AI Solves Beatles Songwriting Dispute

The contested origins of The Beatles’ hits penned under the writing partnership of Paul McCartney and John Lennon could be put to bed by artificial intelligence (AI) software which can identify each artist’s musical influence.

US researchers from Harvard University trained a machine learning algorithm on hundreds of the Fab Four’s hits to build a “musical fingerprint” for each songwriter. It was then asked to assess eight iconic songs, or musical fragments, recorded between 1962 and 1966, where debate rages over who was the major influence.

This includes tracks like “A Hard Day’s Night” and “In My Life” which are credited to the “Lennon-McCartney partnership”, but are widely believed to be entirely written by one or the other of the pair.

The findings, published in Harvard Data Science Review, allow for each artist’s influences on the song to be assessed, and predicts the probability that either McCartney or Lennon were chiefly responsible. As recently as 2015, Sir Paul McCartney has vented his frustrations at what he sees as “revisionism” over his influence relative to Lennon’s after he was murdered in 1980. He went as far as reversing the song credits to read “McCartney-Lennon” in a 2002 album – to the annoyance of Lennon’s widow, artist Yoko Ono.

Most of the eight songs of contested authorship were predicted to be predominantly in Lennon’s style, including tracks like “Ask Me Why” and the bridge to “A Hard Day’s Night” which McCartney sang and has suggested in previous interviews he had a role in. “In My Life”, which Rolling Stone magazine ranked, in 2011, the 23rd greatest song of all time has “garnered the greatest amount of speculation about its true author”, the researchers said.

Lennon wrote the song’s lyrics, but McCartney has claimed he wrote all the music, something Lennon’s account disputed.
The algorithm determined with 81.1 per cent certainty that Lennon wrote the verse, but McCartney’s influence in the song’s bridge was given with 43.5 per cent certainty. This would corroborate Lennon’s account that Paul contributed to the song’s middle-eight melody.

“Breaking apart the song into the verse and the bridge separately, it is apparent that the verse is much more consistent stylistically with Lennon’s song writing,” the authors wrote. Other songs like “Baby’s in Black”, “The Word”, and “From Me to You” were more confidently McCartney’s with up to 97 per cent certainty.

The system allows for a study of the way each musicians’ influences change over time, as well as the collaborative nature of song writing in popular music.

Insights from the study include that McCartney’s work “tended to use more non-standard musical motifs” in his songs, with higher song complexity a “distinguishing feature” of his songs.

Independent:       HarvardDataScienceReview:

You Might Also Read:

Google To Break Pirates Over Music Searches:

 


 

 

 

 

« Croatian Government Targeted By Mystery Hackers
The Cyber Effects Of Industry 4.0 On Warfare »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.