A Novel Method of Hiding Message Using Musical Notes

نویسندگان

  • Sandip Dutta
  • Soubhik Chakraborty
چکیده

Security has become an important topic for communication systems. It is a big challenge to provide secure communication in this unique network environment. We propose a novel approach to encrypt a message using musical notes and these musical notes have to be sent by the sender to the receiver. The receiver after receiving the musical notes decrypts it and gets back the original message.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Symmetric Key Algorithm for Cryptography using Music

Music and its attributes have been used in cryptography from early days. Today music is vastly used in information hiding with the use of Steganography techniques. This paper proposes an alternative to steganography by designing an algorithm for the encryption of text message into music and its attributes. The proposed algorithm converts the plain text message into a musical piece by replacing ...

متن کامل

Hiding Messages using Musical Notes: A Fuzzy Logic Approach

“Music can be used as a communicable language”. Musical symbols and musical notes have been used as codes and ciphers from early days. The art of encrypting messages using music is termed as Musical cryptography and it uses predefined set of notes and set of rules for composing musical pieces which in turn are musical cryptograms. Traditional algorithms applied to musical cryptography used simp...

متن کامل

مطالعه درجات اصلی گام موسیقی ایرانی از روی طیف نتهای گام

  In this paper we have extracted the notes of Iranian scale from the traditional music played by the great musician Shahnazi on the TAR. Then, by analyzing the spectrum of the notes and by using our special averaging we have found the pitch attributed to the components’ frequency and found the interval between the notes. The results are in comple agreement with Pythagorean scale. Pitch is a su...

متن کامل

A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units

Many sophisticated schemes are springing up recently with better characteristics, such as higher capacity and better security. However, if we tune the size of the secret message progressively, most methods do not provide the progressive quality characteristic which means that the relationship between the quality of stego image and the size of the secret message could be represented by a smooth ...

متن کامل

A Novel Technique for Data Hiding in Audio by Using DWTS

A secure data transfer is limited due to its attack made on data communication internet community. Audio data hiding can be used anytime you want to hide data. There are many reasons to hide data but most important is to prevent unauthorized persons from becoming aware of the existence of a message. Hidden message is information that is not immediately noticeable, and that must be discovered or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010