Author:
Krishnan Reman,Thomas Ryan,Akshay D. S.,Krishna Varsha Sunil,Divya R. S.
Reference15 articles.
1. Sams E (1979) Musical cryptography. Cryptologia 3(4):193–201
2. Dutta S, Kumar C, Chakraborty S (2013) A symmetric key algorithm for cryptography using music. Int J Eng Technol 5(3):3109–3115
3. Dutta S, Kumar C, Chakraborty S (2010) A novel method for hiding message using musical notes. Int J Comput Appl 1(16):76–79
4. Kumar C, Dutta S, Chakraborty S (2014) Musical cryptography using genetic algorithm. In: 2014 International conference on circuits, power and computing technologies. IEEE, pp 1742–1747
5. Yamuna M, Sankar A, Ravichandran S, Harish V (2013) Encryption of a binary string using music notes and graph theory. Int J Eng Technol 5(3):2920–2925
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献