Good evningeveryone, today i amgoin to present to youmyproject in speech recognition wichisEncrypted chat application with speech recogniton
Likeconnecting, listening,sending,writing andreading the messages, savingit in a wavform, …
In thispresetation i m going seing whatis speech recognition and cryptography, i m goinalso talk about sockets programing in c#wichweused in our application and finallywellsee how is the chat application
Now, whatis speech recognition
Meansyousaysomething to the computer and it do that command
There are twomodels of speech recognition
Cryptography in greekis KRYPTOSplaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertextkey - info used in cipher known only to sender/receiver
MSCIC: Speech RecognitionWhat is Speech Recognition?Speech recognition is the ability ofa machine or program to identifyand respond to words andsentences in spoken language byconverting them to a machine-readable format
MSCIC: Speech RecognitionCreated by taking audiorecordings of speech, and theirtext transcriptions, and usingsoftware to create statisticalrepresentations of the soundsthat make up each wordLanguage ModelAcoustic ModelIt is used in many naturallanguage processingapplications such as speechrecognition tries to capture theproperties of a language, and topredict the next word in aspeech sequenceAcoustic ModelLanguage ModelModel
MSCIC: Speech RecognitionThere are two types of speech recognitionC:Speech RecognitionSpeaker-dependentC:..> It is commonly used fordictation softwareC:..> It works by learning the uniquecharacteristics of a single person’svoice. New users must first “train”the software by speaking to it, so thecomputer can analyze how the persontalks. This often means users have toread a few pages of text to thecomputer before they can use thespeech recognition softwareC:Speech RecognitionSpeaker-independentC:..> It is more commonly found inphone applicationsC:..> It is designed to recognizeanyone’s voice, so no training isinvolved. Speech recognition enginesthat are speaker independent generallydeal with this fact by limiting thegrammars they use. By using a smallerlist of recognized words.
MSCIC: Speech RecognitionAdvantagesUseful for people with disabilities like who cant use their handsCell-phone users can dial pre-programmed numbers by voicecommand which reduce interaction with on-the-phone agentsCan be used for typing large quantities of text in a relativelyshort period of time
MSCIC: Speech RecognitionDisadvantagesDifficult to build a perfect system. Conversations Involves morethan just words and some words sound the same (to, too, two)Filtering background noise is a task that can even be difficult forhumans to accomplish. Even the best speech recognitionsystems sometimes make errors. If there is noise or some othersound in the room, the number of errors will increase.Every human being has differences such as theirvoice, accent, and speaking style
MSCIC: Speech RecognitionFuture of Speech Recognition will become better and better. Tablets forcomputer speech recognition dictation and data entry will bedeveloped, as faster processors and more memory become available.Greater use will be made of intelligent systems which will attempt toguess what the speaker intended to say, rather than what was actuallysaid, as people often misspeak and make unintentional mistakes.Microphones and sound systems will be designed to adapt more quicklyto changing background noise levels, different environments, with betterrecognition of extraneous material to be discardedCancelOK
MSCIC: CryptographyThe word cryptography in Greek means “secret writing” The term todayrefers to the science and art of transforming messages to make themsecure and immune to attacks.The original message before being transformed, is called Plaintext. Afterthe message is transformed is called Cipher text. An encryption algorithmtransforms the plaintext to cipher text, and a decryption algorithmtransforms the cipher text to plaintext.
MSCIC: CryptographyMSCICryptography is concerned with four facets ofdata transfer:ConfidentialityAuthenticityIntegrityNon-repudiation
MSCIC: CryptographyProblemAlice and Bob wish to perform some form of communicationwhile Oscar is an eavesdropper who wishes to spy on or tamperwith the communications between Alice and BobCancelOK
MSCIC: CryptographyA message sent from Alice to Bob cannotbe read by anyone else.AuthenticityConfidentialityIntegrityNon-repudiationBob knows that only Alice could have sentthe message he has just receivedConfidentialityAuthenticityIntegrityNon-repudiation
MSCIC: CryptographyBob knows that the message from Alice hasnot been tamperedConfidentialityIntegrityAuthenticityNon-repudiationIt is impossible for Alice to turn aroundlater and say she did not send the messageConfidentialityNon-repudiationAuthenticityIntegrity
MSCIC: CryptographyThere are three Cryptographic Primitives Symmetric ciphers (“secret-key” cryptography) Hashes (message digests) Asymmetric ciphers (“public-key” cryptography)
MSCIC: CryptographySymmetric ciphers translate“plaintext” into “ciphertext.”The recipient of the ciphertextmust have the secret “key” inorder to translate theciphertext back to its originalplaintext form.Symmetric ciphers are usefulfor keeping secrets.one of popular and wellrespected symmetricalgorithms is the AdvancedEncryption Standard (AES)Symmetric Ciphers
MSCIC: CryptographyA “hash” is a fixed-lengthrepresentation of a message. Itis useful for detecting messagetampering.Hashes are also known as“message digests.”Hashes
MSCIC: CryptographyMSCIC: CryptographyAsymmetric ciphers encryptdata with a “public key.”Only the owner of thecorresponding “private key”can decrypt the ciphertext.Asymmetric ciphers are usefulfor message authentication.one of popular and well-respected asymmetricalgorithms is the Rivest-Shamir-Adleman (RSA)Asymmetric Ciphers
MSCIC: Socket Programming Using C#How to C# Socket programmingSockets are getting more and more used nowadays. Itprovides a simple way to exchange data over the network. Itsused, as an example, to exchange messages between users.Thanks to its powerful features, sockets are becoming a mustto learn technology for developers.
MSCIC: Socket Programming Using C#C: Socket Programming Using C#C:..> As sockets are based on client/serverarchitecture, our application is composed of aserver and a client. The server will reserve aport number. Then, it will listen to anyupcoming client. The client then will attempt toconnect to the server. When the connection isestablished, it will be possible to exchangetext messages. When finished, the connectionwill be closed.
MSCIC: Socket Programming Using C#Once the connection isestablished between Serverand Client , they cancommunicate (read or write )through their own sockets.There are two types ofcommunication protocol usesfor Socket Programming in C#, they are TCP/IPCommunication and UDP/IPCommunication .In our project, we are usingTCP/IP CommunicationProtocol.