Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Generalized Fibonacci Numbers and Applications Sarkis Agaian Stanford University Student Member, IEEE [email protected] Abstract— The present paper relates to the methods for data efficient, accessible, and secure. Traditionally, barcodes have encoding and the reading of coded information represented by represented data in the widths and spacings of black parallel colored (including monochrome/black, gray) symbols (bars, lines. They are now referred to as linear or 1D (1 dimensional) triangles, circles, or other symbols). It also introduces new barcodes or symbologies. Since such barcodes use two types algorithms for generating secure, reliable, and high capacity of symbol elements, however, they carry a limited amount of color barcodes by using so called weighted n-dimensional random Fibonacci number based representations of data. The information with few security features. As a result, other types representation, symbols, and colors can be used as encryption of symbologies, most notably 2-D and color barcodes, have keys that can be encoded into barcodes, thus eliminating the been developed to offer more capabilities than their linear direct dependence on cryptographic techniques. To supply an counterpart [7]. extra layer of security, one may encrypt given data using different types of encryption methods. 2D barcodes can be broadly classified as either stacked symbology or matrix code. Stacked symbology, also called Keywords—Color barcode, Weighted n-dimensional random multi-row code, is created by “stacking” a series of linear Fibonacci sequences, Fibonacci numbers, Fibonacci p-code, barcode on top of each other. Matrix code is made up of black Cellphones and white "cells.” These “cells” represent bits and are arranged I. INTRODUCTION in either a square or rectangular shape. Both types of 2D codes differ from their 1D counterpart in that they are not “vertically Since the 20th century, barcodes have provided optical redundant.” In other words, while linear code can be truncated machine-readable representations of data. Initially used to in height with any lost of information, 2D code contains label railroad cars, barcodes are now laid on almost every essential data in both its length and height. Using both medium, from paper and cardboard to skin and DNA to dimensions allows 2D code to store more information. plastics and metals [1]. Their widespread use can be attributed However, vertical redundancy increases the probability that to their low cost, portability, and high information capacity [2- damaged barcodes will be read. The higher the height of the 5]. In spite of a range of competing technologies, such as barcode, the more likely the scanner will be able to read one RFID, barcodes continue to offer the most cost effective path along the lines [10]. As a result, 2D code uses some of its means of tracking information: it costs about $0.005 to additional data capacity to prevent misreads and provide a implement a barcode, while a passive RFID, for instance, may satisfactory read rate, often by encoding extra data for error run from $0.07 to $0.30 per tag. Moreover, with constantly correction [8]. improving technology, the potential and demand for barcodes continues to increase. Variations on such symbologies have been examined and proposed in various studies [2]. One such variation is the color The rise of inexpensive cameras in technologies such as barcode, which was invented in [18-20]. Examples of color cellphones or webcams has increased consumer use of symbologies include the High Capacity Color Barcode barcodes. These technologies can incorporate built-in scanning (HCCB) of Microsoft Inc [11] and the Color Bar Code System software that allows the consumer to receive pertinent product of Imageid Ltd.[12]. HCCB, for instance, uses colored information from a captured barcode image. The software triangles instead of black and white lines or squares, each of includes a computer vision algorithm that localizes and which can be one of four colors: black, red, green and yellow. segments the image, extracts the bits of information, and The color barcodes not only hold aesthetic value, but also store passes them on the appropriate decoder. Once the product is more information in the same physical size of the code [10]. identified, software program retrieves its relevant information However, the most immediate applications for such to the consumer [6]. symbologies is limited to identifying commercial audiovisual works such as motion pictures, video games, broadcasts, Many companies that offer such technology have developed digital video recordings and other media [10]. Figure 1 (a)-(d) their own unique, proprietary barcode formats that are better provides examples of typical 2-D barcodes and their color geared toward mobile apps [7]. Such efforts are part of a larger variations. The primary criterion for judging the aim to seek new ideas in making barcode systems more aforementioned barcodes is their performance. That is, given its size, how much information can the symbology store 3584 978-1-4244-2794-9/09/$25.00 ©2009 IEEE of barcode can be found in the following patents [4, 6, 8, 9, 23 -34, 36, 37]. Barcode performance is usually evaluated by three basic criteria: reliability, density, first time read rate. We will add here two more criteria security and cost. First time read rate: Present barcodes and barcode reading devices/scanners suffer from poor first time read rates, i.e., the Figure 1. Examples of Barcode: (a) PDF417 code 128; frequency with which a particular barcode using given (b) QR; (c) Data Matrix; (d) HCCB [11] apparatus may be required to pass a product over the scanner several times before the equipment accepts the barcoded and how efficiently and inexpensively can this information be information in order to input its information, often measured machine read? In an increasingly complex society, however, in percentage. An illustrative example of this problem is UPC many of our present technologies require information dense code and supermarket scanners. A barcode's reliability, or symbologies. In order to accommodate applications such as how well it avoids misreads, is a function of error exposure. the labeling of semiconductor packages or credit card labeling, Two distinct forms of error detecting have been used: as well as labeling sight, sound, or software media, there exists individual character error detecting and overall symbol error a need for encoding several hundred to several thousand detecting. Density: The number of characters per unit length alphanumeric characters [21]. Present symbologies, in other represented by the barcode symbol is referred to as the density words, do not have the information capacity required in of the symbol. The density (high capacity) of a barcode is today's Information Age. measured in characters per inch. It can be shown that density depends of encoding techniques and the printing quality of a Present symbologies also lack the security features to ensure barcode. Barcode security is defined as either a protection of the legitimacy of products. Counterfeit products, in the form of barcodes against unauthorized access or a technique for lottery tickets, casino chips, tokens, currency, coupons, etc., ensuring that barcoded information cannot be read or now divert billions of dollars annually from legitimate compromised by any individuals without authorization. businesses and governments. Current attempted solutions to resolve the counterfeit problem, such as the use of holograms Fibonacci and Lucas Numbers: Fibonacci and Lucas for credit cards and special paper and inks for currency, are (Francois-Edouard-Anatole Lucas) numbers can be presented based on the difficulty of counterfeiters to make exact copies. recursively as: However, given the steady advance of technology, what can be f = f + f l = l + l (1) k k − 1 k − 2 , k k − 1 k − 2 , made with authorization can be copied, for example by reverse where engineering, or can simply be made with unauthorized ffllk====>0, 1, 2, 1, 1. assistance or unauthorized access to the pertinent technology. 0101 Recently, electronic devices have been incorporated into Fibonacci P-codes: They are defined by the following products and/or their packaging. Even so, electronic devices recurrence: can be copied, and further, tend to add expense to a product ­ 00,if n ≤ [22]. Symbologies are thus needed to easily identify (p) ° if<≤+ n p Fn =1® 0 1, (2) counterfeit products without incurring significant costs. ° F(p) + F (p) if n>p+1 ¯ n-1 n-p-1 In this paper, we introduce a new concept of generating ‘p’ is a non-negative integer such as 0,1,2,3,4….; secure, reliable, and high capacity barcode symbols by using parametric representations of data. The rest of this paper is Lucas P-codes: They are defined by the following recurrence: organized as followed. Section II introduces some necessary ­ pifn+=10, background. A concept of generating generation weighted n- (p) ° Lifnp=1 0<≤ , (3) dimensional random Fibonacci sequences are provided in n ® ° L(p) + L (p) if n>p Section III. A concept of generating color barcodes with ¯ n-1 n-p-1 security features is provided in Section IV. Section IV also ‘p’ is a non-negative integer such as 0,1,2,3,4….; presents an illustrative algorithm of generating weighted n- dimensional random Fibonacci sequences representation based Example: The initial sequences for the first five p-numbers are barcodes. A conclusion is reached in Section V. as follows: P Fibonacci p-numbers Lucas p-numbers 0 0,1,2,4,8,16,32,64,128,512,1024… 1,1,2,4,8,16,32, 64,128,256,512.. II. NUMBER REPRESENTATIONS AND BAR CODES 1 0,1,1,2,3,5,8,13,21,34,55,89,143… 2,1,3,4,7,11,18,29,47,76… BACKGROUND 2 0,1,1,1,2,3,4,6,9,13,19,28,41,60… 3,1,1,4,5,6,10,15,21,31,46… In this section, a background of barcodes and number 3 0,1,1,1,1,2,3,4,5,7,10,14,19,26,36.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages5 Page
-
File Size-