Hiding Messages using Musical Notes : A Fuzzy Logic Approach

@inproceedings{Kumar2015HidingMU,
  title={Hiding Messages using Musical Notes : A Fuzzy Logic Approach},
  author={C. Sasi Kumar and Sandip Dutta and Soubhik Chakraborty},
  year={2015}
}
“Music can be used as a communicable language”. Musical symbols and musical notes have been used as codes and ciphers from early days. The art of encrypting messages using music is termed as Musical cryptography and it uses predefined set of notes and set of rules for composing musical pieces which in turn are musical cryptograms. Traditional algorithms applied to musical cryptography used simple substitution cipher which merely produced good musical sequences. To overcome this problem a fuzzy… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-2 of 2 extracted citations

A Substitution Cipher for Musical Cryptography

Norissa Lamaute, Alexa Piccoli, Li-Chiou Chen, Andreea Cotoranu
2016
View 6 Excerpts
Highly Influenced

Classification of melodic structures using fuzzified n-gram matching scores

2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) • 2016
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 26 references

Cryptography using a symmetric frequency-based encryption algorithm

J. W. Glatfelter, C. W. Raab
U.S. Patent No. 8, vol. 855, no. 303, • 2014
View 1 Excerpt

Insertion Method Using Music Notes

Y. Manimuthu
Innovare Journal of Engineering & Technology • 2014
View 2 Excerpts

Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices

J. D. Lee, H. J. Im, W. M. Kang, J. H. Park
Mathematical Problems in Engineering, • 2014
View 1 Excerpt

Using Raga as a Cryptographic Tool

S. Dutta, S. Chakraborty, N. C. Mahanti
Advances in Network Security and Applications, Communications in Computer and Information Science, vol. 196, CNSA • 2011
View 1 Excerpt

Similar Papers

Loading similar papers…