CFP last date
20 December 2024
Reseach Article

A Novel Method of Hiding Message using Musical Notes

by Sandip Dutta, Soubhik Chakraborty, N.C.Mahanti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 16
Year of Publication: 2010
Authors: Sandip Dutta, Soubhik Chakraborty, N.C.Mahanti
10.5120/338-510

Sandip Dutta, Soubhik Chakraborty, N.C.Mahanti . A Novel Method of Hiding Message using Musical Notes. International Journal of Computer Applications. 1, 16 ( February 2010), 76-79. DOI=10.5120/338-510

@article{ 10.5120/338-510,
author = { Sandip Dutta, Soubhik Chakraborty, N.C.Mahanti },
title = { A Novel Method of Hiding Message using Musical Notes },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 16 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 76-79 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number16/338-510/ },
doi = { 10.5120/338-510 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:42:46.171843+05:30
%A Sandip Dutta
%A Soubhik Chakraborty
%A N.C.Mahanti
%T A Novel Method of Hiding Message using Musical Notes
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 16
%P 76-79
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security has become an important topic for communication systems. It is a big challenge to provide secure communication in this unique network environment. We propose a novel approach to encrypt a message using musical notes and these musical notes have to be sent by the sender to the receiver. The receiver after receiving the musical notes decrypts it and gets back the original message.

References
  1. M. Tolga Sakalli, Ercan Bulu$ and Fatma Buyuksaracoglu, "Cryptography Education for Students",0-7803-8596-9/04 IEEE, 2004
  2. Sandip Dutta, Avijit Kar, N.C.Mahanti and B.N. Chatterji, "Network Security Using Biometric and Cryptograpy ", ISBN 978-3-540-88457-6, Springer, 2008, P38-44
  3. Alper Kanak, Gebze Yüksek Teknoloji Enstitüsü, "Biometrics for computer security and cryptography",June 3rd, 2004
  4. F. Monrose, M. K. Reiter, Q. Li, S. Wetzel, "Using voice to generate cryptographic keys: A position paper", Proc. Of Odyssey 2001, The Speaer Verification Worshop, June 2001.
  5. Handbook of Applied Cryptography by Menezes, van Oorschot, and Vanstone and Applied Cryptography by Schneier.
  6. S. Chakraborty, K. Krishnapriya, Loveleen, S. Chauhan and S. S. Solanki, Analyzing the Melodic Structure of a North Indian Raga: a Statistical Approach, Electronic Musicological Review, vol. XII, 2009
  7. S. Chakraborty, S. K. Sourabh , On Why an Algorithmic Time Complexity Measure can be System Invariant rather than System Independent, Applied Math. and Compu, Vol. 190(1), 2007, p. 195-204
  8. S. Chakraborty, Review of the book Computational Complexity: A Conceptual Perspective (Ist Ed.) by O. Goldreich, Cambridge University Press, N. Y. 2008, published in Computing Reviews, April 27, 2009 (www.reviews.com)
  9. K. T. Fang, R. Li and A. Sudjianto, Design and Modeling of Computer Experiments, Chapman and Hall, 2006
  10. S. Chakraborty, Review of published in Computing Reviews, Feb 12, 2008 (www.reviews.com)
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Musical Notes