Authentication of Musical Compositions with Techniques from Information Theory. Benjamin S. Richards. 1. Introduction

Similar documents
Automatic Rhythmic Notation from Single Voice Audio Sources

PRESCOTT UNIFIED SCHOOL DISTRICT District Instructional Guide January 2016

2nd Grade Music Music

MAKING (COMPOSING) Throughout this term, you have been developing music writing/creating skills, using rhythm. You are to create an 8-bar melody.

My Pentatonic Composition Project

3rd Grade Music Music

Leaving Certificate 2017: Music Marking Scheme Composing Higher level - Core. SECTION A MELODY COMPOSITION (40 marks) Q Descriptors Mark

2011 Music Performance GA 3: Aural and written examination

BAND Grade 7. NOTE: Throughout this document, learning target types are identified as knowledge ( K ), reasoning ( R ), skill ( S ), or product ( P ).

K-12 Performing Arts - Music Standards Lincoln Community School Sources: ArtsEdge - National Standards for Arts Education

NETFLIX MOVIE RATING ANALYSIS

Building a Better Bach with Markov Chains

AP Music Theory Syllabus

A-LEVEL Music. MUS2A Mark scheme June Version 1.0: Final Mark Scheme

Middle School Vocal Music

Grade 5 General Music

Curriculum Standard One: The student will listen to and analyze music critically, using the vocabulary and language of music.

Module # 4 Musical analysis and contemporary music Designer : Anthony Girard

Honors Music Theory South Carroll High School : Fall Semester

CHOIR Grade 6. Benchmark 4: Students sing music written in two and three parts.

Essentials Skills for Music 1 st Quarter

2014 Music Performance GA 3: Aural and written examination

Music Morph. Have you ever listened to the main theme of a movie? The main theme always has a

Years 7 and 8 standard elaborations Australian Curriculum: Music

Composer Style Attribution

II. Prerequisites: Ability to play a band instrument, access to a working instrument

AP Statistics Sec 5.1: An Exercise in Sampling: The Corn Field

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

Study Guide. Solutions to Selected Exercises. Foundations of Music and Musicianship with CD-ROM. 2nd Edition. David Damschroder

Advanced Placement Music Theory

about Notation Basics Linus Metzler L i m e n e t L i n u s M e t z l e r W a t t s t r a s s e F r e i d o r f

PERFORMING ARTS Curriculum Framework K - 12

Syllabus MUS 393: Piano performance major

Predicting the Importance of Current Papers

West Linn-Wilsonville School District Primary (Grades K-5) Music Curriculum. Curriculum Foundations

Application of Measurement Instrumentation (1)

School District of Palm Beach County COURSE DESCRIPTION - GRADES 6-8

GCSE Music Composing Music Report on the Examination June Version: v1.0

GROWING VOICE COMPETITION SPOTLIGHTS URGENCY OF IP TRANSITION By Patrick Brogan, Vice President of Industry Analysis

4th Grade Music Music

Chapter 40: MIDI Tool

Music. Last Updated: May 28, 2015, 11:49 am NORTH CAROLINA ESSENTIAL STANDARDS

Sample assessment task. Task details. Content description. Year level 9

in the Howard County Public School System and Rocketship Education

Standard 1 PERFORMING MUSIC: Singing alone and with others

Example the number 21 has the following pairs of squares and numbers that produce this sum.

TEST SUMMARY AND FRAMEWORK TEST SUMMARY

Northeast High School AP Music Theory Summer Work Answer Sheet

Content Area Course: Band Grade Level: Eighth Instrumental Music - Band

Jazz Melody Generation and Recognition

MUSIC: PAPER II. 2. All questions must be answered on the question paper. Do not answer any questions in an answer booklet.

PRESCOTT UNIFIED SCHOOL DISTRICT District Instructional Guide January 2016

SIMULATION OF PRODUCTION LINES THE IMPORTANCE OF BREAKDOWN STATISTICS AND THE EFFECT OF MACHINE POSITION

An Integrated Music Chromaticism Model

OGEHR Festival 2019 Peace by Piece. Rehearsal Notes: Copper A Repertoire

Minnesota Academic Standards

CHAPTER CHAPTER CHAPTER CHAPTER CHAPTER CHAPTER CHAPTER CHAPTER CHAPTER 9...

National Code of Best Practice. in Editorial Discretion and Peer Review for South African Scholarly Journals

Students who elect to take a music class at the middle school level know and are able to do everything required in earlier grades and:

Fractions of time: Musical notes. J. Farnham

Concert Band and Wind Ensemble

Curriculum Standard One: The student will listen to and analyze music critically, using the vocabulary and language of music.

General Music. The following General Music performance objectives are integrated throughout the entire course: MUSIC SKILLS

Grade HS Band (1) Basic

Choral Sight-Singing Practices: Revisiting a Web-Based Survey

Grade One General Music

Algorithmic Composition: The Music of Mathematics

GCSE Dance. Unit Choreography Report on the Examination June G13. Version: 1

Take a Break, Bach! Let Machine Learning Harmonize That Chorale For You. Chris Lewis Stanford University

AP Music Theory Syllabus

Curriculum Standard One: The student will listen to and analyze music critically, using the vocabulary and language of music.

2014 YEAR 10/11 MUSIC SEMESTER 2

A-LEVEL DANCE. DANC3 Dance Appreciation: Content and Context Mark scheme June Version/Stage: 1.0 Final

1/ 19 2/17 3/23 4/23 5/18 Total/100. Please do not write in the spaces above.

MMS 8th Grade General Music Curriculum

In all creative work melody writing, harmonising a bass part, adding a melody to a given bass part the simplest answers tend to be the best answers.

Stratford School Academy Schemes of Work

A probabilistic approach to determining bass voice leading in melodic harmonisation

APPENDIX A: ERRATA TO SCORES OF THE PLAYER PIANO STUDIES

Third Grade Music Curriculum

Music Curriculum Kindergarten

CHAPTER ONE TWO-PART COUNTERPOINT IN FIRST SPECIES (1:1)

MUSIC PERFORMANCE: GROUP

Widmer et al.: YQX Plays Chopin 12/03/2012. Contents. IntroducAon Expressive Music Performance How YQX Works Results

NAA ENHANCING THE QUALITY OF MARKING PROJECT: THE EFFECT OF SAMPLE SIZE ON INCREASED PRECISION IN DETECTING ERRANT MARKING

Let s Play Music 3-Year Overview Scope and Sequence

Strand 1: Music Literacy

How to Read Music. 1. What is a beat? a. When thinking about a beat, think about your i. What three words describe a beat?

C A R I B B E A N E X A M I N A T I O N S C O U N C I L REPORT ON CANDIDATES WORK IN THE CARIBBEAN SECONDARY EDUCATION CERTIFICATE EXAMINATION

AP Statistics Sampling. Sampling Exercise (adapted from a document from the NCSSM Leadership Institute, July 2000).

INSTRUMENTAL MUSIC SKILLS

Drunken Sailor The Melody

Grade Five. MyMusicTheory.com PREVIEW. Music Theory Extra Resources. Cadences Transposition Composition Score-reading.

Visual Arts, Music, Dance, and Theater Personal Curriculum

The Keyboard. Introduction to J9soundadvice KS3 Introduction to the Keyboard. Relevant KS3 Level descriptors; Tasks.

Grade 4 General Music

(Refer Slide Time 1:58)

Course Report Level National 5

Course Overview. Assessments What are the essential elements and. aptitude and aural acuity? meaning and expression in music?

SAMPLE LESSON BUY EBOOK NOW. Learn to Read Music! Buy Ebook NOW 1

Transcription:

Authentication of Musical Compositions with Techniques from Information Theory. Benjamin S. Richards Abstract It is an oft-quoted fact that there is much in common between the fields of music and mathematics. This paper seeks to examine that commonality through the use of information theory techniques, specifically, entropy as defined by Shannon. The analysis will be presented in the form of an authentication problem with an entropy table being constructed and presented for a specific composer. Time allowing, zero, first, and second order typical models will be presented as well. 1. Introduction One of the most fascinating aspects of mathematics is its ability to describe so many different models all with the same basic machinery or techniques. In this vein of thinking I sought to further explore the application of this machinery to models from fields that have not commonly or rhetorically been thought of as scientific models from the fine arts. Given my own personal background in ballet, the original choices for this analysis were actually going to be the works of a choreographer. The mathematical approach was to be a statistical analysis yielding a probability distribution for each step (in the sense of a dance step) used in the ballet, and that would allow a rudimentary authentication of the choreographer s work to be approached. Choreography was soon abandoned in favor of musical compositions. The reason for this was the lack of well-defined discrete steps in any given piece of choreography. Though a reasonable argument could be made that choreography, particularly in the classical genre, is indeed composed of a finite number of discrete steps, the real problem lies in the breakdown of the larger work into these discrete steps. Such a process would be largely subjective and would introduce a considerable margin of error into the analysis. Thus musical compositions were chosen because they are readily available as scores consisting of a finite number of clearly defined components that is, music notes. At the same time musical compositions were adopted to be the raw material for analysis, stronger, and more specific mathematical techniques were adopted as well. Entropy, as defined by Shannon in The Mathematical Theory of Communication, has already been used to great effect in authentication problems where works of literature were the subject of examination. It became clear at that point that the task at hand was to understand the relevant machinery of information theory and entropy, and then to adapt the method as needed to work with musical compositions. The definition of entropy is 2. Entropy

( ) =! p(x)log p(x) x"# H X $ (1.1) where X is a discrete random variable taking on values from the set! which depends on the information source being analyzed. For the purposes of this analysis, the elements of the set! are all the musical notes used by a given composer in any of his compositions. If the analysis were to be one regarding the works of a famous literary author, the corresponding set would likely consist of all the words used by that author in his or her writings. The logarithm is base 2, which is important as it produces an entropy value with units of bits. This turns out to be a particularly useful because much of the work of information theory and entropy is relevant to the efficiency of coding schemes. There are many properties that arise from the manipulation of this definition that will not be treated here, but can be found in Cover and Thomas. In the interest of adding an intuitive definition to the one above, we may think of entropy as the average number of yes or no questions needed to match a given X i with an element from a set!. This is a somewhat weak definition as it is important to note that the scheme for asking yes or no questions must be the most efficient possible scheme to provide H X ( ) as the actual average number of questions needed. In many cases the best possible scheme may not be known. Regardless, it is a useful definition for intuitive purposes. A particularly illuminating example is Shannon s finding of a value of 1.34 bits for the entropy of letters in the English language. What this means, is that the bare minimum amount of information needed to identify each letter in a string of English text is 1.34 bits. Now this may seem counterintuitive because there are 26 letters in English and if we include the character space we have 27 symbols. It is quite obvious that any single symbol taken at random cannot definitely be identified by 2 yes or no questions, or 2 bits of information, much less 1.34 bits of information. Entropy though doesn t describe the uncertainty in a single independent symbol. It describes the uncertainty in the whole sample space in which the symbols occur, in this case, English. The entropy of English is as low as it is because the probability of a great many sequences of letters is zero. Likewise some letters are followed by all but one symbol with very low probability, q being a prime example as it is overwhelmingly followed by u. That knowledge is due to the structure of English and so on average it takes less than 1.34 bits to identify the symbol following a q. Also, after the first few letters of many words have been identified, the rest of the word can be guessed easily, again with much less information than 1.34 bits per symbol. As Cover and Thomas point out,... a large number of guesses will usually be needed at the beginning of words or sentences. but that shouldn t be surprising considering those symbols are much more independent than are the symbols following them. Thus we may think of entropy as the average number of bits needed to identify a symbol that occurs with known probabilities and transition probabilities. Back to the task of authentication, entropy is calculated with respect to a relevant table of probabilities, an entropy table. Continuing with the well-studied example of English, the corresponding entropy table is a table of probabilities of the occurrences of letters or strings of letters or words depending on the preference and rigor of the experimenter creating the table. With a complete table in hand, equation 1.1 can be computed directly to attain the entropy of English based on that given entropy table. Now that there is a known value for entropy, a sample of text of uncertain language can be

analyzed. Using the same entropy table, the uncertain text will be processed, either from a sampling or completely depending on its size, and the two values for entropy shall be compared as a ratio as shown in equation 1.2 with output u being the uncertainty. H x (Y ) H x (X) = u (1.2) A value of one would indicate a perfect match meaning the random variabley representing elements of the sample in question required the same number of bits on average to match eachy i with an element from the set! as the random variable X representing the initial known sampling. A value higher or lower than one would indicate inconsistency in the entropies of the two variables and we would then need to examine the error margin associated with the sampling methods used to create the know sample space. If the error margin were large enough, that could account for a value other than one for two variables that did indeed have the same entropy with respect to the distribution of x. Thus finally, we will be able to say whether or not the entropy of the sample in question is the same as that of the known sampling within the associated margin of error. 3. The Musical Compositions The first task regarding music was the selection of a composer. Some considerations had to be taken into account when identifying a composer with a plausible sampling of work. First and foremost, the composer must have a large number of works that are known to be their own. Without this stipulation, there would be no way to take a sampling large enough to discern the typical elements of that composer s work, thus an entropy from a small sampling would carry with it an uncertainty too large to be of much interest. Secondly, we would ideally find a composer who had at least one or two works which were contested regarding their authorship. Third and finally we would hope for a composer of piano music or solo pieces for other instruments. The reason for this is again to provide a stronger entropy measure from the sampling. As more instruments are added to a score, the number of elements in! increase substantially. This is because when one instrument is being played, fewer notes can be played in any time step. As more instruments are added many more combinations of notes can be played at any given time step. The problem caused by this is that it is much more likely that no single set of notes played within a time step will be repeated. We could of course choose to analyze only one instrument, but it is much more likely that the stylistic elements that make a composer unique are not broken up neatly into their treatment of each instrument but rather can be found in the instruments interactions and the melodic structure. Under that assumption we could of course try to follow only the melody of a score, but there would be instances in which that could in fact be a tall order. A prime example of this would be canonical structure in which multiple instruments all play the melody but are displaced in their timing much like the singing of Row Row Row Your Boat in a round where each singer starts the song after the first measure has passed. Thus we would prefer, at least in our first analysis, to tackle a set of composition with a small number of instruments. Consultation with a professor of music theory provided one such composer who fit the rather difficult requirement of being known for having several compositions

wrongly attributed to him. The composer, Giovanni Battista Pergolesi, would thus have fulfilled our second requirement. However, Pergolesi died a young man and thus didn t leave nearly enough musical compositions to construct a sample space of decent size. Chopin became the next choice, and also the one whose compositions were finally chosen. Again, like Pergolesi, Chopin did not meet all three criteria, but he did meet the first and third, lacking only in that his authorship is fairly certain in the musical world. Ninety-three pages of Chopin s Nocturnes for piano make up the initial sample space with which I am now working. I am furthermore analyzing only the right hand or treble clef of each stave considering it is the one that generally plays the melody. I chose to begin this way as a means of simplifying the number of note combinations that would need to be recorded. The scheme for choosing notes at random is to chose a page at random, then a stave from that page, a measure from that stave, and a note from that measure, also all at random. All of this is done with a table of random numbers produced by random.org. In this analysis a note can be either a single tone with a corresponding length of time, or a chord with several tones and time values. The important factor in determining a note is where it begins. For instance a chord consisting of three tones, two held for a beat and one for two beats would be recorded as such if all three tones commence on the same beat. If however a chord with three tones were to begin with one tone and then have the other two added on a subsequent beat, they would be considered two different notes because they commenced at two different times. This of course is not musical theory or even notational custom; I merely needed to choose a method for handling such instances to be used systematically throughout the analysis. As I mentioned it was not only the tone of notes that was recorded but also the length. Originally I had planned on recording whether each note was a whole, half, quarter, sixteenth note, et cetera. However, given that each of those notes would be held for different numbers of beats depending on the time signature of the music, I chose instead to record the number of beats each tone was held. Carrying out the recording of these notes is now the task at hand with regard to this research. It is indeed a slow and tedious process to be done by hand and eye but already some notes have revealed themselves more regularly than others. 4. Current and Future Steps Currently I am in the process of creating the entropy table from Chopin s Nocturnes. Until this step is completed there will be little other forward progress that can be made. After it s completion there are some interesting further analyses that could be made. The original intent of this research is to use entropy as a means to discern probable authorship of a musical work. The process could also be used to give a rough date for compositions that have not been properly dated. For such a project the method would be adapted to take advantage of the fact that many composers, particularly those that were long lived, went through stylistically distinctive musical phases in their careers. The task then would be to create an entropy table for each period and then compare the undated work with each table to find the closest match. Such and adaptation will not be attempted here due to time constraints, but it regardless, a decent example of another way in which these entropy techniques may be utilized.

References [1] Cover, Thomas M. and Thomas, Joy A. Elements of Information Theory. 2 nd Edition. Hoboken, New Jersey, John Wiley and Sons, 2006. [2] Shannon, Claude E. and Weaver, Warren. The Mathematical Theory of Communication. Urbana, Chicago, London, University of Illinois Press, 1949. [3] Ross, Sheldon. A First Course in Probability. 6 th Edition. Upper Saddle River, New Jersey, Prentice-Hall, 2002.