Business Today

Whisper Your Voice Command

Microsoft has come up with a new technology to make talking to your gadgets less awkward.
Team BT   New Delhi     Print Edition: February 10, 2019
Whisper Your Voice Command
Illustration By Raj Verma

Speech recognition came a long way since its tentative beginning a couple of decades ago. At first, Dragon Naturally Speaking, created by Nuance, was a big and expensive software package that users had to load onto their computers. Once installed, a user could dictate entire documents into Microsoft Word. Of course, it was slow and inaccurate, and it had trouble with different accents, making the whole thing a frustrating experience. Worse still, anyone working in an office alongside other people could not use it because everyone could hear the dictation. It eventually became part of the Microsoft package but is not likely to work well in today's open office plan.

When smartphones took over, our society became a little more accustomed to disembodied conversations being audible anywhere and everywhere. Even the sight and sound of people apparently talking to themselves (they have Bluetooth headsets on) became commonplace.

Then voice assistants came along and added to the cacophony. With Google Assistant, Siri and other such tools becoming more entrenched in everyday life, there would be little point if one could not be free to voice-command anytime, especially when there is a specific need to remain hands-free. But try telling your favourite assistant to add diapers to the shopping list or give a colleague's work a quick look-over, and you are bound to get a few odd looks. Microsoft's suggestion: Whisper your command.

The Redmond giant has patented a solution called SilentVoice and describes it as a "new voice input interface device that penetrates the speech-based natural user interface in daily life." The proposed ingressive speech method - it requires you to inhale while whispering instead of exhaling as we usually do - places a microphone about two millimetres away from the mouth so that it can capture the ultra-small voice leakage and process it. The technology ensures a good signal-to-noise ratio, which means background noise would not distort the whispered voice command.

You get a double benefit: First, no one can hear those barely audible whispers and there will be no privacy breach; second, unlike people shouting in their phones, you will not annoy anyone whether you are at home, in the office or commuting. Finally, the service is quite reliable. By measuring airflow direction, SilentVoice can separate your commands from usual utterances with 98.8 per cent accuracy and no activation words are needed.

Microsoft has a video demonstration in which a researcher shows the use of a little handheld device comparing normal speech with whispered speech. Although humans cannot catch the whispered words, those can be picked up by the microphone and even transcribed into text. The day may not be far when people will be walking around with gadgets firmly pressed against their lips as they breathe in their words.

Hijack High Jinks

Two hackers, known as Giraffe and J3ws3r, have succeeded in scaring Chromecast users (it is Google's smart TV dongle) by exploiting the Universal Plug and Play networking standard. Mischievous as it may seem, their intention was to send out an unmistakable wake-up call. The Verge says they managed to get a message displayed on 70,000 devices using Chromecast and asked users to subscribe to the YouTube channel of PewDiePie, but not with his permission, of course.

They also included a message that told users their sensitive information was exposed because their network routers were not secure enough. A screenshot of the message they posted was revealed by TechCrunch and reads: Attention! Your Chromecast/Smart TV is exposed to the public Internet and is exposing sensitive information about you! The hackers then offered to help the 'affected' users and invited them to visit the duo's website, but it was not working, it seemed.

Their latest exploit has exposed too many chinks in the armour. For instance, hackers can get ample access to make routers misbehave. They can rename routers, wipe off any piece of information, misdirect connected devices and initiate targeted attacks. With so many smart devices available for use on home networks, these cybersecurity pitfalls must be addressed at the earliest.

  • Print

A    A   A