scholarly journals Music Cryptography based on Carnatic Music

Music and cryptography have been linked to one another since ancient times. The idea of replacing plaintext letters with music notes and sending the music file to receiver, is not new. But such replacements sometimes result in music clips which are not pleasant to listeners and thereby leading to the music clip gaining unnecessary extra attention. Most of the works done in this area, fail to ensure the generation of a music clip that invariably conforms to any particular form of music. Melody of the music clip is neglected. In order to address this issue, current paper proposes a novel approach for sharing a secret message based on concepts of Carnatic Classical Music. The method proposed here aims at converting a message in textual format to a music clip before sending it to the receiver. Receiver can then decrypt that message using the knowledge of range of frequency values associated with each musical note also called as 'swara' in Carnatic Classical Music. Each plaintext character from English alphabet is replaced by different combinations of swaras. The set of swaras mapped to each plaintext character is so chosen that the final music file produced as the output of encryption always conforms to a melodic form ('Raga') governed by the framework of Carnatic Classical Music. Ten subject matter experts in the field of Carnatic music have given their opinion about the conformance of these music clips to specified ragas. Also, Mean Opinion Score (MOS) of 25 listeners has been tabulated to test and verify the melodic aspect of these music clips.

2014 ◽  
Vol 651-653 ◽  
pp. 2094-2098
Author(s):  
Wen Ming Gui ◽  
Yu Feng Chen ◽  
Rui Fan Liu

In this paper, a novel approach to detect note onset was proposed. At the signal transform stage of the note onset detection, a new musical signal decomposition method based on musical wavelet was bring forward according to the frequency structure of the musical note. At the feature extraction stage, the partial flux feature was proposed in light of the point that some of the partials must change at the time of the onsets. The experimental results indicted that the proposed approach was theoretically feasible and practically effective.


PLoS ONE ◽  
2021 ◽  
Vol 16 (7) ◽  
pp. e0253124
Author(s):  
Laurence A. Clarfeld ◽  
Robert Gramling ◽  
Donna M. Rizzo ◽  
Margaret J. Eppstein

Conversation has been a primary means for the exchange of information since ancient times. Understanding patterns of information flow in conversations is a critical step in assessing and improving communication quality. In this paper, we describe COnversational DYnamics Model (CODYM) analysis, a novel approach for studying patterns of information flow in conversations. CODYMs are Markov Models that capture sequential dependencies in the lengths of speaker turns. The proposed method is automated and scalable, and preserves the privacy of the conversational participants. The primary function of CODYM analysis is to quantify and visualize patterns of information flow, concisely summarized over sequential turns from one or more conversations. Our approach is general and complements existing methods, providing a new tool for use in the analysis of any type of conversation. As an important first application, we demonstrate the model on transcribed conversations between palliative care clinicians and seriously ill patients. These conversations are dynamic and complex, taking place amidst heavy emotions, and include difficult topics such as end-of-life preferences and patient values. We use CODYMs to identify normative patterns of information flow in serious illness conversations, show how these normative patterns change over the course of the conversations, and show how they differ in conversations where the patient does or doesn’t audibly express anger or fear. Potential applications of CODYMs range from assessment and training of effective healthcare communication to comparing conversational dynamics across languages, cultures, and contexts with the prospect of identifying universal similarities and unique “fingerprints” of information flow.


2014 ◽  
Vol 14 (2) ◽  
pp. 5479-5486
Author(s):  
Ali Hussein Hadi

This paper presents a novel covert channel for secret communications. It implements a new application layer covert channel, by applying multimedia steganography techniques to hide secret messages. This new channel method (called Under Your Radar (UYR)) provides a stealthiness method for the communication channel and an efficient method for hiding messages, as proved by our investigations. Such a covert channel will be used for transferring secret messages in two phases. In phase one, the message characters will be embedded randomly into the pixels of video frames. The choice of pixels is dependent on finding an identical value of the character ASCII representation from one of the pixel channels. The positions of pixels will form the steganography key, which will be used later to extract the message. Also, the steganography key will be embedded in an image using the LSB steganography technique. In phase two, the secret message will be exchanged between the sender and the receiver by sharing the video along with the steganography key over a public service (e.g.  a social network), which serves as the new covert communication channel. The experiments outcomes have showed an improvement on the success of the proposed covert channel in exchanging secret messages without rising suspicion by observers or detection tools.


2017 ◽  
Vol 7 (2) ◽  
pp. 1482-1485
Author(s):  
S. Malalla ◽  
F. R. Shareef

Steganography is the science of hiding certain messages (data) in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text) in another text (cover text) so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG) method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.


2019 ◽  
Vol 8 (3) ◽  
pp. 1732-1738

Recently, security has become the prime concern for any organization and other civil and military applications. In this field of security, the data security during communication over an insecure wireless channel is the most important task which can be done by performing cryptography, watermarking and steganography. However, cryptography and watermarking schemes can be identified easily because of change in the data structure hence attackers can focus on that particular part to hack the secret information whereas steganography is a hiding mechanism in which secret message can be concealed into the cover and it can be retrieved at the receiver end. Several techniques have been introduced during last decade which are focused on image-image steganography and audio steganography. In the proposed work, we concentrate on audio steganography and develop a novel approach where secret message can be in the form of plain text or image, whereas cover message is in the form of audio. In order to provide additional security to this model we incorporate AES encryption scheme where secret message is encrypted and hidden in the cover audio. The proposed approach uses DCT coefficient computation and AES encryption scheme. An extensive experimental study is carried based on different test cases and evaluated against state-of-art techniques. The experimental study shows that the proposed approach achieves better performance for audio steganography.


Author(s):  
Daniel Harasim ◽  
Fabian C. Moss ◽  
Matthias Ramirez ◽  
Martin Rohrmeier

AbstractTonality is one of the most central theoretical concepts for the analysis of Western classical music. This study presents a novel approach for the study of its historical development, exploring in particular the concept of mode. Based on a large dataset of approximately 13,000 musical pieces in MIDI format, we present two models to infer both the number and characteristics of modes of different historical periods from first principles: a geometric model of modes as clusters of musical pieces in a non-Euclidean space, and a cognitively plausible Bayesian model of modes as Dirichlet distributions. We use the geometric model to determine the optimal number of modes for five historical epochs via unsupervised learning and apply the probabilistic model to infer the characteristics of the modes. Our results show that the inference of four modes is most plausible in the Renaissance, that two modes–corresponding to major and minor–are most appropriate in the Baroque and Classical eras, whereas no clear separation into distinct modes is found for the 19th century.


Author(s):  
M.Grace Vennice ◽  
M. Swapna ◽  
MD.Ahmad Ali ◽  
T.Dharma Reddy

The Often Distribution of encrypted messages will depict the concentration of third parties. The attempts can be made to break and expose the actual messages by the hackers and cracker crackers. To conceal the subsistence of message steganography is introduced by hiding a secret message inside another credulous message.Steganography along with cryptograph y is used and offers suitable amount of privacy and security over the communication cha channel. nnel. In this paper along with various existing text text-based steganography techniques, an overview of text steganography and a concise history of steganography can be presented. The problems present in the text steganography and issues with existing solution solutionss are highlighted. In information hiding, a novel approach is proposed by using inter-word word spacing and inter inter-paragraph paragraph spacing as a hybrid method. Based on the length of the secret message, the proposed method provides dynamic generated stego stego-text with six ix options of maximum capacity. The considerable drawbacks of every existing method and how our new approach might be recommended as a solution can be analyzed in this paper.


Sign in / Sign up

Export Citation Format

Share Document