img Leseprobe Leseprobe

Musical Cryptography. Empirical Analysis of Algorithms

Shailly Ranjan, Sandip Dutta, Soubhik Chakraborty, et al.

PDF
15,99
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

GRIN Verlag img Link Publisher

Geisteswissenschaften, Kunst, Musik / Musiktheorie, Musiklehre

Beschreibung

Academic Paper from the year 2020 in the subject Musicology - Systematic musicology, , course: IMSc Mathematics and Computing, language: English, abstract: With an onset of electronic commerce and portable devices for communication, cryptology has become an exceedingly important science in the present day. The diversity of applications in which crypto-algorithms have to operate have increased and hence the requirement for the efficient algorithms have grown. Confidential information of a government or private agency or department is secured through the use of Cryptography. Musical properties, for example, notes of which the music is made are not consistent and shift from one arrangement to another. Same tune played by various composers shows a variety in the succession of notes utilized along with different qualities of a musical organization, for example, term of each note and the recurrence at which each note is played. Such a variety can be utilized to encode the message. In this work, we have joined the utilization of Hindustani (North Indian) melodic notes to encode messages and used this method on three ragas to test the robustness of the algorithm with different input size. We have utilized a semi-natural composition procedure to produce note successions of Indian music which would then be able to be utilized as a device for message stowing away. This from the outset place guarantees that the message is avoided the interloper and second it gives another irregular arrangement of notes each time same message is sent. So the very motivation behind a Cryptographic calculation is served. The scrambled message as melodic notes is at that point sent to the planned beneficiary as a melodic structure which helps in opposing the gatecrasher of detecting any classified data that is being sent over the correspondence channel.

Weitere Titel in dieser Kategorie
Cover Lessons in Music Form
Percy Goetschius
Cover Principles of Orchestration
Nikolay Rimsky-Korsakov
Cover A Composer's World
Paul Hindemith
Cover Choro Maranhense
Peter Ninaus
Cover Jazz Harmony
Frank Sikora
Cover Cats and Flowers
Susanna Király
Cover Principles of Orchestration
Nikolay Rimsky-Korsakov
Cover Music Talks
Angelos Mavros
Cover Tonal Music
Franz Sauter
Cover Advice to Singers
Frederick James Crowest

Kundenbewertungen

Schlagwörter

analysis, empirical, musical, cryptography, algorithms