CFP last date
20 May 2024
Reseach Article

Hiding Messages using Musical Notes: A Fuzzy Logic Approach

Published on July 2016 by Kirti Kamalpratap Singh, Neelima Ranvijay Singh, Pankaj Mudholkar
International Conference on Advances in Information Technology and Management
Foundation of Computer Science USA
ICAIM2016 - Number 3
July 2016
Authors: Kirti Kamalpratap Singh, Neelima Ranvijay Singh, Pankaj Mudholkar
71ec3792-0a00-46bd-8c46-e7d43a5dcc74

Kirti Kamalpratap Singh, Neelima Ranvijay Singh, Pankaj Mudholkar . Hiding Messages using Musical Notes: A Fuzzy Logic Approach. International Conference on Advances in Information Technology and Management. ICAIM2016, 3 (July 2016), 18-22.

@article{
author = { Kirti Kamalpratap Singh, Neelima Ranvijay Singh, Pankaj Mudholkar },
title = { Hiding Messages using Musical Notes: A Fuzzy Logic Approach },
journal = { International Conference on Advances in Information Technology and Management },
issue_date = { July 2016 },
volume = { ICAIM2016 },
number = { 3 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 18-22 },
numpages = 5,
url = { /proceedings/icaim2016/number3/25516-1687/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Information Technology and Management
%A Kirti Kamalpratap Singh
%A Neelima Ranvijay Singh
%A Pankaj Mudholkar
%T Hiding Messages using Musical Notes: A Fuzzy Logic Approach
%J International Conference on Advances in Information Technology and Management
%@ 0975-8887
%V ICAIM2016
%N 3
%P 18-22
%D 2016
%I International Journal of Computer Applications
Abstract

"Music words can be used as a communication language". Musical symbols and musical notes have been used as codes and ciphers from early days. Encrypting messages using music is known as Musical cryptography and it uses predefined set of notes and set of rules for creating musical pieces which in turn are musical cryptograms. Traditional algorithms which are applied to musical cryptography used simple substitution cipher which produced good musical sequences. To overcome this problem of fuzzy logic based algorithm for musical cryptography is proposed in this paper. The paper proposes a symmetric key substitution cipher which uses one of the n candidate notes to encrypt a particular character. The application of fuzzy logic in music cryptography produces a acceptable musical sequences which are hard to be finding as cipher

References
  1. D. Kahn, "The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet", (1996). J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed. , vol. 2. Oxford: Clarendon, 1892, pp. 68–73.
  2. D. Davies, "A brief history of cryptography", Information Security Technical Report, vol. 2, no. 2, (1997), pp. 14-17. K. Elissa, "Title of paper if known," unpublished.
  3. E. Sams, "Musical cryptography", CRYPTOLOGIA, vol. 3, no. 4, (1979), pp. 193-201.
  4. E. Sams, "Elgar's Cipher Letter to Dorabella", The Musical Times, vol. 111, no. 1524, (1970), pp. 151-154.
  5. J. L. Klüber, "Kryptographik", (1809).
  6. A. Kircher, "Musurgia universalis", 1650, (1988).
  7. A. P. Coudert, R. H. Popkin, and G. M. Weiner, "eds. Leibniz, mysticism and religion", International Archives of the History of Ideas, vol. 158, Springer, (1998).
  8. J. Bourne, "The concise Oxford dictionary of music", OUP Oxford, (2004).
  9. R. Tatlow, "Bach and the Riddle of the Number Alphabet", Cambridge University Press, (1991).
  10. S. E. Sadie, "The new Grove dictionary of music and musicians", (1980).
  11. A. P. Coudert, R. H. Popkin, and G. M. Weiner, "eds. Leibniz, mysticism and religion", International Archives of the History of Ideas, vol. 158, Springer, (1998).
  12. A. Shenton, "Olivier Messiaen's system of signs: notes towards understanding his music", Ashgate Publishing, Ltd. , (2008).
Index Terms

Computer Science
Information Sciences

Keywords

Musical Cryptography Musical Words Algorithmic Composition Fuzzy Logic Encryption And Decryption Techniques.