AI Solves Beatles Songwriting Dispute

The contested origins of The Beatles’ hits penned under the writing partnership of Paul McCartney and John Lennon could be put to bed by artificial intelligence (AI) software which can identify each artist’s musical influence.

US researchers from Harvard University trained a machine learning algorithm on hundreds of the Fab Four’s hits to build a “musical fingerprint” for each songwriter. It was then asked to assess eight iconic songs, or musical fragments, recorded between 1962 and 1966, where debate rages over who was the major influence.

This includes tracks like “A Hard Day’s Night” and “In My Life” which are credited to the “Lennon-McCartney partnership”, but are widely believed to be entirely written by one or the other of the pair.

The findings, published in Harvard Data Science Review, allow for each artist’s influences on the song to be assessed, and predicts the probability that either McCartney or Lennon were chiefly responsible. As recently as 2015, Sir Paul McCartney has vented his frustrations at what he sees as “revisionism” over his influence relative to Lennon’s after he was murdered in 1980. He went as far as reversing the song credits to read “McCartney-Lennon” in a 2002 album – to the annoyance of Lennon’s widow, artist Yoko Ono.

Most of the eight songs of contested authorship were predicted to be predominantly in Lennon’s style, including tracks like “Ask Me Why” and the bridge to “A Hard Day’s Night” which McCartney sang and has suggested in previous interviews he had a role in. “In My Life”, which Rolling Stone magazine ranked, in 2011, the 23rd greatest song of all time has “garnered the greatest amount of speculation about its true author”, the researchers said.

Lennon wrote the song’s lyrics, but McCartney has claimed he wrote all the music, something Lennon’s account disputed.
The algorithm determined with 81.1 per cent certainty that Lennon wrote the verse, but McCartney’s influence in the song’s bridge was given with 43.5 per cent certainty. This would corroborate Lennon’s account that Paul contributed to the song’s middle-eight melody.

“Breaking apart the song into the verse and the bridge separately, it is apparent that the verse is much more consistent stylistically with Lennon’s song writing,” the authors wrote. Other songs like “Baby’s in Black”, “The Word”, and “From Me to You” were more confidently McCartney’s with up to 97 per cent certainty.

The system allows for a study of the way each musicians’ influences change over time, as well as the collaborative nature of song writing in popular music.

Insights from the study include that McCartney’s work “tended to use more non-standard musical motifs” in his songs, with higher song complexity a “distinguishing feature” of his songs.

Independent:       HarvardDataScienceReview:

You Might Also Read:

Google To Break Pirates Over Music Searches:

 


 

 

 

 

« Croatian Government Targeted By Mystery Hackers
The Cyber Effects Of Industry 4.0 On Warfare »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.

Vantyr

Vantyr

Vantyr's core mission is to safeguard the business-led adoption of SaaS applications by automating the lifecycle management and security of non-human identities.