Updatedpaper
Updatedpaper
net/publication/346049815
CITATIONS READS
0 1,725
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Anurag Sinha on 21 November 2020.
ABSTRACT- The craft of scrambling messages of data they stow away. The message to be communicated is
utilizing music is named as Musical cryptography and it commonly called as plain instant message. Cryptography is
utilizes predefined set of notes and set of rules for making the specialty of changing the content or information into a
melodic pieces which thus are melodic cryptograms. coded plan or some other encoded structure.
Traditional methodologies applied to melodic
cryptography utilized basic replacement figure which A cryptographic methodology is trailed by two calculation:
produces melodic arrangements. - Music and its encryption Algorithm for encoding the information into
trademark have been utilized in various region of world. progressive coded design and an unscrambling calculation
Music can be utilized as a language of correspondence. which remodels the coded message into its certified
Music notes have been utilized in the field of transcription message. The center objective of cryptography approach is
and cryptography in early days. A part of information is to apply changes to the plain content and with the end goal
covered up inside a melodic note and ships off the that the message not, at this point remain behinds usable to
objective. Melodic images and melodic notes have been an interloper without applying the nullify change.
utilized as the replacement figure. The fundamental
objective of the melodic cryptography is to produce Cryptography known to be is the investigation of techniques
distinctive melodic cryptograms. Any melodic note for sending messages in jugglery structure so just the
comprises of seven fundamental keys. Our ordinary Indian planned beneficiaries can peruse the message. The message
music is made of the seven keys Sa, Re, Ga, Ma, Pa, Dha, we need to send is known as the plaintext and the disguised
Ni. The western music notes depend on the seven keys C, message is known as the code text. Maintaining privacy and
D, E, F, G, A, B. Utilizing these notes as the fundamental covering messages have picked up essentialness directly
notes, music is created. Utilization of music notes in from the earliest starting point of progress. As and when a
encoding any message isn't in wide use. In this paper we picky strategy for encryption becomes well known, the risk
propose a strategy for encryption of any instant message of cryptanalysis increments and consequently new
utilizing the Indian and western music notes. procedure should be imagined or distinguished to give the
expectation.
Keywords— Musical Cryptography,indian ragas,
Contingent upon the key used to encode and unscramble the
music sheet cipher, guitar chords encryption, code calculations are delegated symmetric key and lopsided
genetic algorithm key calculations. Symmetric key calculations utilize the
indistinguishable key for encryption and unscrambling
measure. Awry Key calculation utilizes generally unique
1.INTRODUCTION key for encryption and unscrambling. Symmetric Key is
otherwise called private key cryptography a mystery key is
In this period of innovation, with the utilization of Internet being have similar feeling upon previous exchange of
and its different advances our customary correspondence messages, contingent upon the key the sender side
has been changed into computerized correspondence. In this scrambles the message and beneficiary side decodes the
computerized period, keeping message mystery is a message. In this paper, Musical cryptography ideas convert
fundamental issue to be tended to. To manage with this test the plain instant message into melodic notes or melodic
cryptography is utilized in data security. The messages images. In melodic cryptography music and its credits to
rather data to be sent to target by and large we individuals encode the plain content into its comparing figure text. The
utilize explicit language for the transmission. Their code messages can be emblematic, verbal or instrumental
objective is any individual who doesn't perceive the snippet notes.
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
analytic service [19]. Earliest forms of music cryptography
2. RELATED WORK made use of the straightforward technique of replacing
characters of the plaintext with musical symbols. Edward
Musical notes and the alphabet are together tools for Elgar, a notable composer wrote a letter to Miss Dora Penny
communication. Music uses 12 tones, while the English in encrypted form which is famous as “Dorabella” Cipher
alphabet uses 26 letters. Numerous mappings of music notes [6]. Bach, another musician regularly employed the natural
to the alphabet can alleviate the encryption plaintext into order number alphabet (A=1 to Z=24) in his work.
music cipher text. Musical symbols have been used in
cryptography from the earliest times. As a subject of fact, a Considerable quantity of effort has been done in the pasture
number of cryptologists were also famous musicians. of music cryptography in recent years too. [4] proposed a
Faber, Haydn, Bach, Schumann are examples of composers scheme to encrypt plaintext characters encompasses
who embedded “cipher themes” in their work. For these English letters as well as digits 0-9 by arbitrarily assigning
artists, musical masterpiece with cipher techniques was a every plaintext character to a number between 12 and 23,
mere method to raise the value of their work. While the which in turn represent 36 different music notes.[5]
cryptographic value of their efforts was somewhat limited, described a method that took 12 notes and 6 octaves,
their practice derives from awareness that music and generating 72 music notes which can be used to reinstate
semantics have commonalities. plaintext characters. This process made use of a conversion
table and note transition algorithm in order to denote the
The idea of replacing plaintext characters with musical mapping of plaintext characters to music notes. A method to
notes may engage musical notes in the form of visual encrypt binary strings using concepts of graph theory and
succession (musical symbols/notations), vocal or propagating cipher block chaining (PCBC) mode of
instrumental music. The present paper is mainly concerned encryption was discussed by [23]. Each string of three bits
with plain text characters encrypted as sequence of musical was mapped to a music note. One such 3-bit combinations
notes from an instrument. The challenging part in designing corresponds to a pause/blank in the music clip. In [16], a
a music cryptographic method is to come up with an method that used the concepts of magic-square and Polybius
suitable mapping of plain text characters to musical notes so cipher techniques was explained. A 6X6 magic square was
that the final musical series generated is a valid one. selected and all English letters and 0-9 digits were placed in
Strength of a musical sequence is decided based on how each of its cells. Each column and each row of this magic
pleasing and tuneful it sounds, to a listener. square was labelled with C,D,E,F,G,A. Each plaintext
character was thus replaced by its corresponding row
3. LITERATURE SURVEY column index in the magic square. Space character was
replaced by the music note B. Two more methods to encrypt
While the current studies in the area of combining music binary strings were discussed in [24]. in cooperation these
and cryptography is somewhat limited, more than a few methods considered two binary strings (one of which was
proposals [3,7,6] in musical cryptography have involved the plaintext string to be encrypted) and interleave one of
symmetric key encryption, substitution ciphers, and them into the other at specific locations in order to generate
stenography . a third string. Groups of bits in that final string were
mapped to different music notes. [11] proposed a method of
Dutta et al. [3] proposed a symmetric key algorithm for music cryptography that made use of genesis rules and the
musical cryptography. The algorithm renovates plain text concept of raga in Indian classical music. It was based on
into a musical piece by substituting the text characters with replacing each plaintext character with a swara from a
mathematically generated musical notes. The sequence of specified raga depending on the probability of its occurrence
musical notes generated for a fastidious character in that raga. A method making use of a fuzzy logic was
progression of plain text apes a musical pattern. This explained in [13]. This made use of various constraints like
example is then send to the receiver as a music file. The melodic rules, harmonic rules, rhythm rule, etc in order to
beginning value for encryption and decryption key is sent generate multiple music clips corresponding to a text
using the RSA algorithm, where the key plots the letters message. After that, fuzzy rules were applied and the music
equivalent to a musical note. Their encryption key used is an clip with best possible musical succession was selected and
n x n matrix and it will be generated using the seed value for converted to a MIDI file before sending to the receiver. In
the key. [12], a combination of Play air cipher and Polybius cipher
techniques was used for encryption. Initially plaintext was
History says that many of the cryptologists have been good encrypted using Play air cipher. The encrypted message was
musicians. Also, prominent composers like Schumann, re-encrypted using Polybius cipher. A variation algorithm
Michael Haydn, Elgar and Tartini were known to be was used to produce the key matrix which was used to map
interested in cryptography. In fact, the grounds of music and the text characters to parallel music notes.[14] proposed an
cryptography have positive correlation. The connection was encryption method that generated a cipher key which put up
also known to and used by the British wartime crypto- with the principles of music theory. Dissonance and uneven
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
beats were shun by creating a key that stayed in one key
signature in the context of a single major level.
4. MUSIC THEORY
Scale
Rhythm
5. PROPOSED APPROACH
There are a few significant types of basic rhythms that we
mention in our study. Each character in the simple 5.1 In this section we provide a brief introduction to Indian
replacement cipher will get one full beat of the measure or music notation and keyboard notation.[20]
bar. Beat division is a major way of differentiating notes.
There are innumerable ways to divide a single beat, but Keyboard notation
most of it can be explained through fraction.
Musical notation is the depiction of sound with symbols.
Chords Any music can be characterized using these symbols. The
fundamental notes in music are C, D, E, F, G, A and B. A
A chord is created by playing more than 2 notes pause in music is represented by -. The following
simultaneously. All chords build of a certain tonic will carry illustration signify the musical notation from C to B
the key mark of the tonic, unless otherwise notated with
inadvertent. An accidental is a sharp or level outside of the
key signature used inside the notation of the piece.
Circle of fifths
Figure – 3
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
Encryption method amalgamation like MAPA, NIDHA (Note hat these are not
used in the table). So designing the table is solely the
Here we propose a technique of encryption of any message selection of the encoder and decoder. This amplify the
using customary Indian music and keyboard illustration as a probable ways in which the table can be designed spaced
tool of encryption. out from the ( 36! )2 ways shown in the table 1.[20]
Table 1 is the main key for encryption of any message
In the proposed method we relate two levels of encryption.
containing a string of alphabets and numbers.
First we renovate a usual text into traditional Indian music
note using table 1. We then renovate the text into western Table: 2 Conversions to Western Musical Notes
music notes of a piano or a key board. While converting we
use 1 for space between same word and 0 for space between
two different words.
ILLUSTRATION
The message to be encoded is I LOVE MUSIC
After converting using table 1 we get S1 as
In table 1 we see that the first seven alphabets are allocated Word 1 REMA
the fundamental music notes Sa, Re, Ga, Ma, Pa, Dha, Ni.
The rest alphabets from H – Z and the numbers 0 – 9 are Word 2 PANI NIPA GADHA PA
assigned a conversion which is a grouping of the seven
Word 3 DHASA REPA GASA REMA GA
music notes. This can be designed as per the first choice of
the encoder and decoder. So that string S1 is S1 REMA PANI NIPA GADHA PA
For example the number 9 is assigned a conversion NINI in DHASA REPA GASA REMA GA (seperated by space).
table 1. But as an alternative we could disperse any other
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
S1 is again converted into keyboard notation S2 using table
Start decryption
2 as
S2 DF0GB1BG1EA1G0AC1DG1EC1DF1E
Note that here 0 correspond tos the freedom between words
Stop
and 1 space between letters in the same word to facilitate Step 1 From S2 obtain
encryption. Send DF0GB1BG1EA1G0AC1DG1EC1DF1E
to the receiver.
Suppose the received message is
AC1DG1EC1DF1E0FD1DG1DF1CA1G1F0AC1G
Obtain S1 using
We know that 0 represents the space between words. So we table 2.
recognize that there are three words in the note receive.
They are
Word 1 AC1DG1EC1DF1E Step 2 From S1
Word 2 FD1DG1DF1CA1G1F generate S
Word 3 AC1G
using
In each word 1 represents the space between letters. Using
table 1
table 2 we convert the words as
Word 1 DHASA REPA GASA REMA GA
Word 2 MARE REPA REMA SADHA PA MA
Word 3 DHASA PA
5.2 By Using Music Sheet Cipher
Now using table 1 the words are converted as
Source code
Word 1 MUSIC
dCode retains possession of the online 'Music Sheet Cipher'
Word 2 RUINED tool source code. Except explicit open source licence
Word 3 ME (indicated CC / Creative Commons / free), any algorithm,
applet or snippet (converter, solver, encryption / decryption,
So the decoded message is MUSIC RUINED ME. encoding / decoding, ciphering / deciphering, translator), or
any function (convert, solve, decrypt / encrypt, decipher /
Start cipher, decode / encode, translate) written in any informatic
language (PHP, Java, C#, Python, Javascript, Matlab, etc.).
encryption dCode is a toolkit website for decryption, ciphertexts,
cheating at letter games, solve riddles, treasure hunts, etc.
Step 1-convert s1 from Opened in 2009, the site has grown steadily and improved,
table 1 offering more and more tools and carried by its users, dCode
has become a public site, free and open to all.
Send S2 to the
receiver
Receiver
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
Figure 4- SYMBOLS FOR THE MUSIC SHEET <c>(A-Z0-90-9)</c> -LO4P
<c>(0-9A-Z0-9)</c> --ASB
How to encrypt using a music sheet? <c>(0-90-9A-Z)</c> Y-0E1
Encryption uses 14 notes and eighth notes, quarter notes, <c>(A-Za-z)</c> yLOeP
half note and whole note, this is 4*14=56 symbols + 3
extras. There are many ways to encode letters with these 59 <c>(A-MN-Za-mn-z)</c> xLNeO
symbo
<c>(a-mn-zA-MN-Z)</c> XlnEo
Example 1 : alphabet is composed of 14 eighth notes then
the first 12 quarter notes : do1 = A, re1 = B, ... si1 = G, do2
<c>(A=♪Ré=♪D)</c> 9-JEK
= H, until sol2 = N then quarter notes do1 = O, etc. until fa2
= Z.
5.3 Music Staff Notation
Example 2 : alphabet is composed of the first 13 eight notes
then the 13 first quarter notes. the reading is based on solfeggio. dCode can covert a staff
into notes by translating the most common 14 notes and
How to decrypt using a music sheet cipher? their variation sharp # and flat b.
The decryption of the Musical Sheet Cipher consists in the
replacement of the 59 symbols (notes) by the characters of a
defined alphabet. Example:DO C RE D MI E
FA F SOL G LA A
The ciphered message is composed of classical SI B
notes without musical value.
Why a1 and a2?
In order to transcribe the two level of notes, the first level
The notation used does not necessarily matter, no can be suffixed by 1 and the second by 2.
more than the instruments or actually produced
sound.
Why flat and sharp are not on the partition?
The sheet can be printed without a key or other dCode has taken the liberty to simplify the writing of dieses
important detail for a musician. and bemols, they are normally on the same level as their
following note.
Encryption
Music notes in alphabetical notation
Plain text - practice makes man perfect
C, D, E, F, G, A, B
ABCDEFGHIJKLM-NOPQRSTUVWXYZ- A# A1 A2 A2b
ABCDEFGHIJKLM-NOPQRSTUVWXYZ----
After converting this into an audio file, using step two listed
before, we can send this file in mp3 format.
Decrypting Texts
Receiving the audio file, the receiver can decrypt it
with an accessible key for the conversion.
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
Algorithm to encrypt messages into musical notes
introduces the concept of Musical Cryptography. It is a
:
STARTS ENCRYPTION traditional method being used to symbolize messages in the
form of musical cryptograms. In this paper a new algorithm
is being proposed for Encryption and Decryption rather than
using the traditional methods and algorithms.
First step: to assign a guitar chord
to each letter and symbol for each Encryption:
word in the text Since the Encrypted output would be a musical piece we
need set of notes. In this scheme a set of western notes are
being initialized and assigned to letters of plain text. Initial
Second step: to convert the population is being generated by assigning set of notes. This
assigned chords into sound or gives us the initial population for the genetic algorithm. All
audible format from texted format possible combinations of notes initialized along with
frequency values are are tested find which sequence
produces more natural music. A probability matrix is being
Third step: to convert back the generated based on the standard sequence. This matrix
audio file by sound recognizer would give us in sequence about what would be the
from audio to text format. probability of each note to occur after the previous note.
Along with the probability matrix we necessitate one more
table i.e the frequency table which contains detains about
the the frequency values for each note along with a serial
STOP number assigns to each note as a primary key. Fitness value
for each musical sequence is calculated based on the
probability matrix. One with the highest fitness is selected
as the encrypted output.Genesis rules are applied on it.
START Based on the rules we get the optimized output. This output
DECRYPTION is now in the form of musical notes. It is given to an note
generation algorithm which takes the Musical notes and
their corresponding frequency values as input. A sound
Receiving the audio file, the receiver can would be played which is the final output.
decrypt it with an available key for the
conversion. Decryption:
A tool to listen the sound and make out In decryption the sound generated is taken as an input and
which chord is played is required for this
procedure. based on the music the notes and their frequency values are
With sound recognizer the receiver retrieved from the database. The reverse process is applied
generates following: to obtain the actual message / Plain text.
C major- by back tracing table will get
alphabet A, similarly
Other techniques for Encryption: