A System for Automatic Audio Harmonization (Ein System für automatische Audio-Harmonisierung)
نویسندگان
چکیده
A rule-based system for automatic melody harmonization is presented. It models the cognitive process a human arranger undergoes when confronted with the same task, namely: segmenting the melody into phrases, tagging melody notes with harmonic functions, establishing a palette of possible chords for each note, and finding the most agreeable voicing through these chords. The system is designed to be embedded in an audio framework, which synthesizes a four-voiced audio output using pitch-shifting techniques. Principles of classical counterpoint as well as common voice-leading conventions are utilized by the system. We shall outline the various phases of computation, describe the rules applied in each phase, and present perspectives regarding the stylistic flexibility suggested by the system's design.
منابع مشابه
Adaptive Harmonization and Pitch Correction of Polyphonic Audio Using Spectral Clustering
There are several well known harmonization and pitch correction techniques that can be applied to monophonic sound sources. They are based on automatic pitch detection and frequency shifting without time stretching. In many applications it is desired to apply such effects on the dominant melodic instrument of a polyphonic audio mixture. However, applying them directly to the mixture results in ...
متن کاملView harmonization in software processes: from the idea to quase
Qualitätssicherung in Software Prozessen setzt voraus, dass die Beteiligten ein gleiches Verständnis der zu erfüllenden Anforderungen haben. Ein zentraler Aspekt des Quality-Aware Software Engineering (QuASE) ist daher die Harmonisierung von Stakeholder-Sichten bei der Systementwicklung. Das Papier zeigt auf, wie von der ersten Idee zur Unterstützung des wechselseitigen Verstehens von Qualitäts...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملHerausforderungen an ein durchgängiges Variantenmanagement in Software-Produktlinien und die daraus resultierende Entwicklungsprozessadaption
In der Automobilindustrie werden Kundenwünsche zunehmend mittels Elektrik/Elektronik-Komponenten und zugehöriger Software realisiert. Dies führt in der fortlaufenden Entwicklung zu einer steigenden Komplexität und Variabilität der Software. Software-Produktlinien (SPL) beschreiben eine Methodik, um solch variantenreiche Softwaresysteme zu beherrschen. Ein durchgängiges Variantenmanagement betri...
متن کامل