SlideShare uma empresa Scribd logo
1 de 29
Siri-Bhoovalaya from Computer
Science Perspective
Presented at a Bharatvani Project Workshop on
Potentials of Siri Bhoovalaya for application and research in Linguistics
and Computer Science
at
Central Institute of Indian Languages, Mysuru
on 27th September 2016
by
Anil Kumar Jain
Siri-Bhoovalaya Vak-Peeth Project
Siri-Bhoovalaya Web-Site Project
web-site: siri-bhoovalaya.org
Agenda of this Presentation
• High Level Steps for Computerisation to reveal
contents of a Chakra
• Transposition Schemes - Bandhas
• Phonetic Alphabet Coding Scheme - Ankaakshar
• Illustration of basic Steps
• Steganography to disclose multilingual contents
• Visual Crytpography - Chitra Bandha
• Research Potentials and Challenges
High Level Steps to Decipher a Chakra
1. Select Transformation functions defined as Bandhas as
applicable to the selected Chakra.
2. Transform two dimensional matrix of the Chakra into a row
vector using algorithm for the Transformation Function as
specified in Bandha.
3. Apply Mono-alphabetic Substitution to replace numerals in
row vector with respective Phonetic Alphabets.
4. Join alphabets to form words and add punctuations as per
grammar rules of the language (Kannada).
5. Derive interlaced multilingual alphabets as per defined
scheme and format these as per grammar rules of the
target language (Prakrit, Samskrit, Pali, Apabransh, Telugu,
Tamil etc. etc.)
Step-1 Transposition Scheme
Definition: In cryptography, a transposition cipher is a
method of encryption by which the positions held by
units of plaintext (which are commonly characters or
groups of characters) are shifted according to a regular
system, so that the cipher text constitutes
a permutation of the plaintext. That is, the order of the
units is changed (the plaintext is reordered).
Application: Bandhas in Siri-Bhoovalaya basically are
Transposition Schemes to convert two-dimensional
Chakra into a single dimensional string of numbers.
Step-2 Chakra-Bandha
(Implementation of one of the Transposition Schemes)
Step- 2 Navmank Bandh
Transposition with Recursion
Navmank Bandh
is applied from
Second Adhyaya
to Eighth Adhyaya
with different
sequence of Tiles
in each of these
Adhyaya.
Each tile, called
as UpChakra, is
traversed in the
same manner as
in Chakra Bandh.
Step – 3 Substitution Scheme
Definition: In cryptography, a substitution
cipher is a method of encoding by which units
of plaintext are replaced with cipher text,
according to a fixed system. The receiver
deciphers the text by performing the inverse
substitution.
Application: Phonetic Alphabets are
substituted to the string of numbers resulting
from Step-2.
Multilingual Phonetic Alphabet Encoding Scheme
Kumudendu Code Table
(for implementation of Mono-alphabetic Substitution Cipher)
Multilingual Phonetic Alphabet Classification
in
Kumudendu Code Table
Chakra Bandha Example with 5x5 matrix
Step-1 & Step-2
1 2 3 4 5
1 4 53 28 45 4
2 1 45 47 59 54
3 7 16 1 56 55
4 28 43 8 1 52
5 10 51 1 7 7
1 2 3 4 5
1 17 24 1 8 15
2 23 5 7 14 16
3 4 6 13 20 22
4 10 12 19 21 3
5 11 18 25 2 9
Example Chakra (5x5) Step-1 : Chakra-Bandha (5x5)
28 7 52 7 45 16 47 45 7 28 10 43 1 59 4 54 4 51 8 56 1 55 1 53 1
Step -2 : Result of Applying Bandha - Matrix to Vector
Step - 3 & Step - 4
Applying Substitution using Kumudendu
Code Table and applying grammar rules
Result of Step -2 Chakra-Bandh from previous
slide and results after applying Step-3 & Step-4
First Chakra in Mangal Prabhrut
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
1 59 23 1 16 1 28 28 1 1 56 59 4 56 1 1 47 16 34 1 7 16 1 1 7 56 1 60
2 53 54 47 28 1 47 45 28 7 4 59 41 4 45 1 30 47 47 45 42 53 28 51 1 52 1 1
3 1 22 1 30 2 1 2 55 30 1 7 45 47 52 1 4 1 47 1 1 1 1 53 1 52 59 52
4 59 30 2 55 55 13 16 2 53 60 1 4 16 47 48 45 16 56 56 43 45 1 56 1 4 1 13
5 47 45 1 1 22 30 51 1 2 56 38 30 4 1 1 56 1 1 16 1 57 7 56 56 1 22 1
6 54 52 52 45 1 7 55 48 1 58 52 35 28 55 1 38 45 30 55 4 47 7 45 38 45 38 1
7 1 1 1 28 13 56 55 51 54 1 1 1 1 42 2 4 4 1 43 16 47 7 1 13 4 51 4
8 28 53 47 22 8 1 53 59 38 7 43 40 1 52 59 54 30 1 45 16 1 28 23 50 7 43 43
9 1 2 45 51 30 1 52 58 48 59 47 54 4 4 1 47 45 47 56 28 1 45 1 13 7 7 7
10 55 1 53 47 56 1 1 7 1 1 2 60 48 56 1 1 16 1 1 54 1 52 17 30 54 45 45
11 59 56 52 1 45 1 55 28 52 28 1 2 1 52 54 4 43 60 48 28 1 16 23 8 53 7 1
12 2 1 53 52 43 23 2 4 16 52 44 54 1 2 42 7 1 7 47 30 28 48 47 1 54 52 16
13 45 54 23 4 28 45 45 30 1 59 1 56 28 2 54 53 38 2 2 1 28 55 40 60 4 50 28
14 2 13 47 1 1 4 17 45 1 56 1 52 56 51 1 47 55 55 45 7 2 54 1 56 7 1 1
15 23 4 53 54 59 48 13 56 1 47 23 1 2 55 16 1 1 47 40 54 16 52 1 47 60 43 60
16 45 16 43 1 7 47 1 7 1 4 54 54 1 43 28 28 7 1 2 7 52 30 1 4 47 4 13
17 42 1 54 13 1 28 1 45 42 5 48 56 1 1 1 52 54 7 1 1 2 56 56 2 43 1 1
18 56 43 22 45 56 43 2 2 56 1 8 48 59 59 7 16 53 55 53 48 1 1 46 2 30 53 1
19 47 45 1 2 54 56 56 2 55 51 4 16 7 13 30 16 1 1 4 52 52 4 54 47 2 38 1
20 1 54 60 56 54 1 60 1 1 16 40 38 17 1 47 56 33 55 1 1 59 48 1 53 7 1 1
21 1 52 16 1 60 1 30 53 30 7 47 13 13 22 8 13 45 59 54 1 2 42 54 47 53 52 53
22 16 30 1 4 52 47 56 1 28 16 1 22 59 51 1 1 7 28 53 60 7 1 16 16 1 1 58
23 4 53 56 1 52 2 13 52 38 30 45 7 1 30 56 16 1 1 1 30 48 56 54 54 55 28 45
24 1 47 47 1 28 22 1 47 1 1 45 46 1 1 47 53 55 52 1 1 7 43 2 1 1 1 43
25 1 4 53 1 45 43 16 55 52 4 47 55 45 22 51 56 1 38 13 30 2 28 56 13 56 28 55
26 4 16 46 1 1 16 1 1 1 1 1 47 59 4 8 38 58 1 1 48 1 7 22 1 1 1 60
27 52 4 30 56 53 52 54 1 30 52 1 16 54 7 58 1 30 54 1 56 51 53 56 57 56 4 60
Output from Chakra Bandha Applied to
first Chakra of Siri Bhoovalaya
Resultant text after manually conjoining phonetic alphabets :
Step – 5 Deriving Interlaced
Multilingual Content
Definition: Steganography is the practice of concealing
a file, message, image, or video within another file,
message, image, or video. Thus, whereas cryptography
is the practice of protecting the contents of a message
alone, steganography is concerned with concealing the
fact that a secret message is being sent, as well as
concealing the contents of the message.
Application: Multilingual contents are interlaced into
base content in Kannada and are extracted as per
corresponding schemes applicable to each of different
languages.
Step -5 Example of Multi-Lingual content
from First Adhyaya
Step – 5 : Content in Prakrit & Samskrit
from First Chakra
Step -5 : Example of Multi-lingual contents from
first Anubandh of Shrutavatar
Step – 5 : Content in Prakrit, Geervan, Telugu, Tamil
& Apabhramsh from first anubandha of Shrutavatar
Chitra Bandha / Chitra Kavya
Visual Cryptography is a cryptographic technique
which allows visual information (pictures, text, etc.)
to be encrypted in such a way that decryption
becomes the job of the person to decrypt via sight
reading.
Application: Muni Kumudendu has vividly used Chitra
Bandha to demostrate his brilliance as graphics artist
too. This is also one of justification of his using two
dimensional arrays (27x27 matrix ) as a Canvas for
Chitra Kavya.
Visual Cryptography (Chitra Bandha)
example
In following example a graphical figure is used as key to
extract the hidden message.
Superimposing the figure on Chakra at
defined position to reveal content in those
particular cells in manner as shown
Derivation of Shrutavatar Chakra
from Mangal Prabhrut Chakra
Why Muni Kumudendu is Inimitable?
• Master Mathematician who shone with brilliance in
creating intricate framework of Chakras and Bandhas.
• Eminent Scholar of religious foundations, scriptures,
practices and ancient sciences of diverse domains.
• Highly Competent Linguist with proficiency in multiple
languages prevalent in India at his time.
• Extremely genius poet who chose two-dimensional
array of numerals for his creative expressions.
• Great Composer who intertwined verses in multiple
languages into a solitary piece of magnificient work.
• Exceedingly Talented Graphics artist who could
implant poetry into multitude of shapes and figures.
Importance of further Research
• Rajendra Prasad, the first President of India,
called it one of the ‘Wonders of the World'.
Giants of Kannada literature have evinced keen
interest in this magnificent creation. Prof Suniti
Kumar Chatterjee have exclaimed that the work
deserved a doctorate by several universities.
• Dr S. Srikanta Sastri, a highly respected name in
the study of Indian history and culture, has
commented vividly on the importance this unique
work from many-fold perspectives.
Research Areas from Computer
Science Perspective
1. Development of Algorithms for different categories of
Bandhas. (Matrix to Row transformation)
2. Digitisation of all Chakras suitable for Computer processing.
3. Derivation of Chakras of other Khandas from Mangal
Prabhrut.
4. NLP (Natural Language Processing) / Computational
Linguistics implementation for language specific grammar
rules on the content derived for different languages and
translation thereof.
5. Integration of IPA (International Phonetic Alphabet) and
cross platform Speech conversion.
6. Multilingual content extraction from base content,
classification and indexing of entire content suitable for
search engines.
Major Challenges
• There exist no Credible Platform or Forum which can bring
together persons pursuing research on Siri-Bhoovalaya. There are
many islands of endeavour but no bridges to consolidate and
promote sharing amongst them.
• Teams consisting of Mathematicians, Linguistics, Subject Matter
Experts / Scholars and Computer Scientist are needed in order to
fully unearth the hidden treasure buried inside this masterpiece.
Efforts in this direction is not visible.
• Very small cross-section of individuals are not only able to
appreciate Siri-Bhoovalaya, but have not even heard of it, as there
has been very little effort for public awareness towards this
unparalleled masterpiece. It should not only be considered a matter
of pride for Kannada speaking population but must be accorded
honour as a unique World Heritage. This is more so because Muni
Kumudendu used numerals, which are universal symbols, instead of
any language specific alphabets.
Siri Bhoovalaya: A Unique Multilingual Epic Scripted in Numerals
An Inimitable Cryptographic Creation: Siri Bhoovalaya
Creativity in Cryptography: An Epic Scripted in
Numerals only

Mais conteúdo relacionado

Mais procurados

ESP32開発環境まとめ
ESP32開発環境まとめESP32開発環境まとめ
ESP32開発環境まとめKenta IDA
 
Həndəsi silsilə
Həndəsi silsilə Həndəsi silsilə
Həndəsi silsilə sevinjb
 
Квадратична функція
Квадратична функція Квадратична функція
Квадратична функція Anetico
 
Harmonização dos chakras
Harmonização dos chakrasHarmonização dos chakras
Harmonização dos chakrasLiliana Carvalho
 
Wpf3 D 기초부터 활용까지
Wpf3 D 기초부터 활용까지Wpf3 D 기초부터 활용까지
Wpf3 D 기초부터 활용까지guestf0843c
 
Числові нерівності та їх властивості
Числові нерівності та їх властивостіЧислові нерівності та їх властивості
Числові нерівності та їх властивостіValyu66
 
Обернена матриця
Обернена матрицяОбернена матриця
Обернена матрицяOksana Bryk
 
Xeon PhiとN体計算コーディング x86/x64最適化勉強会6(@k_nitadoriさんの代理アップ)
Xeon PhiとN体計算コーディング x86/x64最適化勉強会6(@k_nitadoriさんの代理アップ)Xeon PhiとN体計算コーディング x86/x64最適化勉強会6(@k_nitadoriさんの代理アップ)
Xeon PhiとN体計算コーディング x86/x64最適化勉強会6(@k_nitadoriさんの代理アップ)MITSUNARI Shigeo
 
O poder da cabala - yehuda berg
O poder da cabala -  yehuda bergO poder da cabala -  yehuda berg
O poder da cabala - yehuda bergDaniela Petito
 
Schematic diagrams of GPUs' architecture and Time evolution of theoretical FL...
Schematic diagrams of GPUs' architecture and Time evolution of theoretical FL...Schematic diagrams of GPUs' architecture and Time evolution of theoretical FL...
Schematic diagrams of GPUs' architecture and Time evolution of theoretical FL...智啓 出川
 
[Basic 14] 暗号について / RSA 暗号 / 楕円曲線暗号
[Basic 14] 暗号について / RSA 暗号 / 楕円曲線暗号[Basic 14] 暗号について / RSA 暗号 / 楕円曲線暗号
[Basic 14] 暗号について / RSA 暗号 / 楕円曲線暗号Yuto Takei
 
流体シミュレータの製作
流体シミュレータの製作流体シミュレータの製作
流体シミュレータの製作Fumiya Watanabe
 
Мамематика 5 клас
Мамематика 5 класМамематика 5 клас
Мамематика 5 класAnnaTimohovich
 

Mais procurados (20)

ESP32開発環境まとめ
ESP32開発環境まとめESP32開発環境まとめ
ESP32開発環境まとめ
 
Həndəsi silsilə
Həndəsi silsilə Həndəsi silsilə
Həndəsi silsilə
 
2
22
2
 
Lec10. vithi
Lec10. vithiLec10. vithi
Lec10. vithi
 
Квадратична функція
Квадратична функція Квадратична функція
Квадратична функція
 
Harmonização dos chakras
Harmonização dos chakrasHarmonização dos chakras
Harmonização dos chakras
 
Wpf3 D 기초부터 활용까지
Wpf3 D 기초부터 활용까지Wpf3 D 기초부터 활용까지
Wpf3 D 기초부터 활용까지
 
Числові нерівності та їх властивості
Числові нерівності та їх властивостіЧислові нерівності та їх властивості
Числові нерівності та їх властивості
 
Celebrando o samhain
Celebrando o samhainCelebrando o samhain
Celebrando o samhain
 
Обернена матриця
Обернена матрицяОбернена матриця
Обернена матриця
 
Xeon PhiとN体計算コーディング x86/x64最適化勉強会6(@k_nitadoriさんの代理アップ)
Xeon PhiとN体計算コーディング x86/x64最適化勉強会6(@k_nitadoriさんの代理アップ)Xeon PhiとN体計算コーディング x86/x64最適化勉強会6(@k_nitadoriさんの代理アップ)
Xeon PhiとN体計算コーディング x86/x64最適化勉強会6(@k_nitadoriさんの代理アップ)
 
O poder da cabala - yehuda berg
O poder da cabala -  yehuda bergO poder da cabala -  yehuda berg
O poder da cabala - yehuda berg
 
Schematic diagrams of GPUs' architecture and Time evolution of theoretical FL...
Schematic diagrams of GPUs' architecture and Time evolution of theoretical FL...Schematic diagrams of GPUs' architecture and Time evolution of theoretical FL...
Schematic diagrams of GPUs' architecture and Time evolution of theoretical FL...
 
Nyaya Darshana
Nyaya DarshanaNyaya Darshana
Nyaya Darshana
 
Python Cryptography & Security
Python Cryptography & SecurityPython Cryptography & Security
Python Cryptography & Security
 
[Basic 14] 暗号について / RSA 暗号 / 楕円曲線暗号
[Basic 14] 暗号について / RSA 暗号 / 楕円曲線暗号[Basic 14] 暗号について / RSA 暗号 / 楕円曲線暗号
[Basic 14] 暗号について / RSA 暗号 / 楕円曲線暗号
 
流体シミュレータの製作
流体シミュレータの製作流体シミュレータの製作
流体シミュレータの製作
 
мсо4
мсо4мсо4
мсо4
 
7000258 reiki-i-1-1-00-5
7000258 reiki-i-1-1-00-57000258 reiki-i-1-1-00-5
7000258 reiki-i-1-1-00-5
 
Мамематика 5 клас
Мамематика 5 класМамематика 5 клас
Мамематика 5 клас
 

Semelhante a Siri Bhoovalaya from Computer Science Perspective

Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Anil Jain
 
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of ScholarsAnil Jain
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Time series analysis : Refresher and Innovations
Time series analysis : Refresher and InnovationsTime series analysis : Refresher and Innovations
Time series analysis : Refresher and InnovationsQuantUniversity
 
Automated Evaluator for Bharatanatyam (Nritta)
Automated Evaluator for Bharatanatyam (Nritta)Automated Evaluator for Bharatanatyam (Nritta)
Automated Evaluator for Bharatanatyam (Nritta)Renu Hiremath
 
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...UKM
 
An inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri BhoovalayaAn inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri BhoovalayaAnil Jain
 
Analysis Of Image Compression Methods Based On Transform And Fractal Coding
Analysis Of Image Compression Methods Based On Transform And Fractal CodingAnalysis Of Image Compression Methods Based On Transform And Fractal Coding
Analysis Of Image Compression Methods Based On Transform And Fractal CodingJim Webb
 
Deep learning Tutorial - Part II
Deep learning Tutorial - Part IIDeep learning Tutorial - Part II
Deep learning Tutorial - Part IIQuantUniversity
 
Statistical Machine Translation for Language Localisation
Statistical Machine Translation for Language LocalisationStatistical Machine Translation for Language Localisation
Statistical Machine Translation for Language LocalisationAchchuthan Yogarajah
 
Paper id 71201925
Paper id 71201925Paper id 71201925
Paper id 71201925IJRAT
 
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...Raj Kumar Thenua
 
Deep learning with Keras
Deep learning with KerasDeep learning with Keras
Deep learning with KerasQuantUniversity
 

Semelhante a Siri Bhoovalaya from Computer Science Perspective (20)

Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
 
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
 
edc_adaptivity
edc_adaptivityedc_adaptivity
edc_adaptivity
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Time series analysis : Refresher and Innovations
Time series analysis : Refresher and InnovationsTime series analysis : Refresher and Innovations
Time series analysis : Refresher and Innovations
 
Automated Evaluator for Bharatanatyam (Nritta)
Automated Evaluator for Bharatanatyam (Nritta)Automated Evaluator for Bharatanatyam (Nritta)
Automated Evaluator for Bharatanatyam (Nritta)
 
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
Comparison result-of-songket-motives-retrieval-through-sketching-technique-wi...
 
Eo4301852855
Eo4301852855Eo4301852855
Eo4301852855
 
An inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri BhoovalayaAn inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri Bhoovalaya
 
Analysis Of Image Compression Methods Based On Transform And Fractal Coding
Analysis Of Image Compression Methods Based On Transform And Fractal CodingAnalysis Of Image Compression Methods Based On Transform And Fractal Coding
Analysis Of Image Compression Methods Based On Transform And Fractal Coding
 
Deep learning Tutorial - Part II
Deep learning Tutorial - Part IIDeep learning Tutorial - Part II
Deep learning Tutorial - Part II
 
K means report
K means reportK means report
K means report
 
thesis
thesisthesis
thesis
 
thesis
thesisthesis
thesis
 
Statistical Machine Translation for Language Localisation
Statistical Machine Translation for Language LocalisationStatistical Machine Translation for Language Localisation
Statistical Machine Translation for Language Localisation
 
Poscat seminar 10
Poscat seminar 10Poscat seminar 10
Poscat seminar 10
 
Paper id 71201925
Paper id 71201925Paper id 71201925
Paper id 71201925
 
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
 
Deep learning with Keras
Deep learning with KerasDeep learning with Keras
Deep learning with Keras
 
Neural networks
Neural networksNeural networks
Neural networks
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Siri Bhoovalaya from Computer Science Perspective

  • 1. Siri-Bhoovalaya from Computer Science Perspective Presented at a Bharatvani Project Workshop on Potentials of Siri Bhoovalaya for application and research in Linguistics and Computer Science at Central Institute of Indian Languages, Mysuru on 27th September 2016 by Anil Kumar Jain Siri-Bhoovalaya Vak-Peeth Project Siri-Bhoovalaya Web-Site Project web-site: siri-bhoovalaya.org
  • 2. Agenda of this Presentation • High Level Steps for Computerisation to reveal contents of a Chakra • Transposition Schemes - Bandhas • Phonetic Alphabet Coding Scheme - Ankaakshar • Illustration of basic Steps • Steganography to disclose multilingual contents • Visual Crytpography - Chitra Bandha • Research Potentials and Challenges
  • 3. High Level Steps to Decipher a Chakra 1. Select Transformation functions defined as Bandhas as applicable to the selected Chakra. 2. Transform two dimensional matrix of the Chakra into a row vector using algorithm for the Transformation Function as specified in Bandha. 3. Apply Mono-alphabetic Substitution to replace numerals in row vector with respective Phonetic Alphabets. 4. Join alphabets to form words and add punctuations as per grammar rules of the language (Kannada). 5. Derive interlaced multilingual alphabets as per defined scheme and format these as per grammar rules of the target language (Prakrit, Samskrit, Pali, Apabransh, Telugu, Tamil etc. etc.)
  • 4. Step-1 Transposition Scheme Definition: In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the cipher text constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Application: Bandhas in Siri-Bhoovalaya basically are Transposition Schemes to convert two-dimensional Chakra into a single dimensional string of numbers.
  • 5. Step-2 Chakra-Bandha (Implementation of one of the Transposition Schemes)
  • 6. Step- 2 Navmank Bandh Transposition with Recursion Navmank Bandh is applied from Second Adhyaya to Eighth Adhyaya with different sequence of Tiles in each of these Adhyaya. Each tile, called as UpChakra, is traversed in the same manner as in Chakra Bandh.
  • 7. Step – 3 Substitution Scheme Definition: In cryptography, a substitution cipher is a method of encoding by which units of plaintext are replaced with cipher text, according to a fixed system. The receiver deciphers the text by performing the inverse substitution. Application: Phonetic Alphabets are substituted to the string of numbers resulting from Step-2.
  • 8. Multilingual Phonetic Alphabet Encoding Scheme Kumudendu Code Table (for implementation of Mono-alphabetic Substitution Cipher)
  • 9. Multilingual Phonetic Alphabet Classification in Kumudendu Code Table
  • 10. Chakra Bandha Example with 5x5 matrix Step-1 & Step-2 1 2 3 4 5 1 4 53 28 45 4 2 1 45 47 59 54 3 7 16 1 56 55 4 28 43 8 1 52 5 10 51 1 7 7 1 2 3 4 5 1 17 24 1 8 15 2 23 5 7 14 16 3 4 6 13 20 22 4 10 12 19 21 3 5 11 18 25 2 9 Example Chakra (5x5) Step-1 : Chakra-Bandha (5x5) 28 7 52 7 45 16 47 45 7 28 10 43 1 59 4 54 4 51 8 56 1 55 1 53 1 Step -2 : Result of Applying Bandha - Matrix to Vector
  • 11. Step - 3 & Step - 4 Applying Substitution using Kumudendu Code Table and applying grammar rules Result of Step -2 Chakra-Bandh from previous slide and results after applying Step-3 & Step-4
  • 12. First Chakra in Mangal Prabhrut 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 1 59 23 1 16 1 28 28 1 1 56 59 4 56 1 1 47 16 34 1 7 16 1 1 7 56 1 60 2 53 54 47 28 1 47 45 28 7 4 59 41 4 45 1 30 47 47 45 42 53 28 51 1 52 1 1 3 1 22 1 30 2 1 2 55 30 1 7 45 47 52 1 4 1 47 1 1 1 1 53 1 52 59 52 4 59 30 2 55 55 13 16 2 53 60 1 4 16 47 48 45 16 56 56 43 45 1 56 1 4 1 13 5 47 45 1 1 22 30 51 1 2 56 38 30 4 1 1 56 1 1 16 1 57 7 56 56 1 22 1 6 54 52 52 45 1 7 55 48 1 58 52 35 28 55 1 38 45 30 55 4 47 7 45 38 45 38 1 7 1 1 1 28 13 56 55 51 54 1 1 1 1 42 2 4 4 1 43 16 47 7 1 13 4 51 4 8 28 53 47 22 8 1 53 59 38 7 43 40 1 52 59 54 30 1 45 16 1 28 23 50 7 43 43 9 1 2 45 51 30 1 52 58 48 59 47 54 4 4 1 47 45 47 56 28 1 45 1 13 7 7 7 10 55 1 53 47 56 1 1 7 1 1 2 60 48 56 1 1 16 1 1 54 1 52 17 30 54 45 45 11 59 56 52 1 45 1 55 28 52 28 1 2 1 52 54 4 43 60 48 28 1 16 23 8 53 7 1 12 2 1 53 52 43 23 2 4 16 52 44 54 1 2 42 7 1 7 47 30 28 48 47 1 54 52 16 13 45 54 23 4 28 45 45 30 1 59 1 56 28 2 54 53 38 2 2 1 28 55 40 60 4 50 28 14 2 13 47 1 1 4 17 45 1 56 1 52 56 51 1 47 55 55 45 7 2 54 1 56 7 1 1 15 23 4 53 54 59 48 13 56 1 47 23 1 2 55 16 1 1 47 40 54 16 52 1 47 60 43 60 16 45 16 43 1 7 47 1 7 1 4 54 54 1 43 28 28 7 1 2 7 52 30 1 4 47 4 13 17 42 1 54 13 1 28 1 45 42 5 48 56 1 1 1 52 54 7 1 1 2 56 56 2 43 1 1 18 56 43 22 45 56 43 2 2 56 1 8 48 59 59 7 16 53 55 53 48 1 1 46 2 30 53 1 19 47 45 1 2 54 56 56 2 55 51 4 16 7 13 30 16 1 1 4 52 52 4 54 47 2 38 1 20 1 54 60 56 54 1 60 1 1 16 40 38 17 1 47 56 33 55 1 1 59 48 1 53 7 1 1 21 1 52 16 1 60 1 30 53 30 7 47 13 13 22 8 13 45 59 54 1 2 42 54 47 53 52 53 22 16 30 1 4 52 47 56 1 28 16 1 22 59 51 1 1 7 28 53 60 7 1 16 16 1 1 58 23 4 53 56 1 52 2 13 52 38 30 45 7 1 30 56 16 1 1 1 30 48 56 54 54 55 28 45 24 1 47 47 1 28 22 1 47 1 1 45 46 1 1 47 53 55 52 1 1 7 43 2 1 1 1 43 25 1 4 53 1 45 43 16 55 52 4 47 55 45 22 51 56 1 38 13 30 2 28 56 13 56 28 55 26 4 16 46 1 1 16 1 1 1 1 1 47 59 4 8 38 58 1 1 48 1 7 22 1 1 1 60 27 52 4 30 56 53 52 54 1 30 52 1 16 54 7 58 1 30 54 1 56 51 53 56 57 56 4 60
  • 13. Output from Chakra Bandha Applied to first Chakra of Siri Bhoovalaya Resultant text after manually conjoining phonetic alphabets :
  • 14. Step – 5 Deriving Interlaced Multilingual Content Definition: Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. Application: Multilingual contents are interlaced into base content in Kannada and are extracted as per corresponding schemes applicable to each of different languages.
  • 15. Step -5 Example of Multi-Lingual content from First Adhyaya
  • 16. Step – 5 : Content in Prakrit & Samskrit from First Chakra
  • 17. Step -5 : Example of Multi-lingual contents from first Anubandh of Shrutavatar
  • 18. Step – 5 : Content in Prakrit, Geervan, Telugu, Tamil & Apabhramsh from first anubandha of Shrutavatar
  • 19. Chitra Bandha / Chitra Kavya Visual Cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes the job of the person to decrypt via sight reading. Application: Muni Kumudendu has vividly used Chitra Bandha to demostrate his brilliance as graphics artist too. This is also one of justification of his using two dimensional arrays (27x27 matrix ) as a Canvas for Chitra Kavya.
  • 20. Visual Cryptography (Chitra Bandha) example In following example a graphical figure is used as key to extract the hidden message.
  • 21. Superimposing the figure on Chakra at defined position to reveal content in those particular cells in manner as shown
  • 22. Derivation of Shrutavatar Chakra from Mangal Prabhrut Chakra
  • 23. Why Muni Kumudendu is Inimitable? • Master Mathematician who shone with brilliance in creating intricate framework of Chakras and Bandhas. • Eminent Scholar of religious foundations, scriptures, practices and ancient sciences of diverse domains. • Highly Competent Linguist with proficiency in multiple languages prevalent in India at his time. • Extremely genius poet who chose two-dimensional array of numerals for his creative expressions. • Great Composer who intertwined verses in multiple languages into a solitary piece of magnificient work. • Exceedingly Talented Graphics artist who could implant poetry into multitude of shapes and figures.
  • 24. Importance of further Research • Rajendra Prasad, the first President of India, called it one of the ‘Wonders of the World'. Giants of Kannada literature have evinced keen interest in this magnificent creation. Prof Suniti Kumar Chatterjee have exclaimed that the work deserved a doctorate by several universities. • Dr S. Srikanta Sastri, a highly respected name in the study of Indian history and culture, has commented vividly on the importance this unique work from many-fold perspectives.
  • 25. Research Areas from Computer Science Perspective 1. Development of Algorithms for different categories of Bandhas. (Matrix to Row transformation) 2. Digitisation of all Chakras suitable for Computer processing. 3. Derivation of Chakras of other Khandas from Mangal Prabhrut. 4. NLP (Natural Language Processing) / Computational Linguistics implementation for language specific grammar rules on the content derived for different languages and translation thereof. 5. Integration of IPA (International Phonetic Alphabet) and cross platform Speech conversion. 6. Multilingual content extraction from base content, classification and indexing of entire content suitable for search engines.
  • 26. Major Challenges • There exist no Credible Platform or Forum which can bring together persons pursuing research on Siri-Bhoovalaya. There are many islands of endeavour but no bridges to consolidate and promote sharing amongst them. • Teams consisting of Mathematicians, Linguistics, Subject Matter Experts / Scholars and Computer Scientist are needed in order to fully unearth the hidden treasure buried inside this masterpiece. Efforts in this direction is not visible. • Very small cross-section of individuals are not only able to appreciate Siri-Bhoovalaya, but have not even heard of it, as there has been very little effort for public awareness towards this unparalleled masterpiece. It should not only be considered a matter of pride for Kannada speaking population but must be accorded honour as a unique World Heritage. This is more so because Muni Kumudendu used numerals, which are universal symbols, instead of any language specific alphabets.
  • 27. Siri Bhoovalaya: A Unique Multilingual Epic Scripted in Numerals
  • 28. An Inimitable Cryptographic Creation: Siri Bhoovalaya
  • 29. Creativity in Cryptography: An Epic Scripted in Numerals only