Thursday 6/15 | Friday 6/16 | Saturday 6/17 | |
7:30 |
Registration / Breakfast
|
Breakfast
|
|
7:35 | |||
7:40 | |||
7:45 | |||
7:50 | |||
7:55 | |||
8:00 | |||
8:05 | |||
8:10 | |||
8:15 | |||
8:20 | |||
8:25 | |||
8:30 | |||
8:35 | |||
8:40 | |||
8:45 | Speech Intelligibility | Authentication | |
8:50 |
P4 - The effects of peripheral stimuli and equipment used on Speech Intelligibility in Noise
|
P9 - Increasing the temporal resolution of ENF analysis via harmonic distortion
|
|
8:55 | |||
9:00 |
Conference Welcome
|
||
9:05 | |||
9:10 |
P5 - Speech Intelligibility in Cockpit Voice Recorders
|
P10 - A Low Cost, Cloud Based, Portable, Remote ENF System
|
|
9:15 | |||
9:20 |
W1 - Exhibitor Demonstrations: CEDAR, Audionamix, Salient Sciences
|
||
9:25 | |||
9:30 | |||
9:35 | Speaker Recognition |
P11 - Reverberation based Tampering Detection in Audio Recordings
|
|
9:40 |
P6 - Experiments with two forensic automatic speaker comparison systems …
|
||
9:45 | |||
9:50 | |||
9:55 | |||
10:00 |
25 min Break - coffee, snacks
|
||
10:05 | |||
10:10 | |||
10:15 | |||
10:20 | |||
10:25 |
W3 - Audio Forensics Using Acoustic Environment and Microphone Fingerprinting. Malik
|
W5 - Forensic Authentication of Digital Audio. Grigoras and Koenig
|
|
10:30 | |||
10:35 | |||
10:40 | |||
10:45 | |||
10:50 | |||
10:55 | |||
11:00 | |||
11:05 | Signal Analysis | ||
11:10 |
P1 - Gunshot acoustics: pistol vs. revolver.
|
||
11:15 | |||
11:20 | |||
11:25 | |||
11:30 |
P2 - Deriving Engine Power from a Cockpit Voice Recording in an Accident Investigation.
|
||
11:35 | |||
11:40 | |||
11:45 | |||
11:50 | |||
11:55 |
Lunch
|
||
12:00 | |||
12:05 | |||
12:10 | |||
12:15 | |||
12:20 | |||
12:25 | |||
12:30 | |||
12:35 | |||
12:40 | |||
12:45 | |||
12:50 | |||
12:55 | |||
1:00 |
Posters in Exhibition Hall
Determining dimension specific information for monaural sound recordings
|
Posters in Exhibition Hall
Handling Multi-speaker Audio in Forensic Speaker Recognition
|
Posters in Exhibition Hall
Anti-forensics subtraction of electrical network frequency trace and its countermeasure
|
1:05 | |||
1:10 | |||
1:15 | |||
1:20 | |||
1:25 | |||
1:30 |
W2 - Gunshot Analysis Workshop. Maher, Marr, Beck, and Begault
|
W4 - Practical Perspectives on Forensic Automatic Speaker Recignition. Moreno and Bonilla
|
P12 - Forensic Authenticity Analyses of the Metadata in Re-Encoded iPhone M4A Files
|
1:35 | |||
1:40 | |||
1:45 | |||
1:50 | |||
1:55 |
P13 - Triage Approach for the Forensic Analysis of Apple iOS Audio Files Recorded Using the “Voice Memos” App
|
||
2:00 | |||
2:05 | |||
2:10 | |||
2:15 | |||
2:20 |
P14 - Large Scale Test of Digital Audio File Structure and Format for Forensic Analysis
|
||
2:25 | |||
2:30 | |||
2:35 | |||
2:40 | |||
2:45 |
P15 - Deleted Audio File Decay on a Digital Voice Recorder
|
||
2:50 | |||
2:55 | |||
3:00 |
15 min Break - coffee, snacks
|
||
3:05 | |||
3:10 |
Conference Conclusion
|
||
3:15 |
P3 - Performance of Blind Microphone Recognition Algorithms in the Presence of Anti-Forensic Attacks.
|
P7 - Training ‘on the fly’ to improve the performance of Speaker Recognition in Noisy Environments
|
|
3:20 | |||
3:25 | |||
3:30 | |||
3:35 | |||
3:40 |
P8 - On the relevance of F0, Jitter, Shimmer and HNR acoustic parameters in forensic voice comparisons …
|
||
3:45 | |||
3:50 | |||
3:55 | |||
4:00 | |||
4:05 | |||
4:10 | |||
4:15 | |||
4:20 | |||
4:25 | |||
4:30 | |||
4:35 | |||
4:40 | |||
4:45 | |||
4:50 | |||
4:55 | |||
5:00 | |||
5:05 | |||
5:10 | |||
5:15 | |||
5:20 | |||
5:25 | |||
5:30 |
Cocktail Reception
|
||
5:35 | |||
5:40 | |||
5:45 | |||
5:50 | |||
5:55 | |||
6:00 | |||
6:05 | |||
6:10 | |||
6:15 | |||
6:20 | |||
6:25 | |||
6:30 | |||
6:35 | |||
6:40 | |||
6:45 |
Social Event (optional)
|
||
6:50 | |||
6:55 | |||
7:00 | |||
7:05 | |||
7:10 | |||
7:15 | |||
7:20 | |||
7:25 | |||
7:30 | |||
7:35 | |||
7:40 | |||
7:45 | |||
7:50 | |||
7:55 | |||
8:00 | |||
8:05 | |||
8:10 | |||
8:15 | |||
8:20 | |||
8:25 | |||
8:30 | |||
8:35 | |||
8:40 | |||
8:45 | |||
8:50 | |||
8:55 | |||
9:00 |
Platinum Sponsor: