The Reconstruction of Images Encrypted in Nostradamus's "Prophecies"

Cover Page

Cite item

Full Text

Abstract

Previous historical and philological commentaries on Nostradamus' Prophecies by Prof. Brind'Amour, R. Prevost, P. Guinard, A. Penzensky, and D. Crouzet have led to the unexpected conclusion that many quatrains are uninformative as predictions; moreover, some of them describe events preceding the moment of publication, raising questions about the predictor's motivation. Against the background of the increased interest in the development of cryptology methods in the first half of the sixteenth century, it is appropriate to assume the existence of a hidden message in the Prophecies. Recent work by the author has shown that the text of the Prophecies contains two types of cipher. The modified algorithm "scytale" is used to change the sequence of quatrains and assign them specific dates in real time. Additionally, a sizeable graphical cipher is invisibly embedded in the text so that particular words or letters, mapped as stains on a plane in the coordinates "century number” or “quatrain number," lead to images of human faces. These images likely serve as illustrations of the prophetic text; however, their low quality and the cipher author's tendency toward surrealism make it challenging to identify the characters. This work proposes a new method for processing the raw data to obtain higher-quality images, called the "smooth assembly" method, and to discuss Nostradamus' graphical cipher in a historical context. The study's results suggest that Nostradamus' graphical cipher was a unique experiment in embedding images in text and had significant scientific value for developing steganography in the sixteenth century. This leads to the assumption that, in addition to predictive motivation (or instead of it), the cipher author pursued a purely scientific goal: creating a new promising method of covert information transmission.

References

  1. Benazra R. Repertoire Chronologique Nostradamique (1545–1989). Paris: La Grand Conjonction, 1990.
  2. Leroy E. Nostradamus: Ses origines, sa vie, son oeuvre. Marseille: Editions Jeanne Laffitte, 1972.
  3. Lemesurier P. The Unknown Nostradamus: The Essential Biography for His 500th Birthday. London: John Hunt Publishing, 2003.
  4. Brind'Amour P. Nostradamus astrophile : les astres et l'astrologie dans la vie et l'œuvre de Nostradamus. Ottawa: Presses de l'Université d'Ottawa et Éditions Klincksieck, 1993.
  5. Nostradamus, Les premières Centuries ou Prophéties / Ed. by P. Brind'Amour. Genève: Droz, 1996.
  6. Prévost R. Nostradamus, le mythe et la réalité: un historien au temps des astrologues. Paris: Le Grand livre du mois, 1999.
  7. Пророчества магистра Мишеля Нострадамуса. Перевод, вступительная статья, комментарии А.Пензенского. М.: Эксмо, 2006.
  8. Пензенский А.А. Нострадамус: миф и реальность. М.: Эксмо, 2003.
  9. Crouzet D. Nostradamus: une médecine des âmes à la Renaissance. Paris: Payot & Rivages, 2011.
  10. Strasser G.F. The Rise of Cryptology in the Europian Renaissance // The History of Information Security: A Comprehensive Handbook. Elsevier: Amsterdam, The Netherlands, 2007, Pp. 277-325.
  11. Разумов И.К. Гипотеза об использовании Нострадамусом криптографических методов для расстановки катренов в «Пророчествах». // Историческая информатика. 2024. № 1. С. 162-176. doi: 10.7256/2585-7797.2024.1.70073 EDN: AXGWPK URL: https://e-notabene.ru/istinf/article_70073.html
  12. Разумов И.К. Графический шифр Нострадамуса // Начала русского мира. 2023. №2. С. 38-63.
  13. Razumov I.K. Graphic cipher of Nostradamus. // SSRN, 14 Jan 2020, 3508575.
  14. Revaud J., Weinzaepfel P., Harchaoui Z., Schmid C. Epicflow: edge-preserving interpolation of correspondences for optical flow. // Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2015. Pp. 1164-1172.
  15. Карнаухов В.Н., Кобер В.И., Мозеров М.Г. Аналитическое решение для интерполяции разреженныx данных с использованием пространства близости геодезического расстояния: применение к задаче оптического потока и 3D реконструкции // Информационные процессы. 2020. Т. 20. №2. С. 69-78.
  16. Candès E., Romberg J., Tao T. Stable signal recovery from incomplete and inaccurate measurements. // Communications on Pure and Applied mathematics. 2006. V.58. №8. Pp. 1207-1223.
  17. Raghu K., Shaikh M.F., Siddiqui H.H., Sachin, Rakesh D. Sparse Image Reconstruction by employing Adaptive Gradient Algorithm in Image Steganography // Turkish Journal of Computer and Mathematics Education. 2021. V. 12. №11. Pp. 4996-5004.
  18. Candès E. Compressed sensing // IEEE Transactions on Information Theory. 2006. V. 52. №4. Pp. 1289-1306.
  19. Peczak P., Ferrenberg A.M., Landau D.P. High-accuracy Monte Carlo study of the three-dimensional classical Heisenberg ferromagnet // Phys. Rev. B. 1991. V.43. №7. Pp. 6087-6093.
  20. Raynaud D. A Critical Edition of Ibn al-Haytham's On the Shape of the Eclipse. The First Experimental Study of the Camera Obscura. New York: Springer International, 2016.
  21. Ilardi V. Renaissance Vision from Spectacles to Telescopes. Philadelphia, USA: APS Press, 2007.
  22. Чибисов К.В. Очерки по истории фотографии / Под ред. Н. Н. Жердецкой. – М.: Искусство, 1987. С. 15-23.
  23. Reeds J. (1998) Solved: The ciphers in book III of Trithemius’ Steganographia // Cryptologia. 1998. V.22. Pp. 291-317.
  24. Сейеди С. А., Садыхов Р. Х. Сравнение методов стеганографии в изображениях // Информатика. 2013. №1. С. 66-75.
  25. Kumar V., Laddha S., Aniket, Nitin Dogra N. Image and Text Steganography Using Convolutional Neural Network // TECNICA ITALIANA-Italian Journal of Engineering Science. 2021. V. 65. №1. Pp. 26-32.

Supplementary files

Supplementary Files
Action
1. JATS XML


Согласие на обработку персональных данных

 

Используя сайт https://journals.rcsi.science, я (далее – «Пользователь» или «Субъект персональных данных») даю согласие на обработку персональных данных на этом сайте (текст Согласия) и на обработку персональных данных с помощью сервиса «Яндекс.Метрика» (текст Согласия).