Skip to main content
Log in

Automated decryption of siri bhoovalaya using cryptography and natural language processing techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

"The Siri Bhoovalaya is a seminal work of literature, believed to have been composed approximately a millennium ago, which encompasses diverse information encrypted using numerals of the Kannada language—a predominant language of southern India. Currently, only a portion of this enigmatic text is accessible, and deciphering its content remains largely a manual endeavor. This article presents a novel model designed to automate the conversion of these Kannada numerals into phonetic alphabets of the designated language. Subsequent to this conversion, algorithms rooted in Natural Language Processing (NLP) techniques are utilized to form coherent words. These algorithms adhere to the linguistic and grammatical structures of the target language. Through this research, we aim to establish an initial technical blueprint to shed light on the profound content encapsulated within this age-old masterpiece."

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Algorithm 1
Algorithm 2
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

All the data is collected from the simulation reports of the software and tools used by the authors. Authors are working on implementing the same using real world data with appropriate permissions.

References

  1. Brown PF, Desouza PV, Mercer RL, Della Pietra VJ, Lai JC (1992) Class-based n-gram models of natural language. Comput Linguist 18(4):467–479

    Google Scholar 

  2. Jain AK (2013) An inimitable cryptographic creation: Siri Bhoovalaya

  3. Shiny (2017) Shiny. https://shiny.rstudio.com/

  4. shinyapps.io (2017) shinyapps.io. https://www.shinyapps.io/

  5. Stallings W (2006) Cryptography and network security: principles and practices, 4th edn. Pearson Education India, pp 35–49

    Google Scholar 

  6. Stinson DR (2005) Cryptography: theory and practice. Chapman and Hall/CRC

    Book  Google Scholar 

  7. Stallings W (2007) Network security essentials: applications and standards. Pearson Education India

    Google Scholar 

  8. R Core Team (2016) R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna. https://www.R-project.org/

    Google Scholar 

  9. You Y et al (2018) A review of cyber security controls from an ICS perspective. In: 2018 international conference on platform technology and service (PlatCon). IEEE

    Google Scholar 

  10. Zhang H, Lin Y, Xiao J (2017) An innovative analying method for the scale of distribution system security region. In: 2017 IEEE power & energy society general meeting, IEEE

  11. Bianchi T, Bioglio V, Magli E (2014) On the security of random linear measurements. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE

    Google Scholar 

  12. Do T, Gan L, Nguyen N, Tran T (2012) Fast and efficient compressive sensing using structurally random matrices. IEEE Trans Signal Process 60(1):139–154

  13. Rao A, Jha B, Kini G (2013) Effect of grammar on security of long passwords. In: Proceedings of the third ACM conference on data and application security and privacy (CODASPY '13). ACM, New York, pp 317–324. https://doi.org/10.1145/2435349.2435395

    Chapter  Google Scholar 

  14. Yan Y, Huang J (2017) Cooperative output regulation of discrete-time linear time-delay multi-agent systems under switching network [J]. Neurocomputing 241(7):108–114

    Article  Google Scholar 

  15. Zhou L, Li C (2017) Out sourcing Eigen-decomposition and singular value decomposition of large matrix to a public cloud. IEEE Access 4:869–879

    Article  Google Scholar 

  16. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) Advances in cryptology—Eurocrypt. Springer, Berlin, pp 223–238

    Chapter  Google Scholar 

  17. Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. In: 2016 International conference on innovation and challenges in cyber security (ICICCS-INBUSH). IEEE

    Google Scholar 

  18. Patel B, Desai P, Panchal U (2017) Methods of recommender system: A review. In: 2017 international conference on innovations in information, embedded and communication systems (ICIIECS). IEEE

    Google Scholar 

  19. Thomas A, Sujatha AK (2016) Comparative study of recommender systems. In: 2016 international conference on circuit, power and computing technologies (ICCPCT). https://doi.org/10.1109/iccpct.2016.7530304

    Chapter  Google Scholar 

  20. Yang S, Chen B (2023) SNIB: improving spike-based machine learning using nonlinear information bottleneck. IEEE Trans Syst Man Cybern: Syst 53(12):7852–7863. https://doi.org/10.1109/TSMC.2023.3300318

    Article  Google Scholar 

  21. Sharma RK (2018) Title of the article. J Indian History Culture 2:11–35

    Google Scholar 

  22. Kumar SP, Sethi R eds (2021) Krishna Sobti: A counter archive. Taylor & Francis

    Google Scholar 

  23. University of Kerala (2000) International journal of Dravidian linguistics, vol 29. Department of Linguistics, University of Kerala

    Google Scholar 

  24. Hong Z et al (2021) Challenges and advances in information extraction from scientific literature: a review. JOM 73(11):3383–3400

    Article  Google Scholar 

  25. Khurana D, Koli A, Khatter K et al (2023) Natural language processing: state of the art, current trends and challenges. Multimed Tools Appl 82:3713–3744. https://doi.org/10.1007/s11042-022-13428-46

    Article  Google Scholar 

Download references

Funding

On Behalf of all authors the corresponding author states that they did not receive any funds for this project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jagadeesh Sai D.

Ethics declarations

Conflict of Interest

The authors declare that we have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix 1

Appendix 1

1.1 Chakra Bandha Transposition algorithm

Algorithm 3 requires the following predefined functions:

  1. 1)

    myarray. append(myelement) — Appends myelement to the array, myarray.

  2. 2)

    mynumber +  + — Increments the integer or float, mynumber by one.

  3. 3)

    mynumber1: mynumber2 — Returns array of all integers between the two integers, mynumber1 and mynumber2. If the mynumber1 and mynumber2 are floats, then array of all floats between these two floats will be returned.

  4. 4)

    rev(myarray) — Reverses the array, myarray.

  5. 5)

    len(myarray) — Returns the number of elements in the array, myarray.

Algorithm 3
figure c

Chakra Bandha transposition algorithm

Algorithm 4
figure dfigure d

Chakra Bandha transposition algorithm (continued)

Algorithm 5
figure e

Chakra Bandha transposition algorithm (continued)

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

D, J.S. Automated decryption of siri bhoovalaya using cryptography and natural language processing techniques. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18527-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18527-y

Keywords

Navigation