Abstract
The rapid and accurate transfer of information is essential in today’s digital world, where error detecting and correcting codes play a crucial role. In this context, Fibonacci numbers have been extensively applied in coding theory, particularly in coding structures based on Fibonacci polynomials and symmetric matrices. This study proposes a novel coding framework by defining and using some new Fibonacci matrices with their determinants. The properties of these matrices are analyzed to construct efficient coding and error correction mechanisms. The proposed structure enables the transmission of larger data volumes in a single iteration without compromising the error correction performance, demonstrating the potential of Fibonacci matrices for reliable and efficient information transfer.
MSC:
11B39; 11C20; 94B60
1. Introduction
In recent years, advancements in the field of information transfer have gained significant momentum. This acceleration has primarily been driven by the increasing reliance on the digital world for a substantial portion of our activities, including those in social life. Consequently, the rapid and error-free transfer of information has become critically important. A mathematical solution framework designed to address this challenge, known as error detecting and correcting codes, has been extensively studied by researchers. In this context, various methods and structures have been developed in this domain from algebraic, combinatorial, and number-theoretical perspectives. For instance, studies utilizing Fibonacci numbers also form a subset of this research. The literature includes algebraic coding studies based on Fibonacci polynomials, such as those by Esmaeili et al. [1] and Köroğlu et al. [2], as well as works based on symmetric Fibonacci matrices, such as those by Basu and Prasad [3], Stakhov [4], Kuloğlu and Özkan [5], Akbiyik [6], and Yamaç Akbiyik [7]. Our study belongs to the category of research that involves Fibonacci matrices. These studies focus on the construction of coding and decoding frameworks using matrices that have specific determinants, using their inherent properties to prevent potential errors. In addition, there are various studies that explore generalizations of Fibonacci numbers and their other properties. Some of the most significant and innovative ones can be presented as follows. Caldarola et al. introduced new algebraic constructs for Fibonacci numbers [8], Sirivoravit et al. and Erkan et al. gave new generalizations of Fibonacci numbers [9,10], Biban et al. and Xu worked on encryption by using a Fibonacci matrix and Fibonacci transformations [11,12]. For further related articles, see [13,14].
Key challenges in coding structures include speed and the error correction capability. The proposed framework is designed to transmit more data in a single iteration compared to existing approaches, without any compromise in the error correction efficiency. To reach this goal, we first define some matrices using Fibonacci numbers and analyze their properties. Subsequently, we build a symmetric coding structure based on these matrices, followed by an examination of error correction scenarios.
The outline of the paper is as follows: We will first discuss some fundamental concepts in Section 2. Subsequently, in Section 3, we will introduce newly defined matrices, along with their properties. Section 4 will focus on the construction of coding and decoding schemes, and Section 5 will conclude the study with a brief summary.
2. Preliminaries
The Fibonacci sequence is an integer sequence defined by the recurrence relation with the initial values and . The characteristic equation of this recurrence relation is , with the roots and . The Binet formula, which gives the nth term of this sequence, is expressed as . Moreover, negative-indexed Fibonacci numbers can be obtained with the formula . We can give some negative-indexed and positive-indexed Fibonacci numbers, as in the table below.
In 1977, Stakhov introduced Fibonacci p-numbers [15]. They are defined by the recurrence relation with the initial values for . It was observed that when computing elements with negative indices, . Note that when , the classical Fibonacci sequence is obtained.
Matrices constructed from these integer sequences are the subject of study by many researchers and find applications in various fields. The Fibonacci Q-matrix, as defined by Hoggat [16] and Gould [17], is a square matrix given by
The most important properties of these matrices are and [16]. The determinant property is also known as Cassini’s identity.
In [18], Stakhov provided a more general form of the Fibonacci Q-matrices. The generalized Fibonacci matrices are defined as
where I is an identity matrix with p dimensions. The most important properties of these matrices are
and
Additionally, in the same work, Stakhov also presented the most general form of the Cassini formula as .
3. Some New Special Matrices of Fibonacci Numbers
In this section, we will define some special matrices that we will use in the next section and examine their basic properties. First, let us define the matrix , which is inspired by the matrix .
Definition 1.
For Fibonacci numbers, , the matrix is defined as
where the square matrix is called the Fibonacci X matrix. Here, m and n stand for the number of rows and the index of the starting Fibonacci number, respectively.
Proposition 1.
For , the determinant of the Fibonacci X matrix is 0.
Proof.
In Fibonacci X matrices, if we multiply the second and third columns by and add them to the first column, then the first column becomes 0. Since the determinant of a matrix with any row or column equal to zero is zero, then it is seen that the determinant is zero. □
Example 1.
Let and ; then, the matrix and can be obtained as follows, respectively:
The matrix structure, whose definition is provided below, will be utilized for Method 1 in the next section. This matrix is inspired by the Fibonacci X matrix.
Definition 2.
For , the matrix that can be defined as the augmented matrix of the Fibonacci X matrix is
This matrix is called the Fibonacci K matrix.
Proposition 2.
For , the determinant of the matrix equals .
Proof.
If we multiply the second and third columns of the matrix by and add them to the first column, using the identities [19] and [20], we obtain the following:
□
Example 2.
For ,
Example 3.
For ,
Next, we present a property of the matrix that will be useful in the coding processes that involve this matrix.
Proposition 3.
Let the pth power of the matrix be denoted as
In this case,
- (i)
- (ii)
- (iii)
- (iv)
- .
where α is the root of the characteristic equation .
Proof .
(i) The matrix includes blocks derived from Fibonacci numbers, as well as a constant column of ones comprising the fourth column. In the absence of this column, the dominant eigenvalue of the matrix would correspond to the growth rate of Fibonacci numbers, which is asymptotically . However, the addition of the column modifies the spectral properties of , leading to an adjustment in the dominant eigenvalue.
- For a large p, the behavior of is dominated by the largest eigenvalue and the corresponding eigenvector . Specifically, we havewhere is the dominant eigenvalue, is the corresponding right eigenvector, and is the corresponding left eigenvector.The fourth column of ones in plays a significant role in altering the dominant eigenvector. Without this column, the dominant eigenvector would be associated with Fibonacci numbers, and the ratios would converge to . However, the presence of the column introduces a constant additive term that shifts these ratios.For the dominant eigenvector , the components reflect a combination of Fibonacci growth and the contribution of the constant column. This results inwhere the additional arises due to the structural contribution of the constant column.The ratios converge to as . This convergence highlights how the structure of , particularly the constant column, modifies the asymptotic behavior of the ratios from the expected to .The others can be proven in a similar manner.
□
Proposition 4.
Let M be any matrix, and let be the Fibonacci K matrix. Define the product:
In this case,
(i)
(ii) .
Proof.
The proof of this proposition can be constructed in a manner similar to that of the proof of Proposition 3. □
When we increase the size of the Fibonacci K matrix, we obtain matrices with a determinant of zero, similarly to the Fibonacci X matrix.
Proposition 5.
For , the determinant of the augmented matrix is as follows:
Proof.
By multiplying the second and third columns by and adding them to the first column, and then multiplying the third and fourth columns by and adding them to the second column, we obtain
□
Example 4.
This property holds even as the matrix size increases further.
Now, we will define the new matrix used in the second coding structure.
Definition 3.
For , the matrix defined as
is referred to as the Fibonacci S matrix.
Having knowledge about the determinants of matrices is crucial for using them in coding structures. The next proposition presents a property that allows Fibonacci S matrices to be utilized in coding structures.
Proposition 6.
For , the determinant of the Fibonacci S matrix is given by
Proof.
When a row of a matrix is multiplied by a scalar and added to another row, the determinant of the matrix remains unchanged. Therefore, we can multiply the second row by and add it to the first row and similarly multiply the third row by and add it to the second row.
This results in the following transformation:
Using the property of Fibonacci numbers [20], it can be observed that the given determinant is equivalent to
Performing a Laplace expansion along the last row of this determinant yields
Simplifying it further,
Using the property of Fibonacci numbers [16], we simplify the terms within parentheses to obtain the determinant as
Next, using the property [19], the determinant becomes
Simplifying it further, this expression is equivalent to
Thus, it is proven that the determinant equals .
□
When we increase the size of the Fibonacci S matrix, we obtain matrices with a determinant of 0. To illustrate this, we first define the most general form of the Fibonacci S matrices.
Definition 4.
For , the matrix is defined as
This matrix is called the generalized Fibonacci S matrix. For , we obtain the Fibonacci S matrix given in the previous definition.
Proposition 7.
For , .
Proof.
It is straightforward. □
Example 5.
4. Coding and Decoding Methods
In the literature, coding and decoding methods using Fibonacci-type numbers have employed and matrices [3,4,21,22]. In this study, we developed coding and decoding methods using and matrices based on some matrices obtained in Section 3. These methods aim to send more messages simultaneously compared to previous methods. Additionally, the goal is to transmit messages faster without any loss, while maintaining the error detection and correction capabilities of earlier methods.
Similarly to previous approaches, our method also utilizes a coding matrix and its inverse decoding matrix. It is necessary for the determinant of the coding matrix to be known; therefore, some matrices mentioned in the previous section can be used. Furthermore, since we use the inverse of the coding matrix in the decoding process, the determinant of the coding matrix must be non-zero. Consequently, some matrices defined in the previous section cannot be used.
4.1. Coding Method 1
In this section, coding is performed using Fibonacci matrices. The message matrix M must have four dimensions. Additionally, to facilitate the decoding process, we will assume that the entries of M are positive. The encoded matrix E is obtained as . The parameters n, p, and are sent to the receiver along with E. The receiving side retrieves the message as .
Error detection and correction: If the determinant of the received matrix E differs from , it is understood that there is at least an error in the matrix E. The entries of the matrix E are checked according to the ratios given in Proposition 3 for the matrix, and the erroneous entries are identified. The erroneous entries are corrected by testing values that satisfy these ratios and the determinant, and subsequently, the message matrix is obtained.
Example 6.
Let us send the message “MATHISINCREDIBLE” using this method. First, we present the binary and decimal ASCII code equivalents of this sentence in a table (Table 1), as shown below [23].
Table 1.
ASCII codes of letters in “MATH IS INCREDIBLE” [23].
Then, using the decimal values of these code equivalents, we construct our message matrix:
If we choose the encoding matrix as the fifth power of the augmented matrix , then we obtain the encoded matrix E as follows:
The encoded matrix E, along with the parameters , , and , is sent to the receiver. The receiver retrieves the message matrix by calculating . If the determinant of E, , equals , it indicates that the message has been received without any issues.
We examine the error cases here.
Case of one error: Suppose the entry in E is incorrectly received as 856714305912. In this case, since , it is clear that at least one error has occurred. Checking the ratios, and . Since other ratios from Proposition 3 are satisfied, it is determined that only is incorrect.
Single error correction: Taking and expanding the determinant along the third column using Laplace expansion, we equate the determinant to 31,259 to find x.
Case of two errors: We will analyze three different scenarios based on whether the errors are in the same column or not and whether they are adjacent.
Case 1 (two errors in different columns): The positions of the errors are determined using the ratios specified in the relevant proposition.
Error correction: For example, if and are erroneous, let and . By performing Laplace expansion along the second and third columns and equating , we obtain a Diophantine equation with two unknowns. Additionally, we solve the equation by finding integer values satisfying and , thereby correcting the erroneous values.
Case 2 (two errors in the same column and adjacent): The error positions are identified using the ratios from the relevant proposition. For example, if and are erroneous, then , , , and . Even if , if , , and , it is understood that and are erroneous.
Error correction: The errors are corrected as in the previous scenario.
Case 3 (two errors in the same column and not adjacent): If, for instance, and are erroneous, then the conditions , , , and indicate that and are incorrect.
When there are three or four errors in the same column, it is evident that there is an error because , but the errors cannot be corrected.
In cases where there are not three or four errors in the same column (for example, two errors in the first column, one error in the third, and two errors in the fourth), the errors can be corrected using the methods described in the three cases we provided.
Example 7.
If we encode the message "MATHISINCREDIBLE" using ASCII and then apply the encoding matrix ,
Then,
During communication, let , , , and be corrupted and transmitted incorrectly. Using the ratios mentioned in the relevant proposition and the methods described in the three cases, the error locations can be identified. Specifically, the conditions , , , , and help determine the erroneous values , , , and .
4.2. Coding Method 2
In this method, , defined in the previous section, will be used. Since this matrix has three dimensions, the message matrix M must also have three dimensions. Let the message matrix be
The encoded matrix E is obtained by encoding the message matrix as . Since and , it follows that . The parameters E, n, and are sent to the recipient. The recipient recovers the message as .
Error detection and correction: If the determinant of the received matrix E differs from , an error in E is detected. Using the ratios and , erroneous entries are identified and corrected by finding integer values that satisfy these ratios as well as the equation .
We will use a two-step error detection system to locate erroneous entries. In the first step, for each row and column, entries that satisfy the conditions , , , and are identified. If there are two or more erroneous entries in any row or column, their locations cannot be determined. In this case, the second step is applied. In the second step, the correct entries identified in the first step are used to locate all erroneous entries using the ratios given in the table below.
If there are two or more errors in every row and column, no correct entries can be identified in the first step. In this case, the correct entries are determined using the ratios in the second step. Once correct and erroneous entries are identified, the approximate integer values of the erroneous ones are determined using the correct entries, and integers that satisfy are found by testing. The range of these integers can be determined using the bounds , , , , , , and .
Example 8.
Let us encode the message “MATHISFUN” using its ASCII code and the coding matrix and send the encoded message.
The encoded matrix is computed as
The values and , and the matrix E are sent to the receiver. The receiver obtains the message matrix M by computing .
Now, let us analyze the error detection and correction process using this example.
Let , , , , , and be received incorrectly. For example, suppose , , , , , and . Since , it is understood that there is an error or multiple errors in matrix E.
Let us first examine the columns of E:
indicating that there are two or more errors in the first column. For the second column,
suggesting that and are correct, while is erroneous. For the third column,
indicating that there are two or more errors in the third column.
Now, let us examine the rows of E:
which implies that there are two or more errors in the first row.
suggests two or more errors in the second row.
indicating two or more errors in the third row.
Additionally, since and are known to be correct, we can conclude that , , , and are erroneous. Proceeding to the second stage, we examine and :
indicating that is correct and is erroneous.
Thus, , , and are correct, while the remaining entries are erroneous. Finally, we determine integer ranges for the erroneous entries to find integers that satisfy .
Using a simple program, the integers within these ranges are tested to satisfy the condition , and the message matrix M is obtained as .
In this method, it is observed that as long as there are at least two correct entries, the remaining entries can be determined. Naturally, the more erroneous entries there are, the more integers need to be tested.
5. Conclusions
Various matrices defined by Fibonacci numbers have been examined in terms of their properties. Some of these matrices have been applied in error detection and correction processes during information transfer, a crucial topic in information theory. The coding structures constructed with these matrices have enabled the development of more advanced structures beyond algebraic coding structures and those previously introduced by Stakhov.
In earlier studies, messages consisting of four characters were transmitted at once using 2 × 2 matrices. However, in this study, the developed coding structures enabled the transmission of messages with nine characters using 3 × 3 matrices and sixteen characters using 4 × 4 matrices in a single step. Consequently, a greater amount of information could be transmitted simultaneously compared to previous studies. Furthermore, the error detection and correction processes within these structures have been thoroughly explained, and illustrative examples demonstrating the process have been provided. Since the encoding process in the proposed methods is performed via matrix multiplication, it is highly efficient. The decoding process consists of two stages: first, multiplying the matrix by the inverse of the coding matrix, and second, identifying erroneous inputs and correcting them by testing integer values that satisfy the initially provided determinant and given ratios. The first step, being matrix multiplication, is completed very quickly, while the second step is also relatively fast since the number of integer values to be tested is significantly reduced due to the given ratios.
When analyzing the error correction capacity of the developed methods, it was observed that both approaches have high error correction capabilities, with the second method exhibiting a significantly higher capacity. In the first method, errors can be corrected for up to 50% of the inputs. In the second method, even if only two out of nine inputs are correct, the remaining erroneous inputs can still be corrected, indicating an error correction capacity of 78%, which is remarkably high.
In the provided examples, the messages completely fill the message matrix. If a message does not fully occupy the matrix, the issue can be resolved by inserting the ASCII code (42) of the ‘*’ symbol into the empty positions. Additionally, if the text to be transmitted is lengthy, it can be divided into multiple message matrices, thereby eliminating this limitation.
This study also reveals that the eigenvalues of matrices constructed using Fibonacci numbers and the ratios between elements in the powers of these matrices are related to the golden ratio. The existence of these ratios has been proven using the relationship between the largest eigenvalue of these matrices and their powers.
This research provides a novel perspective on error detection and correction while paving the way for more advanced studies in this field. In future research, larger Fibonacci-type matrices with a constant determinant could be explored to facilitate the transmission of greater amounts of information in a single step. Additionally, refining the range of integers tested during the decoding phase could further enhance the speed of the error correction process.
Funding
This research received no external funding.
Data Availability Statement
The paper is self-contained and no external data are used.
Conflicts of Interest
The author declares no conflicts of interest.
References
- Esmaeili, M.; Esmaeili, M. A Fibonacci-polynomial based coding method with error detection and correction. Comput. Math. Appl. 2010, 60, 2738–2752. [Google Scholar] [CrossRef]
- Koroglu, M.E.; Ozbek, I.; Siap, I. Optimal codes from Fibonacci polynomials and secret sharing schemes. Arab. J. Math. 2017, 6, 297–308. [Google Scholar] [CrossRef]
- Basu, M.; Prasad, B. Coding theory on the m-extension of the Fibonacci p-numbers. Chaos Solitons Fractals 2009, 42, 2522–2530. [Google Scholar] [CrossRef]
- Stakhov, A.P. Fibonacci matrices, a generalization of the “Cassini formula”, and a new coding theory. Chaos Solitons Fractals 2006, 30, 56–66. [Google Scholar] [CrossRef]
- Kuloğlu, B.; Özkan, E. Application of Jacobsthal and Jacobsthal-Lucas numbers in coding theory. Math. Montisnigri 2017, 57, 54–64. [Google Scholar] [CrossRef]
- Akbiyik, M.; Alo, J. On Third-Order Bronze Fibonacci Numbers. Mathematics 2021, 9, 2606. [Google Scholar] [CrossRef]
- Akbiyik, S.Y. The third order Nickel Fibonacci numbers. Log. J. IGPL 2024, jzae122. [Google Scholar] [CrossRef]
- Caldarola, F.; d’Atri, G.; Maiolo, M.; Pirillo, G. New algebraic and geometric constructs arising from Fibonacci numbers: In honor of Masami Ito. Soft Comput. 2020, 24, 17497–17508. [Google Scholar] [CrossRef]
- Sirivoravit, M.; Leerawat, U. Some Identities for the (a, b; k)-Nacci Sequences. Contemp. Math. 2024, 5, 5777–5782. [Google Scholar] [CrossRef]
- Erkan, E.; Dagdeviren, A. k-Fibonacci and k-Lucas Hybrid Numbers. Tamap J. Math. Stat. 2021, 2021, 125. [Google Scholar]
- Biban, G.; Chugh, R.; Panwar, A. Image encryption based on 8D hyperchaotic system using Fibonacci Q-Matrix. Chaos Solitons Fractals 2023, 170, 113396. [Google Scholar] [CrossRef]
- Xu, C. A novel color image encryption method using Fibonacci transformation and chaotic systems. EAI Endorsed Trans. Scalable Inf. Syst. 2023, 12, 1–10. [Google Scholar] [CrossRef]
- Kürüz, F.; Dağdeviren, A. Pell and Pell-Lucas hybrid quaternions. Filomat 2023, 37, 8425–8434. [Google Scholar] [CrossRef]
- Klein, S.T.; Shapira, D. Dense non-binary Fibonacci codes. Acta Inform. 2025, 62, 1–24. [Google Scholar] [CrossRef]
- Stakhov, A.P. Introduction into Algorithmic Measurement Theory; Soviet Radio: Moscow, Russia, 1977; Volume 12. [Google Scholar]
- Hoggatt, V.E., Jr. Fibonacci and Lucas Numbers; Mathematics Enrichment Series; Houghton Mifflin: Boston, MA, USA, 1969. [Google Scholar]
- Gould, H.W. A history of the Fibonacci Q-matrix and a higher-dimensional problem. Fibonacci Quart 1981, 19, 250–257. [Google Scholar] [CrossRef]
- Stakhov, A.P. A generalization of the Fibonacci Q-matrix. Rep. Natl. Acad. Sci. Ukraine 1999, 9, 46–49. [Google Scholar]
- Struyk, A. The Fibonacci Numbers. Sch. Sci. Math. 1944, 44, 701–707. [Google Scholar] [CrossRef]
- Horadam, A.F. A generalized Fibonacci sequence. Am. Math. Mon. 1961, 68, 455–459. [Google Scholar] [CrossRef]
- Basu, M.; Prasad, B. The generalized relations among the code elements for Fibonacci coding theory. Chaos Solitons Fractals 2009, 41, 2517–2525. [Google Scholar] [CrossRef]
- Basu, M.; Das, M. Tribonacci matrices and a new coding theory. Discret. Math. Algorithms Appl. 2014, 6, 1450008-1–1450008-17. [Google Scholar] [CrossRef]
- American National Standards Institute. 2022. American Standard Code for Information Interchange (ASCII). 2022. Available online: https://www.ascii-code.com/ (accessed on 21 February 2025).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).