SlideShare a Scribd company logo
Archive-enabling Tagging Using
Progressive Barcodes
Steven Simske and Marie Vans
HP Labs; Fort Collins, Colorado
May 22, 2015
1
Agenda
• Barcodes
• Progressive Barcodes
• Archiving Applications
• Inference Model
• Conclusions
2
http://usahitman.com/wp-
content/uploads/2011/08/baby_ba
rcode.jpg
http://beqrious.com/wp-
content/uploads/2012/01/train-tickets.jpg
http://articlesweb.org/blog/wp-
content/uploads/2012/08/Does-
Many-Barcode-Tattoos-Have-
Something-to-do-With-Many-
People-08.jpeg
Barcodes
i. 1 Dimensional -
ii. 2 Dimensional -
iii. 3 Dimensional –
iv. 4 Dimensional -
3
Data Capacity
11 numeric digits
Data Matrix: 2335 bytes
Aztec: 1914 bytes
QR-Code: 3706 bytes
2.585 bits/tile for 6
colors: RGBCMY
𝑋𝑌 log2 𝑛 𝑏𝑖𝑡𝑠
Non-Standard Barcodes
4
ColorTile
Progressive Barcode
Non-payload indicia
Non-payload indicia
The example shown here comprises:
1. 64 data tiles, max 165 bits total
2. 8 non-payload tiles:
a. Two black for orientation & corner
detection
b. 6 color {RGBCMY} for color
calibration
c. Colors are 180 rotated from their color opponency
pair, providing the greatest contrast in hue space and thus
the most reliable opposite-corner orientation detection
possible
Example Progression
5
• Reader-Friendly
Progressive
Barcodes
• Columns indicate
progression along
workflow
• Colors saturated
enough so that 2D
barcode reader still
interprets them as
“white”
• 2D barcode reads the
same throughout the
progression.
Progressive Barcodes - Statistical Probability
6
• Statistical probability assigned at each step of the progression
• Associated with any transition between two steps in a workflow
• Based on how many bits are written and how many remain

i
i
RB
IU
P
N
N
!
!
Pi = Step i
NRB = the number of residual (0 bits) at end of the workflow
NIU = number of initial unwritten bits
Progressive Barcodes - Statistical Probability
7
• If barcode is unique at step i-1, then total number of barcodes of the current
state is 1.
• If the progressive barcode is binary, then the number of bits in the workflow is
NRB-NIU.
• If there are NC colors, number of bits increases to:
𝑙𝑛 𝑁 𝑐
𝑙𝑛 2 ∗ 𝑁 𝑅𝐵 − 𝑁𝐼𝑈
• The size (height and width in tiles) of progressive barcode used in the
workflow can be determined from these equations along with the number of
bits to write at each state
Progressive Barcodes - Data Capacity
8
• Each color tile independent
• Define a tile to be N-ary, where N = number of colors allowed at each tile:
log2 𝑛
log2 2
= log2 𝑛 𝑏𝑖𝑡𝑠 𝑎𝑡 𝑎𝑛𝑦 𝑠𝑡𝑎𝑔𝑒
• n=2, e.g. DataMatrix, QR, Aztec: 1 bit per tile
• Color tile with six colors {RGBCMY}: 2.585 bits/tile
• 8 colors allowed {RGBCMYWK}: 3.0 bits/tile
• Color tile barcode X data tiles wide & Y data tiles high contains exactly:
𝑋𝑌 log2(𝑛) 𝑏𝑖𝑡𝑠
• 120x120 DataMatrix barcode with 8 colors allows for 120*120*3 = 43, 200
bits or 5400 bytes >> 1800 bytes using black & white only
Progressive Barcodes for Archiving
Applications – Static Channel
9
• Amount of data that to be encoded in first set of data limited by
the total number of black & white tiles available & standards.
• URLs to websites - QR Codes
• Data Matrix - serial numbers, invoicing information or product
numbers.
• Possible to encode other information;
• xml fields for archiving purposes,
• ISBNs, other document-related information
• The main characteristic is that information remains static over
time.
Progressive Barcodes for Archiving
Applications – Dynamic Channel
10
• Second channel of information can be encoded into the white tile channel
• Track and store documents
• Versioning or tracking document changes
• Assign ownership of documents.
• “Hybridization” allows for multiple services:
• open services and proprietary services
• Encoding of a website URL along with security/authentication services.
• These barcodes are readable by any off-the-shelf, QR Code and the Data
Matrix code readers.
• The Data Matrix code can store a large quantity of data in the black-as-black
and rest-as-white tiles.
Progressive Barcodes for Archiving
Applications – Two Channels
11
Demonstration of barcode with two channels. The black and rest-as-
white will read with an off-the-shelf reader, the right Data Matrix will
display an abstract and the left QR-Code displays a test message.
Hybrid barcodes with Progression in the Color
Channel
12
Layer 1
Layer 2
Same barcodes with progression
Barcodes don’t change
Inference for Archiving Data
13
D:Computer containing files C: Directory with files B: My Document with images A: Individual images
• Inference is the relationship between objects and their containers:
• Individual objects (e.g. images) A
• Packaged into file B: At(Bu,Bu+1,Bu+2, …, Bu+v-1)
• Multiple files contained in folders C: Cq(Br,Br+1,Br+2, …, Br+s-1)
• Multiple folders per computer D:
D←{C} ← {B} ← {A}
Dn(Cm,Cm+1,Cm+2, …, Cm+p-1)
Inference for Archiving Data
14
• How many tags (barcodes) are required to tag n(A) items when they are
inferred to B, C and D containers
• The following ratios are very important: n(A)/n(B), n(B)/n(C), and n(C)/n(D).
• We create series of cryptographically secure tags, in sequence, and assign
them to the containers they are representing as follows:
(D) (C) (B) A….A (B) …. (B) A….A (B) (C) …. (C) …. (C) (D)
• Example:
• Label the associated C, B and A items:
• “A” items: n(A)*n(B)*n(C) tags -- 4*3*1 = 12
• “B” items: 2*n(B)*n(C) tags -- 2*3*1 = 6
• “C” items: 2*n(C) tags – 2*1 = 2
Inference for Archiving Data - Continued
15
• The overall number of identifiers required, nIDs required, is:
  

M
Bi
M
ij
M
Aj
requiredIDs jnjnn )(*2)(_
)]()(*)()(*)(*)([*2)(*)(*)(*)(_ DnDnCnDnCnBnDnCnBnAnrequiredIDsn 
(3)
• Thus, if M=4 (for the A, B, C, D example above):
where M = levels of containment: M=alphabetic (levels of containment, where M is for Matryoshka,
since it is a Russian doll model )
Inference - Use
16
• This model for inference allows a wide variety of possibilities.
• If tags on individual items {A} cannot be read –
• Labeled with barcodes and inside a folder that cannot be
read due to permission issues
• The tags on the folder B, would correspond to the start
and end of the sequence of tags corresponding to the two
on container B and all of the individual tags on the A items
within.
Document Storage using Inference for tagging
17
Another Inference Example – GS1
18
GS1:
734236023450
GS1:
734236023450
GS1:
734236023450
GS1:
734236023450
DS DS DS
Inferenced or Identical Inferenced or Identical Inferenced or Identical
Pallet Case Carton
Individual
Unit
Tags from GS1: standards for supply chain workflows. Image based on single GS1 tag that is
readable via inference even at the pallet level.
Relative & Absolute inference
19
• Want to ensure that multiple items infer to the same container in a
statistically meaningful way
• Relatively - No connection to an on-line database
• Relative inference is established when there is a mechanism for associating
a container with an item and vice versa
• Absolute inference requires approval of two or more binary strings
simultaneously
• With or without the overlying relative inference model
• Easiest absolute inference:
• Association of two binary strings in database
• Another form:
• When two strings related to each other through algorithm or process
• E.g., C=digital signature(I)
• C=scrambling_algorithm(I)
Conclusions
20
• Progressive barcodes ideal mechanisms for applications & services that:
• Take advantage of two channels of information encoded into a single
mark that does not change size over time
• Suitable for document workflow tracking and archiving solutions where data
for one channel does not change
• serial numbers, document IDs, MARC and other archiving information
• Channel represented as color tiles can change over time:
• tracking, security, and other purposes
• Using inference, possible to contain objects inside other objects and verify
their authenticity without having to open the container
• Other archiving applications – I am interested in ideas!
Thank You for Your Kind Attention
21
Welcome to the “Marker Revolution”

More Related Content

Viewers also liked

Algebra - I bimestre.
Algebra - I bimestre.Algebra - I bimestre.
Algebra - I bimestre.
Micaela Uribe Cordova
 
Expresiones Algebraicas Y Sus Operaciones
Expresiones Algebraicas Y Sus OperacionesExpresiones Algebraicas Y Sus Operaciones
Expresiones Algebraicas Y Sus Operaciones
guest5d8d8531
 
La Marca del Jaguar
La Marca del JaguarLa Marca del Jaguar
La Marca del Jaguar
viktor76gdl
 
Waodeandi594
Waodeandi594Waodeandi594
Waodeandi594
Warnet Raha
 
Urea azufre-melaza
Urea azufre-melazaUrea azufre-melaza
Urea azufre-melaza
Diego Vinueza
 
What We Do To Eat
What We Do To EatWhat We Do To Eat
What We Do To Eat
Sandy Kress
 
mortgage
mortgagemortgage
mortgage
samtbs2
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
Cordeiro Plásticos
 
Mensagem de um jovem advogado
Mensagem de um jovem advogadoMensagem de um jovem advogado
Mensagem de um jovem advogado
robertotroia
 
Presentacion Herramientas Gerenciales Equipo 2
Presentacion Herramientas Gerenciales Equipo 2Presentacion Herramientas Gerenciales Equipo 2
Presentacion Herramientas Gerenciales Equipo 2
rreysid
 
Puma’s dilemma
Puma’s dilemmaPuma’s dilemma
Puma’s dilemma
Kundai Nangati
 
How can media and communication support cliamte adaptation
How can media and communication support cliamte adaptationHow can media and communication support cliamte adaptation
How can media and communication support cliamte adaptation
NAP Events
 
Working with NodeJS
Working with NodeJSWorking with NodeJS
Working with NodeJS
Vu Tran
 
Boletim informativo de Sorocaba - Novembro de 2009
Boletim informativo de Sorocaba - Novembro de 2009Boletim informativo de Sorocaba - Novembro de 2009
Boletim informativo de Sorocaba - Novembro de 2009
Governo do Estado de São Paulo
 
Practica6 ensayo traccion_alvarogarciacamaron
Practica6 ensayo traccion_alvarogarciacamaronPractica6 ensayo traccion_alvarogarciacamaron
Practica6 ensayo traccion_alvarogarciacamaron
Alvarogarcy
 
Muffins
MuffinsMuffins
OBRA Y OBREROS EN VENEZUELA. AÑO 2011. BOLETÍN No. 49
OBRA Y OBREROS EN VENEZUELA. AÑO 2011. BOLETÍN No. 49OBRA Y OBREROS EN VENEZUELA. AÑO 2011. BOLETÍN No. 49
OBRA Y OBREROS EN VENEZUELA. AÑO 2011. BOLETÍN No. 49
CPV
 

Viewers also liked (18)

Algebra - I bimestre.
Algebra - I bimestre.Algebra - I bimestre.
Algebra - I bimestre.
 
Expresiones Algebraicas Y Sus Operaciones
Expresiones Algebraicas Y Sus OperacionesExpresiones Algebraicas Y Sus Operaciones
Expresiones Algebraicas Y Sus Operaciones
 
La Marca del Jaguar
La Marca del JaguarLa Marca del Jaguar
La Marca del Jaguar
 
Waodeandi594
Waodeandi594Waodeandi594
Waodeandi594
 
Urea azufre-melaza
Urea azufre-melazaUrea azufre-melaza
Urea azufre-melaza
 
What We Do To Eat
What We Do To EatWhat We Do To Eat
What We Do To Eat
 
mortgage
mortgagemortgage
mortgage
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
 
Mensagem de um jovem advogado
Mensagem de um jovem advogadoMensagem de um jovem advogado
Mensagem de um jovem advogado
 
Presentacion Herramientas Gerenciales Equipo 2
Presentacion Herramientas Gerenciales Equipo 2Presentacion Herramientas Gerenciales Equipo 2
Presentacion Herramientas Gerenciales Equipo 2
 
Puma’s dilemma
Puma’s dilemmaPuma’s dilemma
Puma’s dilemma
 
How can media and communication support cliamte adaptation
How can media and communication support cliamte adaptationHow can media and communication support cliamte adaptation
How can media and communication support cliamte adaptation
 
Working with NodeJS
Working with NodeJSWorking with NodeJS
Working with NodeJS
 
Boletim informativo de Sorocaba - Novembro de 2009
Boletim informativo de Sorocaba - Novembro de 2009Boletim informativo de Sorocaba - Novembro de 2009
Boletim informativo de Sorocaba - Novembro de 2009
 
Practica6 ensayo traccion_alvarogarciacamaron
Practica6 ensayo traccion_alvarogarciacamaronPractica6 ensayo traccion_alvarogarciacamaron
Practica6 ensayo traccion_alvarogarciacamaron
 
Muffins
MuffinsMuffins
Muffins
 
OBRA Y OBREROS EN VENEZUELA. AÑO 2011. BOLETÍN No. 49
OBRA Y OBREROS EN VENEZUELA. AÑO 2011. BOLETÍN No. 49OBRA Y OBREROS EN VENEZUELA. AÑO 2011. BOLETÍN No. 49
OBRA Y OBREROS EN VENEZUELA. AÑO 2011. BOLETÍN No. 49
 
Accidente Moto
Accidente MotoAccidente Moto
Accidente Moto
 

Similar to Archive enabling tagging using progressive barcodes

Watermarking of JPEG2000 Compressed Images with Improved Encryption
Watermarking of JPEG2000 Compressed Images with Improved EncryptionWatermarking of JPEG2000 Compressed Images with Improved Encryption
Watermarking of JPEG2000 Compressed Images with Improved Encryption
Editor IJCATR
 
Workshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KITWorkshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KIT
Edwin Rojas
 
UNIT 5 CAD STANDARDS -GOoGLE.pdf
UNIT 5 CAD STANDARDS -GOoGLE.pdfUNIT 5 CAD STANDARDS -GOoGLE.pdf
UNIT 5 CAD STANDARDS -GOoGLE.pdf
DURAIMURUGANM2
 
Increasing data storage of coloured QR code using compress, multiplexing and ...
Increasing data storage of coloured QR code using compress, multiplexing and ...Increasing data storage of coloured QR code using compress, multiplexing and ...
Increasing data storage of coloured QR code using compress, multiplexing and ...
journalBEEI
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
Alexander Decker
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
Editor IJCATR
 
Switching theory Unit 1
Switching theory Unit 1Switching theory Unit 1
Switching theory Unit 1
SURBHI SAROHA
 
IRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data HidingIRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET Journal
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
PeterOwenje1
 
2019-Db2-From_ASCII_to_UTF-8.pdf
2019-Db2-From_ASCII_to_UTF-8.pdf2019-Db2-From_ASCII_to_UTF-8.pdf
2019-Db2-From_ASCII_to_UTF-8.pdf
Roland Schock
 
Mmclass3
Mmclass3Mmclass3
Mmclass3
Hassan Dar
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
DeepikaShivam
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
Alexander Decker
 
Graphics Standards and Algorithm
Graphics Standards and AlgorithmGraphics Standards and Algorithm
Graphics Standards and Algorithm
Yatin Singh
 
BarnieMAT
BarnieMATBarnieMAT
BarnieMAT
Andrea Staccini
 
digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . .
Praneeth Kumar
 
Color Digital Sign Board using Altium Designer
Color Digital Sign Board using Altium DesignerColor Digital Sign Board using Altium Designer
Color Digital Sign Board using Altium Designer
ijtsrd
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
VIT-AP University
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)
welcometofacebook
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
ChandrasekharBehera16
 

Similar to Archive enabling tagging using progressive barcodes (20)

Watermarking of JPEG2000 Compressed Images with Improved Encryption
Watermarking of JPEG2000 Compressed Images with Improved EncryptionWatermarking of JPEG2000 Compressed Images with Improved Encryption
Watermarking of JPEG2000 Compressed Images with Improved Encryption
 
Workshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KITWorkshop 2016 Genebank IT - Barcode KIT
Workshop 2016 Genebank IT - Barcode KIT
 
UNIT 5 CAD STANDARDS -GOoGLE.pdf
UNIT 5 CAD STANDARDS -GOoGLE.pdfUNIT 5 CAD STANDARDS -GOoGLE.pdf
UNIT 5 CAD STANDARDS -GOoGLE.pdf
 
Increasing data storage of coloured QR code using compress, multiplexing and ...
Increasing data storage of coloured QR code using compress, multiplexing and ...Increasing data storage of coloured QR code using compress, multiplexing and ...
Increasing data storage of coloured QR code using compress, multiplexing and ...
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
 
Implementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for ImagesImplementation of 2D Optimal Barcode (QR Code) for Images
Implementation of 2D Optimal Barcode (QR Code) for Images
 
Switching theory Unit 1
Switching theory Unit 1Switching theory Unit 1
Switching theory Unit 1
 
IRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data HidingIRJET- Study of 3D Barcode with Steganography for Data Hiding
IRJET- Study of 3D Barcode with Steganography for Data Hiding
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
 
2019-Db2-From_ASCII_to_UTF-8.pdf
2019-Db2-From_ASCII_to_UTF-8.pdf2019-Db2-From_ASCII_to_UTF-8.pdf
2019-Db2-From_ASCII_to_UTF-8.pdf
 
Mmclass3
Mmclass3Mmclass3
Mmclass3
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Graphics Standards and Algorithm
Graphics Standards and AlgorithmGraphics Standards and Algorithm
Graphics Standards and Algorithm
 
BarnieMAT
BarnieMATBarnieMAT
BarnieMAT
 
digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . .
 
Color Digital Sign Board using Altium Designer
Color Digital Sign Board using Altium DesignerColor Digital Sign Board using Altium Designer
Color Digital Sign Board using Altium Designer
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 

More from Marie Vans

Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2
Marie Vans
 
Librarianship in alternative virtual worlds
Librarianship in alternative virtual worldsLibrarianship in alternative virtual worlds
Librarianship in alternative virtual worlds
Marie Vans
 
Creating an Award-Winning Educational Machinima
Creating an Award-Winning Educational MachinimaCreating an Award-Winning Educational Machinima
Creating an Award-Winning Educational Machinima
Marie Vans
 
Classification of CNN.com Articles using a TF*IDF Metric
Classification of CNN.com Articles using a TF*IDF MetricClassification of CNN.com Articles using a TF*IDF Metric
Classification of CNN.com Articles using a TF*IDF Metric
Marie Vans
 
Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2
Marie Vans
 
Creating displays of virtual objects and events
Creating displays of virtual objects and eventsCreating displays of virtual objects and events
Creating displays of virtual objects and events
Marie Vans
 
Creating displays of virtual objects and events
Creating displays of virtual objects and eventsCreating displays of virtual objects and events
Creating displays of virtual objects and events
Marie Vans
 
Progressive barcode applications
Progressive barcode applicationsProgressive barcode applications
Progressive barcode applications
Marie Vans
 
Progressive barcode presentation
Progressive barcode presentationProgressive barcode presentation
Progressive barcode presentation
Marie Vans
 
Impact of scrambling on barcode entropy
Impact of scrambling on barcode entropyImpact of scrambling on barcode entropy
Impact of scrambling on barcode entropy
Marie Vans
 
VWBPE 15: The story of science during the scientific revolution: Designing an...
VWBPE 15: The story of science during the scientific revolution: Designing an...VWBPE 15: The story of science during the scientific revolution: Designing an...
VWBPE 15: The story of science during the scientific revolution: Designing an...
Marie Vans
 

More from Marie Vans (11)

Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2
 
Librarianship in alternative virtual worlds
Librarianship in alternative virtual worldsLibrarianship in alternative virtual worlds
Librarianship in alternative virtual worlds
 
Creating an Award-Winning Educational Machinima
Creating an Award-Winning Educational MachinimaCreating an Award-Winning Educational Machinima
Creating an Award-Winning Educational Machinima
 
Classification of CNN.com Articles using a TF*IDF Metric
Classification of CNN.com Articles using a TF*IDF MetricClassification of CNN.com Articles using a TF*IDF Metric
Classification of CNN.com Articles using a TF*IDF Metric
 
Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2Preserving virtual worlds educational events using social media v2
Preserving virtual worlds educational events using social media v2
 
Creating displays of virtual objects and events
Creating displays of virtual objects and eventsCreating displays of virtual objects and events
Creating displays of virtual objects and events
 
Creating displays of virtual objects and events
Creating displays of virtual objects and eventsCreating displays of virtual objects and events
Creating displays of virtual objects and events
 
Progressive barcode applications
Progressive barcode applicationsProgressive barcode applications
Progressive barcode applications
 
Progressive barcode presentation
Progressive barcode presentationProgressive barcode presentation
Progressive barcode presentation
 
Impact of scrambling on barcode entropy
Impact of scrambling on barcode entropyImpact of scrambling on barcode entropy
Impact of scrambling on barcode entropy
 
VWBPE 15: The story of science during the scientific revolution: Designing an...
VWBPE 15: The story of science during the scientific revolution: Designing an...VWBPE 15: The story of science during the scientific revolution: Designing an...
VWBPE 15: The story of science during the scientific revolution: Designing an...
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Archive enabling tagging using progressive barcodes

  • 1. Archive-enabling Tagging Using Progressive Barcodes Steven Simske and Marie Vans HP Labs; Fort Collins, Colorado May 22, 2015 1
  • 2. Agenda • Barcodes • Progressive Barcodes • Archiving Applications • Inference Model • Conclusions 2 http://usahitman.com/wp- content/uploads/2011/08/baby_ba rcode.jpg http://beqrious.com/wp- content/uploads/2012/01/train-tickets.jpg http://articlesweb.org/blog/wp- content/uploads/2012/08/Does- Many-Barcode-Tattoos-Have- Something-to-do-With-Many- People-08.jpeg
  • 3. Barcodes i. 1 Dimensional - ii. 2 Dimensional - iii. 3 Dimensional – iv. 4 Dimensional - 3 Data Capacity 11 numeric digits Data Matrix: 2335 bytes Aztec: 1914 bytes QR-Code: 3706 bytes 2.585 bits/tile for 6 colors: RGBCMY 𝑋𝑌 log2 𝑛 𝑏𝑖𝑡𝑠
  • 4. Non-Standard Barcodes 4 ColorTile Progressive Barcode Non-payload indicia Non-payload indicia The example shown here comprises: 1. 64 data tiles, max 165 bits total 2. 8 non-payload tiles: a. Two black for orientation & corner detection b. 6 color {RGBCMY} for color calibration c. Colors are 180 rotated from their color opponency pair, providing the greatest contrast in hue space and thus the most reliable opposite-corner orientation detection possible
  • 5. Example Progression 5 • Reader-Friendly Progressive Barcodes • Columns indicate progression along workflow • Colors saturated enough so that 2D barcode reader still interprets them as “white” • 2D barcode reads the same throughout the progression.
  • 6. Progressive Barcodes - Statistical Probability 6 • Statistical probability assigned at each step of the progression • Associated with any transition between two steps in a workflow • Based on how many bits are written and how many remain  i i RB IU P N N ! ! Pi = Step i NRB = the number of residual (0 bits) at end of the workflow NIU = number of initial unwritten bits
  • 7. Progressive Barcodes - Statistical Probability 7 • If barcode is unique at step i-1, then total number of barcodes of the current state is 1. • If the progressive barcode is binary, then the number of bits in the workflow is NRB-NIU. • If there are NC colors, number of bits increases to: 𝑙𝑛 𝑁 𝑐 𝑙𝑛 2 ∗ 𝑁 𝑅𝐵 − 𝑁𝐼𝑈 • The size (height and width in tiles) of progressive barcode used in the workflow can be determined from these equations along with the number of bits to write at each state
  • 8. Progressive Barcodes - Data Capacity 8 • Each color tile independent • Define a tile to be N-ary, where N = number of colors allowed at each tile: log2 𝑛 log2 2 = log2 𝑛 𝑏𝑖𝑡𝑠 𝑎𝑡 𝑎𝑛𝑦 𝑠𝑡𝑎𝑔𝑒 • n=2, e.g. DataMatrix, QR, Aztec: 1 bit per tile • Color tile with six colors {RGBCMY}: 2.585 bits/tile • 8 colors allowed {RGBCMYWK}: 3.0 bits/tile • Color tile barcode X data tiles wide & Y data tiles high contains exactly: 𝑋𝑌 log2(𝑛) 𝑏𝑖𝑡𝑠 • 120x120 DataMatrix barcode with 8 colors allows for 120*120*3 = 43, 200 bits or 5400 bytes >> 1800 bytes using black & white only
  • 9. Progressive Barcodes for Archiving Applications – Static Channel 9 • Amount of data that to be encoded in first set of data limited by the total number of black & white tiles available & standards. • URLs to websites - QR Codes • Data Matrix - serial numbers, invoicing information or product numbers. • Possible to encode other information; • xml fields for archiving purposes, • ISBNs, other document-related information • The main characteristic is that information remains static over time.
  • 10. Progressive Barcodes for Archiving Applications – Dynamic Channel 10 • Second channel of information can be encoded into the white tile channel • Track and store documents • Versioning or tracking document changes • Assign ownership of documents. • “Hybridization” allows for multiple services: • open services and proprietary services • Encoding of a website URL along with security/authentication services. • These barcodes are readable by any off-the-shelf, QR Code and the Data Matrix code readers. • The Data Matrix code can store a large quantity of data in the black-as-black and rest-as-white tiles.
  • 11. Progressive Barcodes for Archiving Applications – Two Channels 11 Demonstration of barcode with two channels. The black and rest-as- white will read with an off-the-shelf reader, the right Data Matrix will display an abstract and the left QR-Code displays a test message.
  • 12. Hybrid barcodes with Progression in the Color Channel 12 Layer 1 Layer 2 Same barcodes with progression Barcodes don’t change
  • 13. Inference for Archiving Data 13 D:Computer containing files C: Directory with files B: My Document with images A: Individual images • Inference is the relationship between objects and their containers: • Individual objects (e.g. images) A • Packaged into file B: At(Bu,Bu+1,Bu+2, …, Bu+v-1) • Multiple files contained in folders C: Cq(Br,Br+1,Br+2, …, Br+s-1) • Multiple folders per computer D: D←{C} ← {B} ← {A} Dn(Cm,Cm+1,Cm+2, …, Cm+p-1)
  • 14. Inference for Archiving Data 14 • How many tags (barcodes) are required to tag n(A) items when they are inferred to B, C and D containers • The following ratios are very important: n(A)/n(B), n(B)/n(C), and n(C)/n(D). • We create series of cryptographically secure tags, in sequence, and assign them to the containers they are representing as follows: (D) (C) (B) A….A (B) …. (B) A….A (B) (C) …. (C) …. (C) (D) • Example: • Label the associated C, B and A items: • “A” items: n(A)*n(B)*n(C) tags -- 4*3*1 = 12 • “B” items: 2*n(B)*n(C) tags -- 2*3*1 = 6 • “C” items: 2*n(C) tags – 2*1 = 2
  • 15. Inference for Archiving Data - Continued 15 • The overall number of identifiers required, nIDs required, is:     M Bi M ij M Aj requiredIDs jnjnn )(*2)(_ )]()(*)()(*)(*)([*2)(*)(*)(*)(_ DnDnCnDnCnBnDnCnBnAnrequiredIDsn  (3) • Thus, if M=4 (for the A, B, C, D example above): where M = levels of containment: M=alphabetic (levels of containment, where M is for Matryoshka, since it is a Russian doll model )
  • 16. Inference - Use 16 • This model for inference allows a wide variety of possibilities. • If tags on individual items {A} cannot be read – • Labeled with barcodes and inside a folder that cannot be read due to permission issues • The tags on the folder B, would correspond to the start and end of the sequence of tags corresponding to the two on container B and all of the individual tags on the A items within.
  • 17. Document Storage using Inference for tagging 17
  • 18. Another Inference Example – GS1 18 GS1: 734236023450 GS1: 734236023450 GS1: 734236023450 GS1: 734236023450 DS DS DS Inferenced or Identical Inferenced or Identical Inferenced or Identical Pallet Case Carton Individual Unit Tags from GS1: standards for supply chain workflows. Image based on single GS1 tag that is readable via inference even at the pallet level.
  • 19. Relative & Absolute inference 19 • Want to ensure that multiple items infer to the same container in a statistically meaningful way • Relatively - No connection to an on-line database • Relative inference is established when there is a mechanism for associating a container with an item and vice versa • Absolute inference requires approval of two or more binary strings simultaneously • With or without the overlying relative inference model • Easiest absolute inference: • Association of two binary strings in database • Another form: • When two strings related to each other through algorithm or process • E.g., C=digital signature(I) • C=scrambling_algorithm(I)
  • 20. Conclusions 20 • Progressive barcodes ideal mechanisms for applications & services that: • Take advantage of two channels of information encoded into a single mark that does not change size over time • Suitable for document workflow tracking and archiving solutions where data for one channel does not change • serial numbers, document IDs, MARC and other archiving information • Channel represented as color tiles can change over time: • tracking, security, and other purposes • Using inference, possible to contain objects inside other objects and verify their authenticity without having to open the container • Other archiving applications – I am interested in ideas!
  • 21. Thank You for Your Kind Attention 21 Welcome to the “Marker Revolution”