Advertisement

A new cipher system using semi-natural composition in Indian raga

  • Prashant Pranav
  • Soubhik ChakrabortyEmail author
  • Sandip Dutta
Methodologies and Application
  • 3 Downloads

Abstract

Cryptographic algorithms are the basic of care-free transactions over the Internet today. Confidential information of a government or private agency or department is secured through the use of Cryptography. From doing secure communication to transferring information of national importance, Cryptographic algorithms play the sole role in hiding the confidentiality. Musical attributes such as notes of which the music is composed are not constant and vary from composition to composition. Same tune played by different composers shows a variation in the sequence of notes used along with other attributes of a musical composition such as duration of each note and the frequency at which each note is played. Such a variation can be employed for the purpose of encrypting the message. In this paper, we have incorporated the use of Hindustani (North Indian) musical notes to encrypt messages. We have used a semi-natural composition process to generate note sequences of Indian music which can then be used as a tool for message hiding. This at first place ensures that the message is hidden from the intruder and second it gives a new random sequence of notes every time same message is sent. So the very purpose of a Cryptographic algorithm is served. The encrypted message in the form of musical notes is then sent to the intended recipient in the form of a musical composition which helps in defying the intruder of sensing any confidential information that is being sent over the communication channel.

Keywords

Cryptography Indian raga Semi-natural composition 

Notes

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. Chakraborty S, Solanki S, Roy S, Chauhan S, Tripathy S, Mahto K (2008) A statistical approach for modelling Indian classical music. Achieve of Cornell University e-Library. http://arxiv.org/abs/0809.3214
  2. Chakraborty S, Shukla R, Krishnapriya K, Loveleen Chauhan S, Kumari M, Solanki S (2009) A statistical analysis of a raga based song. Georgian Electron Sci J Musicol Cult Sci 2(4):21–33Google Scholar
  3. Chakraborty S, Kalita M, Kumari N (2011) Semi-natural composition: an experiment with north Indian ragas. Int J Comput Cognit 9(2):51–55Google Scholar
  4. Chakraborty S, Mazzola G, Tewari S, Patra M (2014) Computational musicology in Hindustani music. Springer, BerlinCrossRefzbMATHGoogle Scholar
  5. Dutta D (2006) Sangeet tattwa (pratham khanda), 5th edn (Bengali) Brati PrakashaniGoogle Scholar
  6. Dutta S, Chakraborty S, Mahanti N (2010) A novel method of hiding messages using musical notes. Int J Comput Appl 1(16):76–79Google Scholar
  7. Dutta S, Kumar C, Chakraborty S (2013) A symmetric key algorithm for cryptography using music. Int J Eng Technol 5(3):3109–3115Google Scholar
  8. Eck D, Schmidhuber J (2002) A first look at music composition using LSTM recurrent neural networks. Technical Report No. IDSIA-07-02Google Scholar
  9. Internet Growth Statistics. https://www.internetworldstats.com/emarketing.htm. Accessed 5 Mar 2019
  10. Kumar C, Dutta S, Chakraborty S (2014) Musical cryptography using genetic algorithm. In: Paper presented at the International conference on circuit, power and computing technologies (ICCPCT), pp 1742–1747Google Scholar
  11. Kumar C, Dutta S, Chakraborty S (2015a) A hybrid polybius–playfair music cipher. Int J Multimed Ubiquitous Eng 10(8):187–198CrossRefGoogle Scholar
  12. Kumar C, Dutta S, Chakraborty S (2015b) Hiding messages using musical notes: A fuzzy logic approach. Int J Sec Its Appl 9(1):237–248Google Scholar
  13. Shetty S, Achary K (2009) Raga mining of Indian music by extracting arohana–avrohana pattern. Int J Curr Trends Eng Technol 1(1):362–366Google Scholar
  14. Sinha P (2008) Artificial composition: an experiment on north Indian music. J New Music Res 37(3):221–232CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringBIT MesraRanchiIndia
  2. 2.Department of MathematicsBIT MesraRanchiIndia

Personalised recommendations