Jade Authentication–How to Authenticate Jade Artifacts Without Unearth Report?

4249837588-3449265945-21-0It is believed that the quantity of jade artifacts without unearth report is far greater than those  with unearth report. As a result, the chance to authenticate jade artifact without unearth report is quite often.  As mentioned earlier in this handbook, jade authentication involves medium identification, antiquity evidences identification and period identification. As far as jade authentication is concerned, the availability of unearthed report is only relevant to period identification. It is not easy to identify the period of jades under the condition of without supporting evidences such as scripts appeared on the jades or any documents relevant to the particular jade. In addition, there are no standard or universally accepted methods of jade authentication without unearthed report for the present time.  Topological attributes comparison methodology is proposed here before any trustworthy method has already been accepted  by most of the people.

The topological attribute comparison methodology contains the following three procedures:

First, we select a sample jade artifact either with unearth report or has been identified by the public museum that was designated as a specific period.Second, we list as many topological attributes of the sample as we can. These attributes cover the antiquity phenomena due to chemical and physical factors, the motifs, carving style, craftsmanship  and hole drilling pattern described earlier in this handbook. Third, we map the attributes of the item to be identified with those of the sample item. If we end up with all the attributes matched, then we can infer that the item to be identified should be from the same period of the sample item.

The percentage of the attributes matched may be used as the probability of the object under investigation is from the same period. For example, if 90% of the attributes matched, then we can infer that the item to identify has a probability of 90% from the same period of the sample item. For the safe consideration, at least 70% is required to be confident that the item to be identified can be inferred from the period of the sample item .bcfc5aaagdf422f1a7ef6690

If the period of the jade artifact to be authenticated has no reference jade artifact with unearth report, then we may use artifacts of different material such as bronze which has scripts to find the clues.  For example, we have applied this method for the authentication of the Shin dynasty (AD. 8-25) Octagon-shape Jade Container with Dragon and Phoenix Motif and Inscriptions. For jade seal, the Authentication should be based on the scripts on the base and the style of motifs such dragon & phoenix of the handle.

These is one interesting nonscientific method used by Chinese seasoned jade collectors is referred as hand feeling method. The method used is to rub the jade for several times with thumb to see whether it is shining and have an oiliness but not sticky feeling. If it is shining and oily, it is antique jade. If the jade is not shining and astringent, then it is modern. That is why many Chinese experts insist on touching the jade by hand to believe instead of only seeing it.  They also claim that only studying the documents and the visiting the museums without investigating your own collection will not make you a real antique jade expert.

It should be noted that many private museums in China of recent years may collect fake items. Even public museums, sometimes the collection procedure is not so strict, in the case of Han’s seal of an empress is one example, in my opinion.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s