Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Authentication of an Old Violin by Multianalytical Methods

View through CrossRef
The paper presents the authentication of a Stradivari 1737 type violin, which belonged to the Romanian scientist Ştefan Odobleja. The analytical methods used in the study for assessing archaeometric characteristics of some component materials, along with the white degree and glycolysis rate measurements of the label that allowed an extensive evaluation of the violin, were OM, SEM–EDX, and micro-FTIR. The preparation binder (egg white from thin gypsum layers) and the varnish (identification of linseed oil and colophony components, alongside contamination impurities) were assessed in order to evaluate the artefact conservation state, as well as the restoration and counterfeiting interventions. We can conclude that the violin was done by a violin maker from the Stradivari family, and it is a replica of the violins of that period.
Title: Authentication of an Old Violin by Multianalytical Methods
Description:
The paper presents the authentication of a Stradivari 1737 type violin, which belonged to the Romanian scientist Ştefan Odobleja.
The analytical methods used in the study for assessing archaeometric characteristics of some component materials, along with the white degree and glycolysis rate measurements of the label that allowed an extensive evaluation of the violin, were OM, SEM–EDX, and micro-FTIR.
The preparation binder (egg white from thin gypsum layers) and the varnish (identification of linseed oil and colophony components, alongside contamination impurities) were assessed in order to evaluate the artefact conservation state, as well as the restoration and counterfeiting interventions.
We can conclude that the violin was done by a violin maker from the Stradivari family, and it is a replica of the violins of that period.

Related Results

Violin miniature in creativity by Liudmila Shukailo: features of the genre interpretation
Violin miniature in creativity by Liudmila Shukailo: features of the genre interpretation
Background. Rapidness of information flows of contemporary life enforces to concentrate a significant amount of information in small formats. This fact meaningfully increases socia...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Eklektik filosofis, teknis, dan psikologis bermain biola dalam pengembangan pembelajaran musik di Indonesia
Eklektik filosofis, teknis, dan psikologis bermain biola dalam pengembangan pembelajaran musik di Indonesia
In learning the violin, there are various kinds of challenges and obstacles, both technical and non-technical. Strong motivation is needed, supported by appropriate learning method...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
General Matters affecting the Violin to 1650
General Matters affecting the Violin to 1650
Abstract To understand the history of violin playing involves more than a narrow focus on the mechanics of manipulating the violin and bow. In earlier chapters we ha...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
This paper addresses the want for evaluating consumer authentication protocols and protection algorithms for networks. Specially, this paper specializes in the effectiveness and sa...
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
Abstract Starting with for, need change Enhanced authentication performance, the concept of multi-biometrics authentication systems has emerged as a promising solution in t...

Back to Top