Academic Paper from the year 2020 in the subject Musicology - Systematic
musicology, course: IMSc Mathematics and Computing, language: English,
abstract: With an onset of electronic commerce and portable devices for
communication, cryptology has become an exceedingly important science in
the present day. The diversity of applications in which
crypto-algorithms have to operate have increased and hence the
requirement for the efficient algorithms have grown. Confidential
information of a government or private agency or department is secured
through the use of Cryptography. Musical properties, for example, notes
of which the music is made are not consistent and shift from one
arrangement to another. Same tune played by various composers shows a
variety in the succession of notes utilized along with different
qualities of a musical organization, for example, term of each note and
the recurrence at which each note is played. Such a variety can be
utilized to encode the message. In this work, we have joined the
utilization of Hindustani (North Indian) melodic notes to encode
messages and used this method on three ragas to test the robustness of
the algorithm with different input size. We have utilized a semi-natural
composition procedure to produce note successions of Indian music which
would then be able to be utilized as a device for message stowing away.
This from the outset place guarantees that the message is avoided the
interloper and second it gives another irregular arrangement of notes
each time same message is sent. So the very motivation behind a
Cryptographic calculation is served. The scrambled message as melodic
notes is at that point sent to the planned beneficiary as a melodic
structure which helps in opposing the gatecrasher of detecting any
classified data that is being sent over the correspondence channel.