AI Fills In The Missing Gaps From Ancient Greece

At some point during the 5th century BC ancient Athens embraced a more aggressive foreign policy. The tributes demanded from allies grew larger, military actions against those who revolted more vicious. For decades historians have argued over whether it was the great general Pericles or a successor who oversaw this shift. 

Now, Artificial Intelligence (AI) has entered the debate and could bring ancient texts back to life. Researchers have developed an Artificial Intelligence (AI) model which deciphered texts missing from ancient Greek inscriptions and has even dated them, helping historians decipher ancient text. 

Ancient history relies on disciplines such as epigraphy, the study of inscribed texts known as inscriptions for evidence of the thought, language, society and history of past civilisations. However, over the centuries, many inscriptions have been damaged to the point of illegibility, transported far from their original location and their date of writing is steeped in uncertainty. 

AI is transforming many areas of research, and a new AI tool helps to fill in missing text and estimate the time-frame and geographical origin of ancient inscriptions. A system created by DeepMind has been “trained” to analyse decrees from the ancient Athenian empire.

These written records, carved in stone, reflect decisions made by the leaders of Athens but are often damaged. The team of AI researchers at DeepMind, working with colleagues from the University of Venice, the University of Oxford and Athens University of Economics and Business, has developed an AI application to help historians fill in the gaps of text missing from stone, metal or pottery artefacts. 

These AI and Machine Learning techniques are providing new tools that could help archaeologists understand the past, particularly when it comes to deciphering ancient texts.

DeepMind’s AI model not only restore text that is missing from ancient Greek inscriptions but offers suggestions for when the text was written, within a 30-year period, and its possible geographic origins. “Inscriptions are really important because they are direct sources of evidence ... written directly by ancient people themselves,” Thea Sommerschield, a distinguished historian and machine learning expert who has helped created the model, told journalists in a press briefing.

And new software, named Ithaca, is trained on a dataset of some 78,608 ancient Greek inscriptions, each of which is labelled with metadata describing where and when it was written, to the best of historians’ knowledge. Like all Machine Learning systems, Ithaca looks for patterns in this information, encoding this information in complex mathematical models, and uses these inferences to suggest text, date, and origins.

Nature:    Greek Reporter:    The Times:    The Verge:    TechXplore:    Techcrunch:    TRT:     

You Might Also Read:

Using Artificial Intelligence To Fight Cancer:

 

« The Limits Of Social Media Soft Power
Hacker Behind Kaseya Ransomware Attack Extradited »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).