Speech Recognition

835 views
626 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
835
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Good evningeveryone, today i amgoin to present to youmyproject in speech recognition wichisEncrypted chat application with speech recogniton
  • Likeconnecting, listening,sending,writing andreading the messages, savingit in a wavform, …
  • In thispresetation i m going seing whatis speech recognition and cryptography, i m goinalso talk about sockets programing in c#wichweused in our application and finallywellsee how is the chat application
  • Now, whatis speech recognition
  • Meansyousaysomething to the computer and it do that command
  • There are twomodels of speech recognition
  • Cryptography in greekis KRYPTOSplaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertextkey - info used in cipher known only to sender/receiver
  • Speech Recognition

    1. 1. MSCI 2013NationalSchool ofAppliedSciencesEncrypted ChatApplication withspeech RecognitionPresented by:Supervised by:Omayma BELKADIMr. Abdelhak TALI
    2. 2. MSCIC:GOALIn this project we have created a secureChat application using C# Sockets, andmade it recognize a list of vocalcommands
    3. 3. MSCIFile Insert View FormatOutlines Speech Recognition Cryptography Socket Programming using C# Chat Applicationsearch
    4. 4. MSCIC:1:08 / 4:27SPEECHRECOGNITION
    5. 5. MSCIC: Speech RecognitionWhat is Speech Recognition?Speech recognition is the ability ofa machine or program to identifyand respond to words andsentences in spoken language byconverting them to a machine-readable format
    6. 6. MSCIC: Speech RecognitionCreated by taking audiorecordings of speech, and theirtext transcriptions, and usingsoftware to create statisticalrepresentations of the soundsthat make up each wordLanguage ModelAcoustic ModelIt is used in many naturallanguage processingapplications such as speechrecognition tries to capture theproperties of a language, and topredict the next word in aspeech sequenceAcoustic ModelLanguage ModelModel
    7. 7. MSCIC: Speech RecognitionThere are two types of speech recognitionC:Speech RecognitionSpeaker-dependentC:..> It is commonly used fordictation softwareC:..> It works by learning the uniquecharacteristics of a single person’svoice. New users must first “train”the software by speaking to it, so thecomputer can analyze how the persontalks. This often means users have toread a few pages of text to thecomputer before they can use thespeech recognition softwareC:Speech RecognitionSpeaker-independentC:..> It is more commonly found inphone applicationsC:..> It is designed to recognizeanyone’s voice, so no training isinvolved. Speech recognition enginesthat are speaker independent generallydeal with this fact by limiting thegrammars they use. By using a smallerlist of recognized words.
    8. 8. MSCIC: Speech RecognitionHow it works ??
    9. 9. MSCIC: Speech RecognitionAdvantagesUseful for people with disabilities like who cant use their handsCell-phone users can dial pre-programmed numbers by voicecommand which reduce interaction with on-the-phone agentsCan be used for typing large quantities of text in a relativelyshort period of time
    10. 10. MSCIC: Speech RecognitionDisadvantagesDifficult to build a perfect system. Conversations Involves morethan just words and some words sound the same (to, too, two)Filtering background noise is a task that can even be difficult forhumans to accomplish. Even the best speech recognitionsystems sometimes make errors. If there is noise or some othersound in the room, the number of errors will increase.Every human being has differences such as theirvoice, accent, and speaking style
    11. 11. MSCIC: Speech RecognitionFuture of Speech Recognition will become better and better. Tablets forcomputer speech recognition dictation and data entry will bedeveloped, as faster processors and more memory become available.Greater use will be made of intelligent systems which will attempt toguess what the speaker intended to say, rather than what was actuallysaid, as people often misspeak and make unintentional mistakes.Microphones and sound systems will be designed to adapt more quicklyto changing background noise levels, different environments, with betterrecognition of extraneous material to be discardedCancelOK
    12. 12. MSCIC:1:08 / 4:27CRYPTOGRAPHY
    13. 13. MSCIC: CryptographyThe word cryptography in Greek means “secret writing” The term todayrefers to the science and art of transforming messages to make themsecure and immune to attacks.The original message before being transformed, is called Plaintext. Afterthe message is transformed is called Cipher text. An encryption algorithmtransforms the plaintext to cipher text, and a decryption algorithmtransforms the cipher text to plaintext.
    14. 14. MSCIC: CryptographyMSCICryptography is concerned with four facets ofdata transfer:ConfidentialityAuthenticityIntegrityNon-repudiation
    15. 15. MSCIC: CryptographyProblemAlice and Bob wish to perform some form of communicationwhile Oscar is an eavesdropper who wishes to spy on or tamperwith the communications between Alice and BobCancelOK
    16. 16. MSCIC: CryptographyA message sent from Alice to Bob cannotbe read by anyone else.AuthenticityConfidentialityIntegrityNon-repudiationBob knows that only Alice could have sentthe message he has just receivedConfidentialityAuthenticityIntegrityNon-repudiation
    17. 17. MSCIC: CryptographyBob knows that the message from Alice hasnot been tamperedConfidentialityIntegrityAuthenticityNon-repudiationIt is impossible for Alice to turn aroundlater and say she did not send the messageConfidentialityNon-repudiationAuthenticityIntegrity
    18. 18. MSCIC: CryptographyThere are three Cryptographic Primitives Symmetric ciphers (“secret-key” cryptography) Hashes (message digests) Asymmetric ciphers (“public-key” cryptography)
    19. 19. MSCIC: CryptographySymmetric ciphers translate“plaintext” into “ciphertext.”The recipient of the ciphertextmust have the secret “key” inorder to translate theciphertext back to its originalplaintext form.Symmetric ciphers are usefulfor keeping secrets.one of popular and wellrespected symmetricalgorithms is the AdvancedEncryption Standard (AES)Symmetric Ciphers
    20. 20. MSCIC: CryptographyA “hash” is a fixed-lengthrepresentation of a message. Itis useful for detecting messagetampering.Hashes are also known as“message digests.”Hashes
    21. 21. MSCIC: CryptographyMSCIC: CryptographyAsymmetric ciphers encryptdata with a “public key.”Only the owner of thecorresponding “private key”can decrypt the ciphertext.Asymmetric ciphers are usefulfor message authentication.one of popular and well-respected asymmetricalgorithms is the Rivest-Shamir-Adleman (RSA)Asymmetric Ciphers
    22. 22. MSCIC:1:08 / 4:27SOCKET PROGRAMMINGUSING C#
    23. 23. MSCIC: Socket Programming Using C#How to C# Socket programmingSockets are getting more and more used nowadays. Itprovides a simple way to exchange data over the network. Itsused, as an example, to exchange messages between users.Thanks to its powerful features, sockets are becoming a mustto learn technology for developers.
    24. 24. MSCIC: Socket Programming Using C#C: Socket Programming Using C#C:..> As sockets are based on client/serverarchitecture, our application is composed of aserver and a client. The server will reserve aport number. Then, it will listen to anyupcoming client. The client then will attempt toconnect to the server. When the connection isestablished, it will be possible to exchangetext messages. When finished, the connectionwill be closed.
    25. 25. MSCIC: Socket Programming Using C#Once the connection isestablished between Serverand Client , they cancommunicate (read or write )through their own sockets.There are two types ofcommunication protocol usesfor Socket Programming in C#, they are TCP/IPCommunication and UDP/IPCommunication .In our project, we are usingTCP/IP CommunicationProtocol.
    26. 26. MSCIC:1:08 / 4:27CHAT APPLICATION
    27. 27. MSCIC: Chat ApplicationWe have created a C# Chat Server and C# Chat Client in two separate C#projects then we compiled and built the program
    28. 28. MSCIC: Chat ApplicationHow doesCryptographyand Socketswork?
    29. 29. MSCIC: Chat ApplicationHow doesSpeechRecognitionwork?CommandsListenConnectionSendSpeakStop ExitSaveStarChat
    30. 30. MSCIThanks for yourattention

    ×