Description
Attributes
Reviews
Academic Paper from the year 2020 in the subject Musicology - Systematic musicology, , course: IMSc Mathematics and Computing, language: English, abstract: With an onset of electronic commerce and portable devices for communication, cryptology has become an exceedingly important science in the present day. The diversity of applications in which crypto-algorithms have to operate have increased and hence the requirement for the efficient algorithms have grown. Confidential information of a government or private agency or department is secured through the use of Cryptography.

Musical properties, for example, notes of which the music is made are not consistent and shift from one arrangement to another. Same tune played by various composers shows a variety in the succession of notes utilized along with different qualities of a musical organization, for example, term of each note and the recurrence at which each note is played. Such a variety can be utilized to encode the message. In this work, we have joined the utilization of Hindustani (North Indian) melodic notes to encode messages and used this method on three ragas to test the robustness of the algorithm with different input size. We have utilized a semi-natural composition procedure to produce note successions of Indian music which would then be able to be utilized as a device for message stowing away. This from the outset place guarantees that the message is avoided the interloper and second it gives another irregular arrangement of notes each time same message is sent. So the very motivation behind a Cryptographic calculation is served. The scrambled message as melodic notes is at that point sent to the planned beneficiary as a melodic structure which helps in opposing the gatecrasher of detecting any classified data that is being sent over the correspondence channel.
  • Format: pdf
  • ISBN: 9783346268884
  • Publisher: GRIN VERLAG
  • Author: Sandip Dutta
  • Ean Code: 9783346268884
  • Book type: E-book
  • Language: English
  • DRM: No DRM
0
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
0%

Recommend

Musical Cryptography. Empirical Analysis of Algorithms
Your Rating
Upload your photo (.gif,.jpg,.png). You can add up to 5 images
Browse Files...
Loading...
Loading...
{{{text}}}

Recommendations

{{record.Name}}
{{record.Name}}
{{#record.Author.length}} {{#record.Author}} {{record.Author}} {{/record.Author}} {{/record.Author.length}} {{^record.Author.length}} {{record.Author}} {{/record.Author.length}}
{{#record.Special_price}} {{record.Special_price}} {{record.Price}} {{/record.Special_price}} {{^record.Special_price}} {{record.Price}} {{/record.Special_price}}
{{^record.HasVariants}}
{{#record.Is_in_stock}}
{{/record.Is_in_stock}} {{^record.Is_in_stock}} Available Soon {{/record.Is_in_stock}}
{{/record.HasVariants}}
{{record.Short_description}}
Show more

Similar products

{{record.Name}}
{{record.Name}}
{{#record.Author.length}} {{#record.Author}} {{record.Author}} {{/record.Author}} {{/record.Author.length}} {{^record.Author.length}} {{record.Author}} {{/record.Author.length}}
{{#record.Special_price}} {{record.Special_price}} {{record.Price}} {{/record.Special_price}} {{^record.Special_price}} {{record.Price}} {{/record.Special_price}}
{{^record.HasVariants}}
{{#record.Is_in_stock}}
{{/record.Is_in_stock}} {{^record.Is_in_stock}} Available Soon {{/record.Is_in_stock}}
{{/record.HasVariants}}
{{record.Short_description}}
Show more

Author Products

{{record.Name}}
{{record.Name}}
{{#record.Author.length}} {{#record.Author}} {{record.Author}} {{/record.Author}} {{/record.Author.length}} {{^record.Author.length}} {{record.Author}} {{/record.Author.length}}
{{#record.Special_price}} {{record.Special_price}} {{record.Price}} {{/record.Special_price}} {{^record.Special_price}} {{record.Price}} {{/record.Special_price}}
{{^record.HasVariants}}
{{#record.Is_in_stock}}
{{/record.Is_in_stock}} {{^record.Is_in_stock}} Available Soon {{/record.Is_in_stock}}
{{/record.HasVariants}}
{{record.Short_description}}
Show more