Difference between revisions of "Cracking the Voynich code 2022"

From Derek
Jump to: navigation, search
(Created page with "== Supervisors == *Prof Derek Abbott ==Masters students== *Reilly Heijkoop-Logan *Gregory Kontogonis ==Project guidelines== *[http://www.eleceng.ade...")
 
Line 10: Line 10:
  
 
==General project description==
 
==General project description==
 +
Building on the work of previous honours students, this project involves contributing to the growing body of knowledge aimed at deciphering the Voynich Manuscript. This 15th century text is written in an unknown script and has been an area of interest for cryptographic researchers for centuries.
  
 +
The specific goal of this project is to categorize characters in the Voynich script into alphabetical and non alphabetical groups. This outcome would be an invaluable piece of knowledge for future researchers to build on towards the goal of eventually deciphering the mysterious text.
  
 
==Useful notes==
 
==Useful notes==
Line 18: Line 20:
 
* The UN Declaration of Human Rights is translated into every language in the world and in principle you can compare the Voynich to all the existing languages for statistical proximity.  Electronic access is [http://www.ohchr.org/EN/UDHR/Pages/Introduction.aspx here].
 
* The UN Declaration of Human Rights is translated into every language in the world and in principle you can compare the Voynich to all the existing languages for statistical proximity.  Electronic access is [http://www.ohchr.org/EN/UDHR/Pages/Introduction.aspx here].
  
==Specific tasks==
+
==Specific tasks [WIP]==
  
 
'''Phase 1:''' Text investigation. The details are shown as follwoing:
 
'''Phase 1:''' Text investigation. The details are shown as follwoing:
Line 49: Line 51:
 
Re-check required deliverables and dates
 
Re-check required deliverables and dates
  
===Semester A===
+
===Semester A [WIP]===
  
 
* Proposal seminar (''' 04/04/2016 ''')
 
* Proposal seminar (''' 04/04/2016 ''')
Line 64: Line 66:
 
::[[File:Thesis(The_second_draft)_Yaxin_Hu.pdf]]
 
::[[File:Thesis(The_second_draft)_Yaxin_Hu.pdf]]
  
===Semester B===
+
===Semester B [WIP]===
  
 
* Final seminar (''' Monday, 31/10/2016 ''')
 
* Final seminar (''' Monday, 31/10/2016 ''')
Line 99: Line 101:
 
* [https://drive.google.com/open?id=0B-8PinpzYGtWWnRNdVg1Zno0OEU Voynich Manuscript Project 2016 Google Drive]
 
* [https://drive.google.com/open?id=0B-8PinpzYGtWWnRNdVg1Zno0OEU Voynich Manuscript Project 2016 Google Drive]
  
==Approach and methodology==
+
==Approach and methodology [WIP]==
 
We expect you to take a structured approach to both the validation and the writing of the software. You should carefully design the big-picture high-level view of the software modules, and the relationships and interfaces between them. Think also about the data transformations needed.
 
We expect you to take a structured approach to both the validation and the writing of the software. You should carefully design the big-picture high-level view of the software modules, and the relationships and interfaces between them. Think also about the data transformations needed.
  
Line 117: Line 119:
 
* The onus is on you to drive the meetings, make the appointments, and set them up.
 
* The onus is on you to drive the meetings, make the appointments, and set them up.
  
== Relationship to possible career path==
+
== Relationship to possible career path ==
 
Whilst the project is fascinating as you'll learn about a specific high-profile mystery—and we do want you to have a lot of fun with it—the project does have a hard-core serious engineering side. It will familiarize you with techniques in information theory, probability, statistics, encryption, decryption, signal classification, and datamining. It will also improve your software skills. The new software tools you develop may lead to new IP in the areas of datamining, automatic text language identification, and also make you rich/famous. The types of jobs out there where these skills are useful are in computer security, comms, digital forensics, internet search companies, and language processing software companies. The types of industries that will need you are: the software industry, e-finance industry, e-security, IT industry, Google, telecoms industry, [http://www.asio.gov.au/ ASIO], [http://www.asis.gov.au/ ASIS], defence industry (e.g. [http://www.dsd.gov.au/ DSD]), etc. So go ahead and have fun with this, but keep your eye on the bigger engineering picture and try to build up an appreciation of why these techniques are useful to our industry. Now go crack the Voynich...this message will self-destruct in five seconds :-)
 
Whilst the project is fascinating as you'll learn about a specific high-profile mystery—and we do want you to have a lot of fun with it—the project does have a hard-core serious engineering side. It will familiarize you with techniques in information theory, probability, statistics, encryption, decryption, signal classification, and datamining. It will also improve your software skills. The new software tools you develop may lead to new IP in the areas of datamining, automatic text language identification, and also make you rich/famous. The types of jobs out there where these skills are useful are in computer security, comms, digital forensics, internet search companies, and language processing software companies. The types of industries that will need you are: the software industry, e-finance industry, e-security, IT industry, Google, telecoms industry, [http://www.asio.gov.au/ ASIO], [http://www.asis.gov.au/ ASIS], defence industry (e.g. [http://www.dsd.gov.au/ DSD]), etc. So go ahead and have fun with this, but keep your eye on the bigger engineering picture and try to build up an appreciation of why these techniques are useful to our industry. Now go crack the Voynich...this message will self-destruct in five seconds :-)
  

Revision as of 14:08, 22 March 2022

Supervisors

Masters students

Project guidelines

General project description

Building on the work of previous honours students, this project involves contributing to the growing body of knowledge aimed at deciphering the Voynich Manuscript. This 15th century text is written in an unknown script and has been an area of interest for cryptographic researchers for centuries.

The specific goal of this project is to categorize characters in the Voynich script into alphabetical and non alphabetical groups. This outcome would be an invaluable piece of knowledge for future researchers to build on towards the goal of eventually deciphering the mysterious text.

Useful notes

  • Download the digital Voynich from here.
  • The UN Declaration of Human Rights is translated into every language in the world and in principle you can compare the Voynich to all the existing languages for statistical proximity. Electronic access is here.

Specific tasks [WIP]

Phase 1: Text investigation. The details are shown as follwoing:

  • The total number of words.
  • The frequency of words.
  • The number of simple letters.
  • The frequency of simple letters.
  • Comparing the Voynich manuscript with other known languages.
  • Find patterns in known language digits.
  • Locate similar patterns in the Voynich manuscript.
  • Search any relationship between the patterns and digits.


Phase 2: Illustrations investigations is associated to the digitals investigation. It will follow several steps:

  • Locate all the images that contains one thing that appears more than once in an image.
  • Number the time that things appears in each image.
  • Trying to search words nearby the image that may conform any digital patterns in known language digits.
  • Decode all the digits if step c is success.


Phase 3: Marginal symbol research. The tasks are shown as following:

  • Statistics for marginal stars of each page, such as the number of marginal stars, the types of stars, the location of stars.
  • Extract the characters which may stand for digits from the Voynich manuscript.
  • Statistics the characters which are extracted in the last step, such as the occurence frequency of characters.
  • Make a chart according to the order of the occurence frequency of those characters. Then make a matching between characters and digits.
  • Infer the potential relationship between characters and digits.

Deliverables

Re-check required deliverables and dates

Semester A [WIP]

  • Proposal seminar ( 04/04/2016 )
File:Proposal Seminar Slides (semester 1).pdf
  • Thesis draft 1(22/04/2016)
File:A1674940 Ruihang Feng 1st thesis draft.pdf
File:Thesis (The first draft) Yaxin Hu .pdf
  • Thesis draft 2(week 12 Semester 1)
File:A1674940 Ruihang Feng the 2nd thesis draft.pdf
File:Thesis(The second draft) Yaxin Hu.pdf

Semester B [WIP]

  • Final seminar ( Monday, 31/10/2016 )
File:Masters project 141 2016 final seminar.pdf
  • Final group Report/Thesis ( Monday, 31/10/2016 )
The Wiki page version.
Cracking the Voynich Code 2016 - Final Report
The PDF version.
File:Masters project 141 final thesis.pdf
  • Final individual Report/Thesis ( Monday, 31/10/2016 )
File:Masters project 141 the final thesis Ruihang Feng 1674940.pdf
File:Project Final Yaxin Hu-a1672395.pdf
  • Poster ( Monday, 24/10/2016 )
File:Project 141 Exhibition Poster.pdf
  • Project Exhibition - Ingenuity 2016 ( Thursday - Friday, 27/10/2016 - 28/10/2016 )
  • Labelled CD or USB stick containing your whole project directories. Only one is needed but it should contain two project directories, ie. one for each group member ( By Friday 04/11/2016 )
  • YouTube video summarizing project in exciting way - add the URL to this wiki - only one needed ( By Friday 04/11/2016 )
Project 141: Cracking the Voynich Code 2016

Weekly progress and code

Weekly progress.

Code files can also be found on the project team's Google Drive. This can be viewed below:

Approach and methodology [WIP]

We expect you to take a structured approach to both the validation and the writing of the software. You should carefully design the big-picture high-level view of the software modules, and the relationships and interfaces between them. Think also about the data transformations needed.

Expectations

  • We don't really expect you to crack the Voynich, though that would be cool if you do and you'll become very famous overnight.
  • To get good marks we expect you to show a logical approach to decisively eliminating some languages and authors, and finding some hints about the statistical nature of the words.
  • In your conclusion, you need to come up with a short list of possible hypotheses and a list of things you can definitely eliminate.
  • We expect you to critically look at the conclusions of the previous work and highlight to what extent your conclusions agree and where you disagree.
  • It is important to regularly see your main supervisors. Don't let more than 2 week go by without them seeing your face briefly.
  • You should be making at least one formal progress meeting with supervisors per month. It does not strictly have to be exactly a month, but roughly each month you should be in a position to show some progress and have some problems and difficulties to discuss. On the other hand the meetings can be very frequent in periods when you have a lot of activity and progress to show.
  • The onus is on you to drive the meetings, make the appointments, and set them up.

Relationship to possible career path

Whilst the project is fascinating as you'll learn about a specific high-profile mystery—and we do want you to have a lot of fun with it—the project does have a hard-core serious engineering side. It will familiarize you with techniques in information theory, probability, statistics, encryption, decryption, signal classification, and datamining. It will also improve your software skills. The new software tools you develop may lead to new IP in the areas of datamining, automatic text language identification, and also make you rich/famous. The types of jobs out there where these skills are useful are in computer security, comms, digital forensics, internet search companies, and language processing software companies. The types of industries that will need you are: the software industry, e-finance industry, e-security, IT industry, Google, telecoms industry, ASIO, ASIS, defence industry (e.g. DSD), etc. So go ahead and have fun with this, but keep your eye on the bigger engineering picture and try to build up an appreciation of why these techniques are useful to our industry. Now go crack the Voynich...this message will self-destruct in five seconds :-)

See also

Useful papers we wrote

[1] M. Ebrahimpour, T. J. Putniņš, M. J. Berryman, A. Allison, B. W.-H.-Ng, and D. Abbott, "Automated authorship attribution using advanced signal classification techniques," PLoS ONE, Vol. 8, No. 2, Art. No. e54998, 2013, http://dx.doi.org/10.1371/journal.pone.0054998

[2] M. J. Berryman, A. Allison, and D. Abbott, "Statistical techniques for text classification based on word recurrence intervals," Fluctuation and Noise Letters, Vol. 3, No. 1, pp. L1–L12, 2003.

References and useful resources

If you find any useful external links, list them here:

Back