- Keshta-Raya Temple
- Beyond the Taj: Architectural Traditions and Landscape Experience in South Asia
- MacDougall, Robert D. (Robert Duncan), 1940-1987
- ca. 1625-1675
- Bishnupur (West Bengal, India)
- ID Number:
- Call Number:
- B-Q5 Bish 3.4 Kes 9a-6
- File Name:
- Malla Dynasty
- Work Type:
- friezes (ornamental areas)
- Image View Description:
- Ext. det.: upapitham and adhisthanam panels showing fighting figures, lions, and elephants
- Has two vaulted chambers edged with the characteristic Bangaldar eaves. The terracotta panels with courtly and hunting scenes are noteworthy. Dates: mid 17th C., probably 1655.
- Image and original data maintained by the Cornell University Library. This digital collection is a result of a long-term collaboration between Professor Bonnie G. MacDougall, Department of Architecture and Margaret N. Webster, Director of the George W. & Adelaide Knight Visual Resources Facility in the College of Architecture, Art and Planning.
- MacDougall, R. D.
Temple to Love: Architecture and Devotion in Seventeenth Century Bengal
Bloomington: Indiana University Press
Fine Art Library
NA6007.B4 655 2005
Michell, George, ed.
Brick Temples of Bengal: From the Archives of David McCutchion, Princeton, N.J.: Princeton University Press, 1983. Library Annex
- Bonnie G. MacDougall (original photographs)
- The images in the collection are protected by copyright, and the copyright holder is the Estate of their creator/photographer, Robert “Scotty” MacDougall. Images in the collection were created between roughly 1960-1987, and were digitized by Cornell University Library from a variety of negatives, positives, and slides retained by the Estate of the photographer. Cornell is providing access to the materials for research and personal use. The written permission of any copyright and other rights holders is required for distribution, reproduction, or other use that extends beyond what is authorized by fair use and other statutory exemptions. Responsibility for making an independent legal assessment of an item and securing any necessary permissions ultimately rests with persons desiring to use the item.