Uncovering spoken phrases in encrypted VoIP conversations BY, RITESH CHANDRA REDDY GUNNA. PRASAD VUNNAM.

Slides:



Advertisements
Similar presentations
Presented by Erin Palmer. Speech processing is widely used today Can you think of some examples? Phone dialog systems (bank, Amtrak) Computers dictation.
Advertisements

Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Charles Wright, Scott Coull, Fabian Monrose Presented by Sruthi Vemulapalli.
N Team 15: Final Presentation Peter Nyberg Azadeh Bararsani Adie Tong N N multicodec minisip.
Acoustic Model Adaptation Based On Pronunciation Variability Analysis For Non-Native Speech Recognition Yoo Rhee Oh, Jae Sam Yoon, and Hong Kook Kim Dept.
Speech in Multimedia Hao Jiang Computer Science Department Boston College Oct. 9, 2007.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
SPEECH RECOGNITION Kunal Shalia and Dima Smirnov.
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Presented by Yang Gao 11/2/2011 Charles V. Wright MIT Lincoln Laboratory Scott.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
Speex encoder project Presented by: Gruper Leetal Kamelo Tsafrir Instructor: Guz Zvika Software performance enhancement using multithreading, SIMD and.
Building High Quality Databases for Minority Languages such as Galician F. Campillo, D. Braga, A.B. Mourín, Carmen García-Mateo, P. Silva, M. Sales Dias,
 Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the.
04/08/04 Why Speech Synthesis is Hard Chris Brew The Ohio State University.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
1 TAC2000/ IP Telephony Lab IP Telephony (Voice over IP) Associate Professor Quincy Wu Graduate Institute of Communication.
How Spread Works. Spread Spread stands for Speech and Phoneme Recognition as Educational Aid for the Deaf and Hearing Impaired Children It is a game used.
Utterance Verification for Spontaneous Mandarin Speech Keyword Spotting Liu Xin, BinXi Wang Presenter: Kai-Wun Shih No.306, P.O. Box 1001,ZhengZhou,450002,
To Build Context-Aware VoIP Support using Session Initiation Protocol By Prasad Vunnam Ritesh Reddy Gunna.
Develop and Implementation of the Speex Vocoder on the TI C64+ DSP
Speaker : Chungyi Wang Advisor: Quincy Wu Date :
A brief overview of Speech Recognition and Spoken Language Processing Advanced NLP Guest Lecture August 31 Andrew Rosenberg.
Synthesis of Child Speech With HMM Adaptation and Voice Conversion Oliver Watts, Junichi Yamagishi, Member, IEEE, Simon King, Senior Member, IEEE, and.
Csc Lecture 7 Recognizing speech. Geoffrey Hinton.
LML Speech Recognition Speech Recognition Introduction I E.M. Bakker.
University of Plymouth United Kingdom {L.Sun; ICC 2002, New York, USA1 Lingfen Sun Emmanuel Ifeachor Perceived Speech Quality.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
VOCODERS. Vocoders Speech Coding Systems Implemented in the transmitter for analysis of the voice signal Complex than waveform coders High economy in.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
PROJECT PROPOSAL Project Title: Product Tracking using Mobile Number.
Conditional Random Fields for ASR Jeremy Morris July 25, 2006.
Speech Communication Lab, State University of New York at Binghamton Dimensionality Reduction Methods for HMM Phonetic Recognition Hongbing Hu, Stephen.
1 Speech Processing. 2 Speech Processing: Text:  Spoken language processing Huang, Acero, Hon, Prentice Hall, 2000  Discrete time processing of speech.
Performance Comparison of Speaker and Emotion Recognition
© 2013 by Larson Technical Services
Introduction Part I Speech Representation, Models and Analysis Part II Speech Recognition Part III Speech Synthesis Part IV Speech Coding Part V Frontier.
ARTIFICIAL INTELLIGENCE FOR SPEECH RECOGNITION. Introduction What is Speech Recognition?  also known as automatic speech recognition or computer speech.
Pragmatics and Text Analysis Chapter 6.  concerned with the how meaning is communicated by the speaker (writer) and interpreted by the listener (reader)
Hidden Markov Model and Its Application in Bioinformatics Liqing Department of Computer Science.
Institut für Nachrichtengeräte und Datenverarbeitung Prof. Dr.-Ing. P. Vary On the Use of Artificial Bandwidth Extension Techniques in Wideband Speech.
A Hybrid Model of HMM and RBFN Model of Speech Recognition 길이만, 김수연, 김성호, 원윤정, 윤아림 한국과학기술원 응용수학전공.
Efficient Estimation of Word Representations in Vector Space By Tomas Mikolov, Kai Chen, Greg Corrado, Jeffrey Dean. Google Inc., Mountain View, CA. Published.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Using Stored Procedures ADO.NET - Lesson 07  Training time: 15 minutes  Author:
Speech Recognition Xiaofeng Lai. What is speech recognition?  Speech recognition :  This is the ability of a machine or program to identify words and.
1 Speech Recognition. 2 Introduction What is Speech Recognition? - Voice Recognition? Where can it be used? - Dictation - System control/navigation -
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Charles V. Wright Scott E. Coull Gerald M. Masson Lucas Ballard Fabian Monrose.
The Sounds of English: an Introduction to English Phonetics.
Authors: F. Zamora-Martínez, V. Frinken, S. España-Boquera, M.J. Castro-Bleda, A. Fischer, H. Bunke Source: Pattern Recognition, Volume 47, Issue 4, April.
Using Speech Recognition to Predict VoIP Quality
KINECT AMERICAN SIGN TRANSLATOR (KAST)
A NONPARAMETRIC BAYESIAN APPROACH FOR
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
Speech Recognition
Audio to Score Alignment for Educational Software
Hardware Protection Against Software Piracy
Spectral and Temporal Modulation Features for Phonetic Recognition Stephen A. Zahorian, Hongbing Hu, Zhengqing Chen, Jiang Wu Department of Electrical.
Yes, I'm able to index audio files within Alfresco
an Introduction to English
Conditional Random Fields for ASR
Audio Henning Schulzrinne Dept. of Computer Science
A research work by: Charles V. Wright, Scott E. Coull, Fabian Monrose
DVI-100 Digital Voice Interface for TETRA-Infrastructure
Title of poster... M. Author1, D. Author2, M. Author3
Presenter’s Name (if case)
Research Paper Overview.
DVI-100 Digital Voice Interface for TETRA-Infrastructure
Title Introduction: Discussion & Conclusion: Methods & Results:
Title of ePoster... M. Author1, D. Author2, M. Author3
A SEMINAR SYNOPSIS ON XML ENCRYPTION
Da-Rong Liu, Kuan-Yu Chen, Hung-Yi Lee, Lin-shan Lee
Presentation transcript:

Uncovering spoken phrases in encrypted VoIP conversations BY, RITESH CHANDRA REDDY GUNNA. PRASAD VUNNAM.

Authors  Charles V. Wright  Lucas Ballard  Scott E. Coull  Fabian Monrose  Gerald M. Masson

Introduction  Encrypted data is sent through VoIP.  We need to check the efficiency.  Hack the voice data over IP.

Capturing Voice  Voice is captured using HMM.  HMM- Hidden Markov Model.  Uses the phonetic pronunciation of the words from the database.  TIMIT- It is the database that contains the phonetic words.

Codecs and software used  Speex codec: This codec is used to encode the recordings from TIMIT which is used to find the relationship between the bit rates. This all happens in wideband. When coming to the narrow band, it is used to test the precision between narrow band and wide band.  HMER: It is a software package that is used to build Hidden Morkov Model (HMM) to recognize the English phrases and pronunciation.

CELP Encoder (Code exited linear prediction)

Distribution of bit rates used to encode four phonemes with Speex

Training and Detection Process

Extendibility  We can also use languages other than English which was not done in this paper.  For this we need to develop phonetic pronunciation libraries called TIMIT for different languages.

Conclusion  The intention of the authors of this paper is to find out all the possibilities of hacking the voice over IP and then find out for the remedies. That is the methods to protect the data over IP and to improve them to give more efficient results.

THANK YOU