<div dir="ltr"><We apologize for multiple posting. Please kindly disseminate this Call to your colleagues and contacts><br clear="all"><div><br></div><div><p class="MsoNormal" style="margin:0in;text-align:justify;vertical-align:baseline;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:11pt">Handbook of DeepFakes and Face Manipulations </span></b><span style="font-size:11pt">- Call for Chapters<b></b></span></p><p style="margin-bottom:0in;text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">===========================================================================</span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><strong><span style="font-size:11pt;border:1pt none windowtext;padding:0in">Editors: </span></strong><strong><span style="font-size:11pt;border:1pt none windowtext;padding:0in;font-weight:normal">Zahid Akhtar<sup>1</sup>, Roy Shilkrot<sup>2</sup>, and Abdenour Hadid<sup>3</sup></span></strong></p><p style="margin-bottom:0in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><strong><sup><span style="font-size:11pt;line-height:22px;border:1pt none windowtext;padding:0in;font-weight:normal">1 </span></sup></strong><strong><span style="font-size:11pt;line-height:22px;border:1pt none windowtext;padding:0in;font-weight:normal">State University of New York Polytechnic Institute, USA</span></strong></p><p style="margin:0in;text-align:justify;line-height:24px;vertical-align:baseline;font-size:12pt;font-family:"Times New Roman",serif"><strong><sup><span style="font-size:11pt;line-height:22px;border:1pt none windowtext;padding:0in;font-weight:normal">2 </span></sup></strong><strong><span style="font-size:11pt;line-height:22px;border:1pt none windowtext;padding:0in;font-weight:normal">Stony Brook University, USA</span></strong></p><p style="margin:0in;text-align:justify;line-height:24px;vertical-align:baseline;font-size:12pt;font-family:"Times New Roman",serif"><strong><sup><span style="font-size:11pt;line-height:22px;border:1pt none windowtext;padding:0in;font-weight:normal">3 </span></sup></strong><strong><span style="font-size:11pt;line-height:22px;border:1pt none windowtext;padding:0in;font-weight:normal">Polytechnic University of Hauts-de-France, France</span></strong></p><p style="margin:0in;text-align:justify;line-height:24px;vertical-align:baseline;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">===========================================================================<span style="border:1pt none windowtext;padding:0in"></span></span></p><p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt"> </span></p><p class="MsoNormal" style="margin:0in;text-align:justify;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">Machine learning-based techniques are being utilized to generate hyper-realistic manipulated facial multimedia contents, known as DeepFakes. While such technologies have positive potentials for entertainment applications, malevolent use can harm citizens and the society at large by constructing indecent content, spreading fake news to subvert elections or undermine politics, bullying people, and ameliorating social engineering to perpetrate financial frauds. In fact, it has been shown that manipulated facial multimedia contents not only can deceive humans but also automated face recognition-based biometric systems. The advent of advanced hardware, powerful smart devices, user-friendly apps (e.g., FaceApp, ZAO), and open-source ML codes (e.g., Generative Adversarial Networks) <span style="color:black">have enabled even non-experts to </span>effortlessly<span style="color:black"> create </span>manipulated facial multimedia contents. In the principle, face manipulation involves swapping two faces, modifying facial attributes (e.g., age and gender), morphing two different faces into one face, adding imperceptible perturbations (i.e., adversarial examples), synthetically generating faces, or animating/reenacting facial expressions in the face images/videos.</span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">In recent years, a number of articles have been published on the topic of </span><span style="font-size:11pt;color:black">DeepFakes and face manipulation generation, detection, and face recognition under manipulations. </span><span style="font-size:11pt">This book will provide the first comprehensive account of the state-of-the-art in DeepFakes and face manipulations. The book will include an introductory chapter by the editors that will summarize the state-of-the-art in DeepFakes and face manipulations, followed by individual chapters describing the various works that are being used for such purposes, the methods that have been devised to generate DeepFakes, facial sample editing using audio and video modalities, analysis of face recognition systems’ robustness, and usability of methods.</span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">This handbook on “DeepFakes and Face Manipulations” is expected to be published in the Springer Advances in Computer Vision and Pattern Recognition series in 2021. The editorial team is soliciting chapter contributions from the machine learning (ML), computer vision, biometrics, multimedia forensics, pattern recognition, and artificial intelligence (AI) research communities.</span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt"> Topics of interest include, but are not limited to:</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px;color:black">Generation of DeepFakes, and face morphing, manipulation and adversarial attacks</span><span style="font-size:11pt;line-height:22px"></span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px;color:black">Generation of synthetic faces using ML/AI techniques, e.g., GANs</span><span style="font-size:11pt;line-height:22px"></span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px;color:black">Detection of DeepFakes, and face morphing, manipulation and adversarial attacks</span><span style="font-size:11pt;line-height:22px">, including generalizable systems</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Generation and detection of audio DeepFakes</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Novel datasets and experimental protocols to facilitate research in DeepFakes and face manipulations</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Formulation and extraction of DeepFakes device, platform, software/app fingerprints</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Face recognition systems (and humans) against </span><span style="font-size:11pt;line-height:22px;color:black">DeepFakes, and face morphing, manipulation and adversarial attacks, including their vulnerabilities to digital face manipulations</span><span style="font-size:11pt;line-height:22px"></span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">DeepFakes in the courtroom and on copyright law</span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">===========================================================================<span style="border:1pt none windowtext;padding:0in"></span></span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><strong><span style="font-size:11pt;border:1pt none windowtext;padding:0in">Originality</span></strong><span style="font-size:11pt"></span></p><p style="margin:0in;text-align:justify;line-height:24px;vertical-align:baseline;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">===========================================================================<span style="border:1pt none windowtext;padding:0in"></span></span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">Chapter contributions should contain 25-30% novel content compared to earlier published work by the authors.</span></p><p style="margin:0in;text-align:justify;line-height:24px;vertical-align:baseline;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">===========================================================================<span style="border:1pt none windowtext;padding:0in"></span></span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><strong><span style="font-size:11pt;border:1pt none windowtext;padding:0in">Timeline</span></strong><span style="font-size:11pt"></span></p><p style="margin:0in;text-align:justify;line-height:24px;vertical-align:baseline;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">===========================================================================<span style="border:1pt none windowtext;padding:0in"></span></span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Expression of interest: 04-15-2021 (tentative: chapter title, and abstract)</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Selection of chapters: 05-30-2021</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Deadline for full chapter submission: 07-30-2021</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Review of chapters: 08-30-2021</span></p><p style="margin-left:0.5in;text-align:justify;line-height:24px;vertical-align:baseline;margin-right:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt;line-height:22px">•<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span style="font-size:11pt;line-height:22px">Camera-ready version: 09-31-2021</span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">Prospective authors should express their interest by May 15th, 2021 with a concise chapter proposal (title, authors, and abstract) to the editorial team:</span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">Zahid Akhtar (</span><a href="mailto:akhtarz@sunypoly.edu" target="_blank" style="color:blue"><span style="font-size:11pt;border:1pt none windowtext;padding:0in">akhtarz@sunypoly.edu</span></a><span style="font-size:11pt;border:1pt none windowtext;padding:0in">)</span><span style="font-size:11pt"></span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:11pt">Roy Shilkrot (</span><a href="mailto:roy.shilkrot@stonybrook.edu" target="_blank" style="color:blue"><span style="font-size:11pt">roy.shilkrot@stonybrook.edu</span></a><span style="font-size:11pt">)</span></p><p style="text-align:justify;vertical-align:baseline;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><strong><span style="font-size:11pt;border:1pt none windowtext;padding:0in;font-weight:normal">Abdenour Hadid </span></strong><span style="font-size:11pt">(</span><a href="mailto:abdenour.hadid@ieee.org" target="_blank" style="color:blue"><span style="font-size:11pt">abdenour.hadid@ieee.org</span></a><span style="font-size:11pt">)</span></p><p class="MsoNormal" style="margin:0in;text-align:justify;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-family:Arial,Helvetica,sans-serif;font-size:small">Thank you.</span></p></div><div><br></div><div>Kindest Regards,<br><div dir="ltr"><div dir="ltr"><div dir="ltr" style="color:rgb(136,136,136)"><div dir="ltr" style="color:rgb(0,0,0)">-----------------------------------------------------------------------------------------------<br>Zahid Akhtar, PhD<br>-----------------------------------------------------------------------------------------------<br>Department of Network and Computer Security, <br>State University of New York Polytechnic Institute,<br>C135, Kunsela Hall, Utica, NY 13502, USA<br>Tel. +1 901 674 1371    <br></div><div dir="ltr" style="color:rgb(0,0,0)">E-mail: <a href="mailto:akhtarz@sunypoly.edu" target="_blank">akhtarz@sunypoly.edu</a>, <a href="mailto:zahid.eltc@gmail.com" target="_blank">zahid.eltc@gmail.com</a></div><div dir="ltr" style="color:rgb(0,0,0)">Webpage: <a href="https://sites.google.com/site/zahidakhtarhome/home" target="_blank">https://sites.google.com/site/zahidakhtarhome/home</a><br>-----------------------------------------------------------------------------------------------</div></div></div></div></div></div>