A Novel Method of Hiding Message Using Musical Notes

  title={A Novel Method of Hiding Message Using Musical Notes},
  author={Sandip Dutta and S. Chakraborty and N. Mahanti},
  journal={International Journal of Computer Applications},
Security has become an important topic for communication systems. It is a big challenge to provide secure communication in this unique network environment. We propose a novel approach to encrypt a message using musical notes and these musical notes have to be sent by the sender to the receiver. The receiver after receiving the musical notes decrypts it and gets back the original message. 
A Symmetric Key Algorithm for Cryptography using Music
The proposed algorithm converts the plain text message into a musical piece by replacing the text characters of the message by mathematically generated musical notes. Expand
Hiding Messages using Musical Notes: A Fuzzy Logic Approach
“Music can be used as a communicable language”. Musical symbols and musical notes have been used as codes and ciphers from early days. The art of encrypting messages using music is termed as MusicalExpand
Musical Cryptography Using Multiple Note Substitution Algorithm
Music and its attributes have been used in cryptography from early days. Musical symbols and musical notes have been used as substitution cipher. The algorithms applied to musical cryptography useExpand
A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm
This paper proposes adding a new security level to the TTIE algorithm called the Diffie Hellman Text-to-Image Encryption algorithm (DHTTIE), and tests and analyses the proposed algorithm. Expand
Genetic Algorithm Based Cryptographic Approach Using Karnatic Music
Music and its attributes have been used in different area of world. Music can be used as a language communicable. Music notes have been used in the field of stenography and cryptography in earlyExpand
A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
A novel method for data encryption based on the transformation of a text message into a barcode image is proposed and tested and the proposed Bar Code Encryption Algorithm (BCEA) is tested and analyzed. Expand
A Hybrid Polybius-Playfair Music Cipher
A hybrid Polybius and Playfair cipher is proposed which encodes the message into sequence of musical notes and enhances the security of the encrypted message over the simple substitution technique. Expand
Musical cryptography using genetic algorithm
A genetic algorithm (GA) based symmetric key musical cryptography algorithm is proposed to obtain an optimal sequence of musical patterns as a cipher message and the application of genetic algorithm for producing cryptic message doesn't only hide the message as musical piece but also reduces the chance of cipher message to be detected as cipher. Expand
Music Cryptography based on Carnatic Music
Music and cryptography have been linked to one another since ancient times. The idea of replacing plaintext letters with music notes and sending the music file to receiver, is not new. But suchExpand
Mining actionable combined patterns of high utility and frequency
  • Jingyu Shao, Junfu Yin, Wei Liu, L. Cao
  • Computer Science
  • 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA)
  • 2015
A new framework for mining actionable high utility association rules, called Combined Utility-Association Rules (CUAR), which aims to find high utility and strong association of itemset combinations incorporating item/itemset relations. Expand


Using voice to generate cryptographic keys
The goal of this work is to enable a device to generate a key upon its user speaking a chosen password (or passphrase) to it, so an attacker who captures the device and extracts all information it contains should be unable to determine this key. Expand
Network Security Using Biometric and Cryptography
A biometrics-based(fingerprint)Encryption / Decryption Scheme, in which unique key is generated using partial portion of combined sender's and receiver's fingerprints, which is used as an asymmetric key for both Encryption and Decryption. Expand
In the last decade of computer security, using biometrics for various types of security problems becomes more and more popular. The uniqueness of biometrics for any specific humanbeing makes theExpand
Cryptography education for students
  • M. Sakalli, E. Bulus, F. Buyuksaracoglu
  • Computer Science
  • Information Technology Based Proceedings of the FIfth International Conference onHigher Education and Training, 2004. ITHET 2004.
  • 2004
This work describes mathematical concepts using cryptography to make students more enthusiastic about mathematics, computer science and electronics where security is involved to develop enthusiasm for these departments. Expand
On why an algorithmic time complexity measure can be system invariant rather than system independent
It is argued that it suffices for an algorithmic time complexity measure to be system invariant rather than system independent (which means predicting from the desk) instead of being system independent. Expand
Design and Modeling for Computer Experiments
This book discusses models for computer experiments, design techniques, and some concepts in Experimental Design Computer Experiments. Expand
Analyzing the Melodic Structure of a North Indian Raga: a Statistical Approach
  • Electronic Musicological Review
  • 2009
Analyzing the Melodic Structure of a North Indian Raga: a Statistical Approach, Electronic Musicological
  • Review, vol. XII,
  • 2009
Review of [9] published in Computing Reviews
  • Review of [9] published in Computing Reviews
  • 2008