AI Solves Beatles Songwriting Dispute

The contested origins of The Beatles’ hits penned under the writing partnership of Paul McCartney and John Lennon could be put to bed by artificial intelligence (AI) software which can identify each artist’s musical influence.

US researchers from Harvard University trained a machine learning algorithm on hundreds of the Fab Four’s hits to build a “musical fingerprint” for each songwriter. It was then asked to assess eight iconic songs, or musical fragments, recorded between 1962 and 1966, where debate rages over who was the major influence.

This includes tracks like “A Hard Day’s Night” and “In My Life” which are credited to the “Lennon-McCartney partnership”, but are widely believed to be entirely written by one or the other of the pair.

The findings, published in Harvard Data Science Review, allow for each artist’s influences on the song to be assessed, and predicts the probability that either McCartney or Lennon were chiefly responsible. As recently as 2015, Sir Paul McCartney has vented his frustrations at what he sees as “revisionism” over his influence relative to Lennon’s after he was murdered in 1980. He went as far as reversing the song credits to read “McCartney-Lennon” in a 2002 album – to the annoyance of Lennon’s widow, artist Yoko Ono.

Most of the eight songs of contested authorship were predicted to be predominantly in Lennon’s style, including tracks like “Ask Me Why” and the bridge to “A Hard Day’s Night” which McCartney sang and has suggested in previous interviews he had a role in. “In My Life”, which Rolling Stone magazine ranked, in 2011, the 23rd greatest song of all time has “garnered the greatest amount of speculation about its true author”, the researchers said.

Lennon wrote the song’s lyrics, but McCartney has claimed he wrote all the music, something Lennon’s account disputed.
The algorithm determined with 81.1 per cent certainty that Lennon wrote the verse, but McCartney’s influence in the song’s bridge was given with 43.5 per cent certainty. This would corroborate Lennon’s account that Paul contributed to the song’s middle-eight melody.

“Breaking apart the song into the verse and the bridge separately, it is apparent that the verse is much more consistent stylistically with Lennon’s song writing,” the authors wrote. Other songs like “Baby’s in Black”, “The Word”, and “From Me to You” were more confidently McCartney’s with up to 97 per cent certainty.

The system allows for a study of the way each musicians’ influences change over time, as well as the collaborative nature of song writing in popular music.

Insights from the study include that McCartney’s work “tended to use more non-standard musical motifs” in his songs, with higher song complexity a “distinguishing feature” of his songs.

Independent:       HarvardDataScienceReview:

You Might Also Read:

Google To Break Pirates Over Music Searches:

 


 

 

 

 

« Croatian Government Targeted By Mystery Hackers
The Cyber Effects Of Industry 4.0 On Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.

Synergy Quantum

Synergy Quantum

Synergy Quantum has pioneered a proprietary suite of military-grade, quantum-secure communication technologies.