C2=A0representative of other, specific speakers and thus p= resent a genuine threat to the reliability of ASV systems.<br><br>Recent ye= ars have witnessed a movement in the community to develop spoofing counterm= easures, or presentation attack detection (PAD) technology=C2=A0to help pro= tect ASV systems from fraud. These efforts culminated in the first standard= evaluation platform for the assessment of spoofing and=C2=A0countermeasure= s of automatic speaker verification --- the Automatic Speaker Verification = Spoofing and Countermeasures Challenge (ASVspoof) --- which was held as a s= pecial session at Interspeech 2015.<br><br>This special issue is expected t= o present original papers describing the very latest developments in spoofi= ng and countermeasures for ASV. The=C2=A0focus of the special issue include= s, but is not limited to the following topics related to spoofing and count= ermeasures for ASV:<br><br><span style=3D"white-space:pre-wrap">*</span>=C2= =A0vulnerability analysis of previously unconsidered spoofing methods;<br><= span style=3D"white-space:pre-wrap">*</span>=C2=A0advanced methods for stan= dalone countermeasures;<br><span style=3D"white-space:pre-wrap">*</span>=C2= =A0advanced methods for joint ASV and countermeasure modelling;<br><span st= yle=3D"white-space:pre-wrap">*</span>=C2=A0information theoretic approaches= for the assessment of spoofing and countermeasures;<br><span style=3D"whit= e-space:pre-wrap">*</span>=C2=A0spoofing and countermeasures in adverse aco= ustic and channel conditions;<br><span style=3D"white-space:pre-wrap">*</sp= an>=C2=A0generalized and speaker-dependent countermeasures;<br><span style= =3D"white-space:pre-wrap">*</span>=C2=A0speaker obfuscation, impersonation,= de-identification, disguise, evasion and adapted countermeasures;<br><span= style=3D"white-space:pre-wrap">*</span>=C2=A0analysis and comparison of hu= man performance in the face of spoofing;<br><span style=3D"white-space:pre-= wrap">*</span>=C2=A0new evaluation protocols, datasets, and performance met= rics for the assessment of spoofing and countermeasures for ASV;<br><span s= tyle=3D"white-space:pre-wrap">*</span>=C2=A0countermeasure methods using ot= her modality or multimodality that are applicable to speakerverification<br= ><br>Also invited are submissions of exceptional quality with a tutorial or= overview nature. Creative papers outside the areas listed above but relate= d to the=C2=A0overall scope of the special issue are also welcome. Prospect= ive authors can contact the Guest Editors to ascertain interest on such top= ics.<br><br>Prospective authors should visit=C2=A0<a href=3D"http://www.sig= nalprocessingsociety.org/publications/periodicals/jstsp/" target=3D"_blank"= >http://www.signalprocessingsociety.org/publications/periodicals/jstsp/</a>= =C2=A0for submission information. Manuscripts should=C2=A0be submitted at= =C2=A0<a href=3D"http://mc.manuscriptcentral.com/jstsp-ieee" target=3D"_bla= nk">http://mc.manuscriptcentral.com/jstsp-ieee</a>=C2=A0and will be peer re= viewed according to standard IEEE processes.<br><br><b>Important Dates</b>:= <br><span style=3D"white-space:pre-wrap">*</span>=C2=A0Manuscript submissio= n due: August 1, 2016<br><span style=3D"white-space:pre-wrap">*</span>=C2= =A0First review completed: October 15, 2016<br><span style=3D"white-space:p= re-wrap">*</span>=C2=A0Revised manuscript due: December 1, 2016<br><span st= yle=3D"white-space:pre-wrap">*</span>=C2=A0Second review completed: Februar= y 1, 2017<br><span style=3D"white-space:pre-wrap">*</span>=C2=A0Final manus= cript due: March 1, 2017<br><span style=3D"white-space:pre-wrap">*</span>= =C2=A0Publication date: June, 2017<br><br><b>Guest Editors:</b><br>Junichi = Yamagishi, National Institute of Informatics, Japan, email:=C2=A0<a href=3D= "mailto:jyamagis@xxxxxxxx" target=3D"_blank">jyamagis@xxxxxxxx</a><br>Nic= holas Evans, EURECOM, France, email:=C2=A0<a href=3D"mailto:evans@xxxxxxxx= r" target=3D"_blank">evans@xxxxxxxx</a><br>Tomi Kinnunen, University of E= astern Finland, Finland, email:=C2=A0<a href=3D"mailto:tomi.kinnunen@xxxxxxxx= " target=3D"_blank">tomi.kinnunen@xxxxxxxx</a><br>Phillip L. De Leon, New Mex= ico State University &amp; VoiceCipher, USA, email:=C2=A0<a href=3D"mailto:= pdeleon@xxxxxxxx" target=3D"_blank">pdeleon@xxxxxxxx</a>=C2=A0</div><span s= tyle=3D"color:rgb(33,33,33);font-family:&#39;Segoe UI&#39;,&#39;Segoe WP&#3= 9;,&#39;Segoe UI WPC&#39;,Tahoma,Arial,sans-serif;font-size:15px">Isabel Tr= ancoso, INESC-ID / IST, University of Lisbon, Portugal, email:=C2=A0<a href= =3D"mailto:Isabel.Trancoso@xxxxxxxx" target=3D"_blank">Isabel.Trancoso@xxxxxxxx= nesc-id.pt</a></span><div><font color=3D"#212121" face=3D"Segoe UI, Segoe W= P, Segoe UI WPC, Tahoma, Arial, sans-serif"><span style=3D"font-size:15px">= <br></span></font></div><div><font color=3D"#212121" face=3D"Segoe UI, Sego= e WP, Segoe UI WPC, Tahoma, Arial, sans-serif"><span style=3D"font-size:15p= x"><br></span></font></div><div><font color=3D"#212121" face=3D"Segoe UI, S= egoe WP, Segoe UI WPC, Tahoma, Arial, sans-serif"><span style=3D"font-size:= 15px"><br></span></font></div><div><font color=3D"#212121" face=3D"Segoe UI= , Segoe WP, Segoe UI WPC, Tahoma, Arial, sans-serif"><span style=3D"font-si= ze:15px"><br></span></font></div><div><font color=3D"#212121" face=3D"Segoe= UI, Segoe WP, Segoe UI WPC, Tahoma, Arial, sans-serif"><span style=3D"font= -size:15px"><br></span></font></div><div><font color=3D"#212121" face=3D"Se= goe UI, Segoe WP, Segoe UI WPC, Tahoma, Arial, sans-serif"><span style=3D"f= ont-size:15px"><br clear=3D"all"></span></font><div><br></div>-- <br><div c= lass=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div d= ir=3D"ltr"><div><div dir=3D"ltr"><font face=3D"comic sans ms, sans-serif" s= ize=3D"2" color=3D"#000000">Dr. Md Sahidullah<br>Post-doctoral researcher<b= r>School of Computing</font><div><font face=3D"comic sans ms, sans-serif" s= ize=3D"2" color=3D"#000000">University of Eastern Finland<br>Joensuu,=C2=A0= =C2=A0P.O. Box 111=C2=A0Finland-=C2=A080101</font></div><div><font face=3D"= comic sans ms, sans-serif" size=3D"2" color=3D"#000000">tel.=C2=A0+358-4662= 50731<br>website:=C2=A0<a href=3D"http://cs.joensuu.fi/~sahid/" target=3D"_= blank">http://cs.joensuu.fi/~sahid/</a></font></div></div></div></div></div= ></div></div></div></div> </div></div> --001a1136f866bbb61f0532f20c0d--


This message came from the mail archive
/var/www/html/postings/2016/
maintained by:
DAn Ellis <dpwe@ee.columbia.edu>
Electrical Engineering Dept., Columbia University