[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

A new cipher system using semi-natural composition in Indian raga

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Cryptographic algorithms are the basic of care-free transactions over the Internet today. Confidential information of a government or private agency or department is secured through the use of Cryptography. From doing secure communication to transferring information of national importance, Cryptographic algorithms play the sole role in hiding the confidentiality. Musical attributes such as notes of which the music is composed are not constant and vary from composition to composition. Same tune played by different composers shows a variation in the sequence of notes used along with other attributes of a musical composition such as duration of each note and the frequency at which each note is played. Such a variation can be employed for the purpose of encrypting the message. In this paper, we have incorporated the use of Hindustani (North Indian) musical notes to encrypt messages. We have used a semi-natural composition process to generate note sequences of Indian music which can then be used as a tool for message hiding. This at first place ensures that the message is hidden from the intruder and second it gives a new random sequence of notes every time same message is sent. So the very purpose of a Cryptographic algorithm is served. The encrypted message in the form of musical notes is then sent to the intended recipient in the form of a musical composition which helps in defying the intruder of sensing any confidential information that is being sent over the communication channel.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Chakraborty S, Solanki S, Roy S, Chauhan S, Tripathy S, Mahto K (2008) A statistical approach for modelling Indian classical music. Achieve of Cornell University e-Library. http://arxiv.org/abs/0809.3214

  • Chakraborty S, Shukla R, Krishnapriya K, Loveleen Chauhan S, Kumari M, Solanki S (2009) A statistical analysis of a raga based song. Georgian Electron Sci J Musicol Cult Sci 2(4):21–33

    Google Scholar 

  • Chakraborty S, Kalita M, Kumari N (2011) Semi-natural composition: an experiment with north Indian ragas. Int J Comput Cognit 9(2):51–55

    Google Scholar 

  • Chakraborty S, Mazzola G, Tewari S, Patra M (2014) Computational musicology in Hindustani music. Springer, Berlin

    Book  Google Scholar 

  • Dutta D (2006) Sangeet tattwa (pratham khanda), 5th edn (Bengali) Brati Prakashani

  • Dutta S, Chakraborty S, Mahanti N (2010) A novel method of hiding messages using musical notes. Int J Comput Appl 1(16):76–79

    Google Scholar 

  • Dutta S, Kumar C, Chakraborty S (2013) A symmetric key algorithm for cryptography using music. Int J Eng Technol 5(3):3109–3115

    Google Scholar 

  • Eck D, Schmidhuber J (2002) A first look at music composition using LSTM recurrent neural networks. Technical Report No. IDSIA-07-02

  • Internet Growth Statistics. https://www.internetworldstats.com/emarketing.htm. Accessed 5 Mar 2019

  • Kumar C, Dutta S, Chakraborty S (2014) Musical cryptography using genetic algorithm. In: Paper presented at the International conference on circuit, power and computing technologies (ICCPCT), pp 1742–1747

  • Kumar C, Dutta S, Chakraborty S (2015a) A hybrid polybius–playfair music cipher. Int J Multimed Ubiquitous Eng 10(8):187–198

    Article  Google Scholar 

  • Kumar C, Dutta S, Chakraborty S (2015b) Hiding messages using musical notes: A fuzzy logic approach. Int J Sec Its Appl 9(1):237–248

    Google Scholar 

  • Shetty S, Achary K (2009) Raga mining of Indian music by extracting arohana–avrohana pattern. Int J Curr Trends Eng Technol 1(1):362–366

    Google Scholar 

  • Sinha P (2008) Artificial composition: an experiment on north Indian music. J New Music Res 37(3):221–232

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soubhik Chakraborty.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by V. Loia.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

The sequence of Yaman Kalyan taken from Dutta (2006) from which the TPM and Class Matrix were constructed is given below for the reference of interested readers.

figure b

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pranav, P., Chakraborty, S. & Dutta, S. A new cipher system using semi-natural composition in Indian raga. Soft Comput 24, 1529–1537 (2020). https://doi.org/10.1007/s00500-019-03983-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-019-03983-8

Keywords

Navigation