11 Apr 2009

SPEAKER RECOGINITION

Name of presenters-Reuben Minael &Benjamin Mkwese
Name of Representer- Venance Luhemeja
Name of the Lecture Prof: Matti Tedre.
Lesson –Research field of computer science.

Introduction of Speaker Recognitions
The term Speaker recognition as the narrator of an amplified sounds or voice so as to make detection of the appreciated or approved sound has been determine in most of we Human being because we are able to be acquainted with someone just by hearing him / her when talking.
By definition!
Speaker recognition is the automatically process of making out distinguish between untruthfully and identified spoken based on his or her sound / voice.
Also speaker recognition has been categorized into two classes as
(a) Speaker Verification
(b) Speaker Identification.

Speaker verification, this is the authentication of sound or voice spoken to make
Proof of the recognized speech
While
Speaker Identification is the detection of sound or voice spoken to make discovery of the recognized speech.

HOW THE SYSTEM OF SPEAKER RECOGNITION WORKS
Firstly after storing of the sound or voice to be recognized, the amplified sound signals are converted from analogy to digital signals and make comparison of both current and previous speech and finally is machine instructions as workout exercise.

SOME REASONS WHY USING SPEAKER RECOGNITION
(i) Security operations
(ii) Access control to restricted services
(iii) Military operations.

Speaker recognition is very significant method using in our daily life tricks due to the fact that it helps us to be secure with our properties and make privacy of our own jobs.
Also helps in our governance community to make peace through hidden information to avoid misinformation and misunderstanding among people and society at all.
And lastly but not the least when military armies attack their enemies helps in secure of their information from enemies.

WHERE SPEAKER RECOGNITION CAN BE USED?
According to our lesson we came to observed that speaker recognition can be used in three different aspects techniques as;
(a)Authentication;
Allows people using to identify themselves nothing else but verification of their voices and sound.
(b)Surveillance;
In security agencies i.e. means of collecting information for inspection and observations as well.
(c)Forensic;
Identification proving of the recorded voice to be recognized by the user.

PROBLEMS OF USING SPEAKER RECOGNITION
Although speaker recognition seems as the best way of making people’s privacy but has got many challenges and bellow are some of challenges;
(i)Determination of the acceptable units of voice / sound
-It difficult to make the same correctly speech of the recorded and that used when doing speech recognition.
(ii)Restriction of signal boundary
-Also is difficult to make limitation of signal units when prepare speaker recognition due to the fact that we human being had variety of speech and sound.
(iii)Variability of sound / voice of speech.
-Also it is to make sound / voice to be vary in different accurate lather than to be in restricted point due to sinusoidal frequency of speech

HOW TO MINIMIZE CHALLENGES?
Although is difficulty to overcome the whole problems of speaker recognition but it can be minimized through various ways as stated below;
(a) Utilize the precisely expressions compulsory.
-it will easy to minimize when we use exactly sound and voices pertaining to recorded one.
(b) Maintain the preserved voice pitch.
-Also we should be supposed to upload or retain the recognized speech.
(c) be conscious of the upbringing circumstances
-We are supposed to understand the recognized order of speech.

Termination;
Speaker recognition is the best way of keeping our privacy securely but don’t make trustfully on that because when despoiled it can led a superior quandary as problems to your either country or company or Government or Army and finally you can be seen as untruthfully person.

Refference
(i)Nolan, F. The Phonetic basis of Speaker Recognition (Cambridge University Press, Cambrige 1983).
(ii)Martin. B.T, Dixon.R.N(1979)Automatic Speech and Speaker Recognition.
(iii)Schroeder. R.M(1985)Speech and Speaker Recognition.
(iv)http://www.scholarpedia.org/article/Speaker_recognition

Prepared by venance.

CRYPTOGRAPHY RESEARCH PROPOSAL


Lesson - Research field of computer science Presentation name - CRYPTOGRAPHY presentatives names- Joseph Uhemba&

Izadin Abdalah

Representative name- Venance Luhemeja

Lecture name - Prof: Matti Tedre



INTRODUCTION TO CRYPTOGRAPHY

Cryptography is the scientific studies of hiding information in term of encrypting and decrypt of either data or information from the conveyer to the aimed/ intended destination person or point.



HISTORICAL BACKGROUND OF CRYPTOGRAPHY

In early years ago although the technology was less improved the system of cryptography used by Egyptians as tools to protect national secrets and strategies on attachments of their enemies, through which all processes of computer networks, messages were digitally encrypted and decrypted. Different methods were used so as to make communication with their neighbors without exposing their information to be known by their enemies.


(i). Caesar’s Alphabet This was a simple method used by those people in term of substitute cipher – a letter shift behind or forward but in good manners so as to be translated by the destination of that data. I.e. ABCDEFGHIJKLMNOPQRSTUVWXYZ Example instead of writing the name VENANCE We used cipher letter to write YHQDQFH.

(ii) Enigma Also this is the electronically cryptographic machine used to send the hidden information by Egyptians.



AIM OF CRYPTOGRAPHY

(a) SECURITY

It was created purposely with the aim of protecting data or information securely in order to reach a receiver of that information.

(b) COMMUNICATION

Also apart from hiding information, it was necessary for sender and receiver of that information to achieve goals of communications.

(c) EDUCATION

Lastly but not the least, cryptography help we as IT professionals to learn more about tools of the computer system.



COMPONENTS OF CRYPTOGRAPHY

According to our previous lesson we only discussed on cryptography components has two basics components as arranged below; 1-An algorithm (Cryptographic method) 2-Keys Apart from the components of cryptography we discussed more the types of these ways on how to send and receive information, in which are classified as


a.Secret key system In Secret key system some times are known as symmetric systems wherein we use a single key for both encryption and decryption of data.


b. Public key system. Also in Public key which some times known as asymmetric systems of both encrypt and descript of data because is the modern way based on factorization, although is much slower but Digital signature capability. We normally use plain texts and Cipher texts.



USES OF CRYPTOGRAPHY

a. Privacy

-it is important to know ways on how to use cryptography so as be confidentially secure on sending and receiving of information

b. Authentication

-This is the situation of own a certain property like yours and not some to be intended as his / hers. In which it is easy to keep data in a safe way of transmissions. All the above ways of using cryptography are normally used by


(i)Governments-
This helps the governments especially on that governance with the computerized system so as to secure their information in order to avoid conflicts and misinformation among the society and their neighbor country.

(ii) Banks The system of cryptography in Banking is necessary for the monetary system of keeping money, account numbers, credit cards, ATM number cards as well as visa cards securely so as to avoid theft and terrorism on Banks.

(iii)Spies and Personal -Also this system normally used by spies in stopping terrorism and passwords for emailing communication.



CHALLENGES

Although cryptography assumes as the best way and method of keeping and secure information from being interrupted by other people as for privacy purposes, there are some challenges which can be obtained from

(a) Hackers and Crackers

In the system of hiding information, these hackers and crackers can decrypt our data by steal password and finally crack the whole system of algorithms.

(b) Education and technology. In the case of using the system, it needs the skilled people especially the connected one with a higher ideology computer like IT professionals.

(c) Needs highly cost Also this system needs more money or large fund in order to take control of how we can hide and send our data.

(d) Digital divide The system separate people because needs those who are connected and make easy facilitation of data.


References
(i)http://www.wikipedia.com
(ii)Alexander, MD (1993), Protecting Data With Secret Code, Infosecurity News
(iii)Diffi, W and Etal (1976), New Directions in Cryptography, IEEE Transaction on Information theory.
(iv)Meyer, CH, and Etal (1982), Cryptography, A New Dimension in Computer Security. New York, NY.
(v)Kessler, GC. (1998), An Overview of Cryptography



Conclusion

Cryptography is the best way of hiding data although there some challenges on the system, so we have study hard and make more research about the system and also we have remembered on changing our password frequently after some days or months

prepared by Venance.