Abstract
"The Siri Bhoovalaya is a seminal work of literature, believed to have been composed approximately a millennium ago, which encompasses diverse information encrypted using numerals of the Kannada language—a predominant language of southern India. Currently, only a portion of this enigmatic text is accessible, and deciphering its content remains largely a manual endeavor. This article presents a novel model designed to automate the conversion of these Kannada numerals into phonetic alphabets of the designated language. Subsequent to this conversion, algorithms rooted in Natural Language Processing (NLP) techniques are utilized to form coherent words. These algorithms adhere to the linguistic and grammatical structures of the target language. Through this research, we aim to establish an initial technical blueprint to shed light on the profound content encapsulated within this age-old masterpiece."
Similar content being viewed by others
Data Availability
All the data is collected from the simulation reports of the software and tools used by the authors. Authors are working on implementing the same using real world data with appropriate permissions.
References
Brown PF, Desouza PV, Mercer RL, Della Pietra VJ, Lai JC (1992) Class-based n-gram models of natural language. Comput Linguist 18(4):467–479
Jain AK (2013) An inimitable cryptographic creation: Siri Bhoovalaya
Shiny (2017) Shiny. https://shiny.rstudio.com/
shinyapps.io (2017) shinyapps.io. https://www.shinyapps.io/
Stallings W (2006) Cryptography and network security: principles and practices, 4th edn. Pearson Education India, pp 35–49
Stinson DR (2005) Cryptography: theory and practice. Chapman and Hall/CRC
Stallings W (2007) Network security essentials: applications and standards. Pearson Education India
R Core Team (2016) R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna. https://www.R-project.org/
You Y et al (2018) A review of cyber security controls from an ICS perspective. In: 2018 international conference on platform technology and service (PlatCon). IEEE
Zhang H, Lin Y, Xiao J (2017) An innovative analying method for the scale of distribution system security region. In: 2017 IEEE power & energy society general meeting, IEEE
Bianchi T, Bioglio V, Magli E (2014) On the security of random linear measurements. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE
Do T, Gan L, Nguyen N, Tran T (2012) Fast and efficient compressive sensing using structurally random matrices. IEEE Trans Signal Process 60(1):139–154
Rao A, Jha B, Kini G (2013) Effect of grammar on security of long passwords. In: Proceedings of the third ACM conference on data and application security and privacy (CODASPY '13). ACM, New York, pp 317–324. https://doi.org/10.1145/2435349.2435395
Yan Y, Huang J (2017) Cooperative output regulation of discrete-time linear time-delay multi-agent systems under switching network [J]. Neurocomputing 241(7):108–114
Zhou L, Li C (2017) Out sourcing Eigen-decomposition and singular value decomposition of large matrix to a public cloud. IEEE Access 4:869–879
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) Advances in cryptology—Eurocrypt. Springer, Berlin, pp 223–238
Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. In: 2016 International conference on innovation and challenges in cyber security (ICICCS-INBUSH). IEEE
Patel B, Desai P, Panchal U (2017) Methods of recommender system: A review. In: 2017 international conference on innovations in information, embedded and communication systems (ICIIECS). IEEE
Thomas A, Sujatha AK (2016) Comparative study of recommender systems. In: 2016 international conference on circuit, power and computing technologies (ICCPCT). https://doi.org/10.1109/iccpct.2016.7530304
Yang S, Chen B (2023) SNIB: improving spike-based machine learning using nonlinear information bottleneck. IEEE Trans Syst Man Cybern: Syst 53(12):7852–7863. https://doi.org/10.1109/TSMC.2023.3300318
Sharma RK (2018) Title of the article. J Indian History Culture 2:11–35
Kumar SP, Sethi R eds (2021) Krishna Sobti: A counter archive. Taylor & Francis
University of Kerala (2000) International journal of Dravidian linguistics, vol 29. Department of Linguistics, University of Kerala
Hong Z et al (2021) Challenges and advances in information extraction from scientific literature: a review. JOM 73(11):3383–3400
Khurana D, Koli A, Khatter K et al (2023) Natural language processing: state of the art, current trends and challenges. Multimed Tools Appl 82:3713–3744. https://doi.org/10.1007/s11042-022-13428-46
Funding
On Behalf of all authors the corresponding author states that they did not receive any funds for this project.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that we have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix 1
Appendix 1
1.1 Chakra Bandha Transposition algorithm
Algorithm 3 requires the following predefined functions:
-
1)
myarray. append(myelement) — Appends myelement to the array, myarray.
-
2)
mynumber + + — Increments the integer or float, mynumber by one.
-
3)
mynumber1: mynumber2 — Returns array of all integers between the two integers, mynumber1 and mynumber2. If the mynumber1 and mynumber2 are floats, then array of all floats between these two floats will be returned.
-
4)
rev(myarray) — Reverses the array, myarray.
-
5)
len(myarray) — Returns the number of elements in the array, myarray.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
D, J.S. Automated decryption of siri bhoovalaya using cryptography and natural language processing techniques. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18527-y
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-18527-y