Feeds

Japanese lab recreates Mona Lisa's voice

'Leo, how long do I have to sit here?'

SANS - Survey on application security programs

A Japanese laboratory claims to have recreated the voices of the Mona Lisa and Leonardo da Vinci using "methods employed in criminal investigations", Physorg.com reports.

It's all pretty simple: the Japan Acoustic Lab "analyzed the skeletal structures of the historical figures' faces" and extrapolated the dulcite tones from there. Lab supremo Matsumi Suzuki explains on the MS Japan website (in Japanese, natch): "We believe we were able to create the voices that are very close to the real voices. Perhaps it was really how they really sounded."

Hmmm. Here's how former police engineer Suzuki created the audio Mona Lisa. First up, he estimated her height at 168cm (5' 6"), giving her "a relatively low tone for a woman". He admits: "We cannot tell exactly how tall she was. So we analyzed the length of her right middle finger" as well as factoring in the average height of Italian women. Ms Lisa also get a nasal tone "because of her relatively large nose".

As for Leo, Suzuki reckoned he was around 60 when he painted the Mona Lisa, so he used the famous self portrait of the bearded artist as a basis for his calculations. However, Suzuki admits: "Because the beard covers his jaws in his portrait, we could not tell his exact skeletal features. We assumed that he had a heavy-jowled face, giving him a nice, bass tone."

Enough. We should note at this point that Suzuki has in the past "collaborated with Japanese toy maker Takara Co. to create the smash-hit Bowlingual, which is said to interpret dog language" which in 2002 secured him a 2002 Ig Nobel Prize for "promoting peace and harmony between the species". ®

Bootnote

Actually, this is not quite as daft as it sounds. We recall a project some time back which sought to recreate the voices of Roman plasterers by analysing the ridges caused by their banter in wet plaster as they dragged their floats across the surface. The idea caused quite a bit of excitement in the academic community, although the only full sentence ever deciphered was from a villa in East Londinium, comprising a muffled: "Lucius, bring me another bucket of muck sharpish you fu*king muppet..."

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Melting permafrost switches to nasty, high-gear methane release
Result? 'Way more carbon being released into the atmosphere as methane'
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.