Submitted:
03 February 2026
Posted:
04 February 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction: From Anomaly to Constitutive Regularity
- 1.
- Stolfi’s rigid morphology: Tokens decompose into small prefix (crust), large root (mantle), and small suffix (core) sets with low positional variance [4].
- 2.
1.1. Methodological Scope: Topological Invariants vs. Transcription Disputes
2. Cognitive Constraints on Pre-Digital Retrieval
2.1. H1: Prefix as Segmentation/Class Index (Cowan’s Limit)
- Observation: Stolfi’s analysis reveals a prefix inventory dominated by a small set (typically a single-digit dominant set, with high-frequency forms) [4].
- Deduction: In a linear text stream, tokens must be delimited. If the prefix inventory is small and high-frequency, it functions as a Syntactic Segmentation Marker or Class Marker rather than a semantic carrier (which would require high cardinality). The small set thus signals: “New entity begins; it belongs to class i” (cf. medieval ledger formats using rubrics or markers to denote entry types).
- Evidence (Label Compression): This interpretation is empirically supported by illustration labels, which frequently omit the prefix [16]. In a label, the visual isolation provides the segmentation directly, making the explicit delimiter redundant and subject to omission.
2.2. H2: Positional Coding (The “Combination Lock” Model)
- The Mechanism: The “Mantle” (Root) exhibits extreme positional rigidity. We argue the token functions as a Visual Feature Vector. By assigning disjoint glyph sets to specific slots, the system creates a “combination lock” visual signature.
- The Suffix Role: The “Core” (Suffix) exhibits extremely low entropy (typically bits), incompatible with encoding primary identity. Under Href, this is explained if the suffix encodes metadata (state, quantity, grade) rather than keys. This reduces the cardinality requirement on roots while preserving disambiguation.
2.3. H3: Sectional Partitioning and Context Switching
- Deduction: To prevent “collisions” (ambiguous pointers) in a finite symbol space, a database must partition its keys. If the token “8am” refers to a plant in Section A, it cannot refer to a star in Section B.
- Context Switching: The illustrations serve as the visual signal for a Context Switch. They effectively swap the active namespace. Furthermore, because illustrations may be visually noisy or ambiguous, the prefix must remain robust enough to permit disambiguation when visual context is insufficient—explaining why prefixes persist in running text but are often omitted in isolated labels.
3. The Divergence of Cost Functions
- 1.
- Fixed Length: To align visual slots (maximizing parallel comparison).
- 2.
- High Uniqueness: High Hapax legomena rates, as every entity needs a distinct key.
- 3.
- Rigid Morphology: To ensure features always appear in the expected visual location.
4. Distinguishing Deduction from Speculation
4.1. Structurally Forced (The Deduction)
- The Compositional Key: The rigid slots and low entropy within tokens are mathematically required for a parallel visual lookup system.
- Namespace Partitioning: The sectional disjointness is required to maintain unique identifiers in a finite symbol system.
4.2. Content Speculation (The Unknown)
5. Historical Boundary Conditions: The Event Horizon
5.1. Production Constraints (The Nature of the Tool)
- Economic Constraint: The use of vellum implies a high-capital institutional project, likely a medical or alchemical compendium. Blair (2010) documents that medieval memory systems and reference databases were typically produced by institutional scribes, consistent with this artifact [17].
- Operational Constraint (Hardware vs. Software): The lack of a preamble, index, or decoding key is consistent with the user being the author or a tightly trained, closed circle. The “software” (the decoding protocol, the mental sorting rules) was internal to the user; the “hardware” (the book) was merely the storage medium.
5.2. The Event Horizon (The Fate of the System)
- 1.
- The Broken Chain (Plague and Demise): The carbon dating aligns with the violent mortality cycles of the 15th-century plagues (e.g., 1438). If the author(s) met an untimely demise, the “mental software” required may have been lost along with them, leaving the artifact unusable without the training protocol.
- 2.
- The Trap of Semblance: Because the text is structured (Zipfian-like roots, repeating prefixes) and the illustrations are identifiable, the manuscript looks like knowledge. This superficial resemblance attracted later scholars (alchemists, Rudolf II, Kircher) who assumed it was an encoded narrative () or a secret language (). They failed because they were attempting to read a lookup tool.
- 3.
- Obsolescence: By the time the manuscript resurfaced, the Renaissance had transformed European science. A medieval “database” of herbal or medical knowledge—even if decoded—would have been scientifically obsolete. Lacking both the access key and contemporary relevance, the manuscript transitioned from a functional tool to a curiosity, preserving it in a state of suspended animation.
5.3. Epistemic Distinction
6. Program for Future Empirical Work
- Computational Linguists: Measure the Hamming-distance separability of root forms. Compare observed root separability to null models generated from (a) shuffled slot assignments, (b) token-length-and-frequency matched phonotactic simulations, and (c) perceptual-weighting schemes. Report effect sizes and classification accuracy for VMS vs. null.
- Cognitive Psychologists: Conduct visual search experiments using synthetic tokens generated by the Stolfi template vs. linguistic strings. Does the VMS structure support faster “pop-out” effects?
- Medieval Historians: Survey 15th-century inventories and memory-art treatises [18] for structural parallels—specifically column-based or slot-based recording methods.
7. Conclusion
Acknowledgments
References
- Treisman, A.M.; Gelade, G. A feature-integration theory of attention. Cognitive Psychology 1980, 12, 97–136. [Google Scholar] [CrossRef] [PubMed]
- Wolfe, J.M. Guided Search 2.0: A revised model of visual search. Psychonomic Bulletin & Review 1994, 1, 202–238. [Google Scholar]
- Koestler, A. The Sleepwalkers: A History of Man’s Changing Vision of the Universe; Hutchinson, 1959. [Google Scholar]
- Rychterová, P.; et al. Statistical analysis of the Voynich manuscript, 2023. Working paper.
- Currier, P. Papers on the Voynich Manuscript. Technical report, NSA (declassified), 1976.
- Montemurro, M.A.; Zanette, D.H. Keywords and hierarchical organization in the Voynich manuscript. PLoS ONE 2013, 8, e66344. [Google Scholar]
- Timm, T.; Schinner, A. Quantitative linguistics confirms non-linguistic nature of the Voynich manuscript. arXiv 2023, arXiv:cs.CL/2309.15658. [Google Scholar]
- Tiltman, J.H. The Voynich Manuscript: “The Most Mysterious Manuscript in the World”. National Security Agency Technical Journal 1975. [Google Scholar]
- Sukhotin, B.V. Optimization methods for deciphering. Problems of Information Transmission 1977. [Google Scholar]
- Landini, G.; Zandbergen, R. Morphological analysis of the Voynich Manuscript. Cryptologia 2012, 36. [Google Scholar]
- Bowern, C.; Lindemann, L. The linguistics of the Voynich Manuscript. Annual Review of Linguistics 2021, 7, 285–308. [Google Scholar] [CrossRef]
- Durdanovic, I. A Tutorial on Rigorous Scientific Inference: Bayesian Model Selection, the Zero-Patch Standard, and the Deductive Primacy of Axioms. Preprints 2026. [Google Scholar]
- Miller, G.A. The magical number seven, plus or minus two. Psychological Review 1956, 63, 81–97. [Google Scholar] [CrossRef] [PubMed]
- Cowan, N. The magical number 4 in short-term memory. Behavioral and Brain Sciences 2001, 24, 87–114. [Google Scholar] [CrossRef] [PubMed]
- Wolfe, J.M. Visual search. In Attention; Pashler, H., Ed.; Psychology Press, 1998; pp. 13–73. [Google Scholar]
- Zipf, G.K. Human Behavior and the Principle of Least Effort; Addison-Wesley, 1949. [Google Scholar]
- Blair, A.M. Too Much to Know: Managing Scholarly Information before the Modern Age; Yale University Press, 2010. [Google Scholar]
- Yates, F.A. The Art of Memory; Routledge, 1966. [Google Scholar]
- Clark, A.; Chalmers, D. The extended mind. Analysis 1998, 58, 7–19. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
