Occasionally such a motif is a musical cryptogram of the name involved.
From the en.wikipedia.org
This is a copy of a cryptogram sent to the San Francisco Chronicle, Nov.
From the newsfeed.time.com
The Chronicle published its third of the cryptogram on page four of the next day's edition.
From the en.wikipedia.org
By the early 20th century, the public had tired of cryptogram-hunting, and the Bacon movement faded.
From the en.wikipedia.org
On November 8, 1969, the Zodiac mailed a card with another cryptogram consisting of 340 characters.
From the en.wikipedia.org
The Christmas tree will have been a phanerogram, not a cryptogram, and a gymnosperm, not an angiosperm.
From the newscientist.com
An EMV-compliant cryptogram is supplied by the phone directly to the merchant's payment gateway for processing.
From the techcrunch.com
Yet anyone who tries to decipher Tango as some sort of Iron Curtain cryptogram will miss half the fun and pertinence of the play.
From the time.com
Also, in NFC's case, each contactless card stored on the device generates a cryptogram to exclusively identify each transaction.
From the techcrunch.com
More examples
A piece of writing in code or cipher
A cryptogram is a type of puzzle which consists of a short piece of encrypted text. Generally the cipher used to encrypt the text is simple enough that cryptogram can be solved by hand. Frequently used are substitution ciphers where each letter is replaced by a different letter or number. ...
The Cryptogram is a 1995 play by American playwright David Mamet. The play concerns the moment when childhood is lost. The story is set in 1959 on the night before a young boy goes on a camping trip with his father.
(Cryptograms (album)) Cryptograms is the second album from Atlanta, Georgia-based indie rock group Deerhunter, released through Kranky Records on January 29, 2007 on CD and vinyl. ...
A type of word puzzle in which text encoded by a simple cipher is to be decoded
Entire blocks of text are encrypted and a decoder provided. The decoder can be made as easy or as difficult as desired.
Result of a cryptographic operation. Used in transactions involving chips. Allows chip to exchange data with the issuer securely.