http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Hiding Messages using Musical Notes: A Fuzzy Logic Approach
Chandan Kumar,Sandip Dutta,Soubhik Chakraborty 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.1
“Music can be used as a communicable language”. Musical symbols and musical notes have been used as codes and ciphers from early days. The art of encrypting messages using music is termed as Musical cryptography and it uses predefined set of notes and set of rules for composing musical pieces which in turn are musical cryptograms. Traditional algorithms applied to musical cryptography used simple substitution cipher which merely produced good musical sequences. To overcome this problem a fuzzy logic based algorithm for musical cryptography is proposed in this paper. The paper proposes a symmetric key substitution cipher which uses one of the n candidate notes to encrypt a particular character. The application of fuzzy logic in musical cryptography produces acceptable musical sequences which are hard to be suspected as cipher.
A Hybrid Polybius-Playfair Music Cipher
Chandan Kumar,Sandip Dutta,Soubhik Chakraborty 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.8
Music has a versatile dimensionality; it can be used to express feelings, emotions and can also be used as a communicable language. Music and its attributes have been used in cryptography and steganography from a long time. Musical symbols and notes are used as replacement/substitution cipher. Using music as a cipher or cover media not only enhances the security of the message but also reduces its chance to be detected as an encoded or ciphered message. This paper proposes a hybrid Polybius and Playfair cipher which encodes the message into sequence of musical notes. The Playfair key matrix is generated using the Blum-Blum Shub generator. The bigrams of plain text message is first encrypted using Playfair cipher then individual character of the encrypted message is re-encrypted using Polybius cipher. The Playfair cipher enhances the security of the encrypted message over the simple substitution technique. The Polybius cipher then reduces the character set by appropriate number of symbols (here musical notes) for replacement. The basic 5X5 structure of key matrix in Polybius and Playfair is extended to 10X10 to hold the 95 prinTable characters of ASCII character set.
A Statistical Approach to Examine the Impact of Various Meteorological Parameters on Pan Evaporation
Pandey, Swati,Kumar, Manoj,Chakraborty, Soubhik,Mahanti, N.C. The Korean Statistical Society 2009 응용통계연구 Vol.22 No.3
Evaporation from surface water bodies is influenced by a number of meteorological parameters. The rate of evaporation is primarily controlled by incoming solar radiation, air and water temperature and wind speed and relative humidity. In the present study, influence of weekly meteorological variables such as air temperature, relative humidity, bright sunshine hours, wind speed, wind velocity, rainfall on rate of evaporation has been examined using 35 years(1971-2005) of meteorological data. Statistical analysis was carried out employing linear regression models. The developed regression models were tested for goodness of fit, multicollinearity along with normality test and constant variance test. These regression models were subsequently validated using the observed and predicted parameter estimates with the meteorological data of the year 2005. Further these models were checked with time order sequence of residual plots to identify the trend of the scatter plot and then new standardized regression models were developed using standardized equations. The highest significant positive correlation was observed between pan evaporation and maximum air temperature. Mean air temperature and wind velocity have highly significant influence on pan evaporation whereas minimum air temperature, relative humidity and wind direction have no such significant influence.