Documente Academic
Documente Profesional
Documente Cultură
by HARDEER KAUR
UNIVERSITY ROLL NO. 1/11/FET/COM/3003 MASTER OF TECHNOLOGY IN COMMUNICATION SYSTEM Session 2011 to 2014
Knowledge-based authentication is based on information authorized individuals will know, and unauthorized individuals will not. E.g. a PIN or password information. Object-based authentication is based on possessing a token or tools that perm its the person access to the controlled resource. E.g. Keys, pass cards or a secure Id. Biometric-based authentication measures individuals unique physical or behavioral characteristics. It exists today in various form s such as fingerprint verification, retinal scans, facial analysis, analysis of vein structures and voice authentication.
Software Tokens: This is similar to have software generated password. Where a software token is generated by a separate system which can be entered as a password to gain an access to another system. Digital certificate: Is an electronic document that uses a digital signature to bind a public key with an identity information such as the name of a person or an organization, their address, and so forth. Hardware Tokens: Is a physical device that an authorized user of computer services is given to ease authentication Smart Cards: is any pocket-sized card with embedded integrated circuits. Biometrics: A system for controlling access to storage units based on physical details, such as fingerprints.
2. Biometric approach (Speaker recognition) : Every human being has his own unique voice and this can be used as an digital signature to authenticate his access to various systems. Example: A voice enabled net banking website, which will ask its users to read a phrase every time he wants to login. The phrase will be scrutinized on the bases of its tone, pitch and other parameters to identify the user. 3. Combination of Voice to text and Biometric approach: In this approach the system will check for the integrity to the speaker and also will check the content of the speech. Example: At the security gate the user will be asked to enter his password (which can be a sequence of alphabets or phrase).
VOICE RECOGNITION
Introduction:
Voice or Speech recognition is terminology give to the study of the voice and convert it to digital signal which can be used as a command or trigger for some other operation.
Goal:
To automatically extract the string of words spoken from the speech signal.
Speech Signal
Speech is produced as sequence of characters, which has characteristics of Acoustic Signal
Speech Recognition
Input Speech
Acoustic Front-end
Search
Recognized Utterance
Approach
Speech Recognition Approaches
Automatic speech recognition system is used to transform or produce a sequence of message from a speech signal. This process is called decoding. Speech signal is decoded and then converted into writing (e.g. dictation machine) or commands to be processed (e.g. hands free dialing). Speech recognition systems can be divided into the number of classes based on their ability to recognize that words and list of words they have. A few classes of speech recognition are classified as under:
1. Isolated Speech: Isolated words usually involve a pause between two utterances; it doesnt mean that it only accepts a single word but instead it requires one utterance at a time.
Isolated speech:
2. Connected Speech: Connected words or connected speech is similar to isolated speech but allow separate utterances with minimal pause between them.
T , h , I, s
Connected speech:
3. Continuous speech: Continuous speech allow the user to speak almost naturally, it is also called the computer dictation
This , presentation
Continuous speech:
This is a very good presentation
Speech Signal
Speech Recognition
Speech Signals : Input signals (Voice) is collected using a Microphone (Transducer) and are converted form sound wave to electric signal. Parameterization: The signal received is converted to a Digital signal for further processing. Acoustic Modeling: Acoustic models represent sub-word units, such as phonemes, as a finite-state machine in which: states model spectral structure and transitions model temporal structure. Most commonly used modeling approaches followed are: Hidden Markov Models Parameter Estimation. Language Modeling : The language model predicts the next set of words, and controls which models are hypothesized. Most commonly used modeling approaches followed are: N-Grams Models Integration of natural language Model. Search Algorithms and Data Structures
PARAMETERIZATION
The human voice produces a highly complex acoustic wave, which, fortunately, the human ear and brain have evolved to interpret effectively. In technical terms the voice is an analog signal. An analog signal is defined as one with a continuously variable physical value. A single frequency tone, such as the dial tone on a telephone will be a simple analog signal. Such a simple signal will take the form of a Sine Wave In explaining how analog signals can be converted to digital data, as shown in the figure.
Steps
1
Procedure
Sample the analog signal regularly.
Description
The sampling rate must be twice the highest frequency to produce playback that appears neither choppy nor too smooth Quantization consists of a scale made up of eight major divisions or chords. Each chord is subdivided into 16 equally spaced steps. The chords are not equally spaced but are actually finest near the origin. Steps are equal within the chords but different when they are compared between the chords. Finer graduations at the origin result in less distortion for low-level tones. PBX output is a continuous analog voice waveform. T1 digital voice is a snapshot of the wave encoded in ones and zeros.
Further Study:
Develop a Matlab program to simulate a security gate where identity of the speaker is used as a password (Speaker Identification). Develop a Matlab program to simulate a security gate where identity of the speaker and voice string is used as a password (Biometric authentication & Voice passwords).
In order to satisfy the goal of the research following objectives have been identified:
1. Study the Speech Processing techniques. 2. Study the Speech processing research methods. 3. Use and test various speech recognition models.
Tools To Be Used.
1. Matlab. 2. Microsoft word.
CONCLUSION
The main purpose and benefit of a voice recognition system is the amount of security that it provides. Although voice recognition is mostly secure, it still has flaws. To aid its acceptance, this biometric system can be combined with more traditional security features to provide an additional layer of security. These can include using other biometrics, or security mechanisms such as RSA, PINs or a combination of several different mechanisms. Through further development, voice recognition can be one of the most successful and largest applications of biometrics in the future to come. A crude speaker recognition code has been written using the MATLAB programming language Experience was also gained in speech editing as well as basic filtering techniques. While the methods utilized in the design of the code for this project are a good foundation for a speaker recognition system, more advanced techniques would have to be used to produce a successful speaker recognition system.
REFRERANCES
1. 2. 3. 4. 5. 6. A Practical guide to Biometric Security Technology, Silverm an, 2001, IEEE. Digital Communication by, Haykin. Digital Communication by, Sunjay Sharma. Digital Signal Processing, J. S. Katre Speech Technology for Telecommunications, F.A. Westhall, R.D. Johnston. Voice Recognition, Jim Baumann, Human Interface Technology Laboratory, University of Washington. http://www.hitl.washington.edu/scivw/EVE/I .D.2.d.VoiceRecognition.htm l
THANK YOU
& Q&A