The Lempel-Ziv (LZ) lossless compression algorithm was developed by Jacob Ziv (AT&T Bell Labs / Technion Israel) and Abraham Lempel (IBM) in 1978;

Size: px
Start display at page:

Download "The Lempel-Ziv (LZ) lossless compression algorithm was developed by Jacob Ziv (AT&T Bell Labs / Technion Israel) and Abraham Lempel (IBM) in 1978;"

Transcription

1 Georgia Institute of Technology - Georgia Tech Lorraine ECE 6605 Information Theory Lempel-Ziv Lossless Compresion General comments The Lempel-Ziv (LZ) lossless compression algorithm was developed by Jacob Ziv (AT&T Bell Labs / Technion Israel) and Abraham Lempel (IBM) in 978; The LZ algorithm does not require any knowledge of the source probabilities (universal algorithm). The algorithm is inherently adaptive in that it handles sources with any probability law; It is possible to show that the LZ algorithm achieves the entropy rate of any stationary source, and hence it is an optimum universal code; for the proof, see [, Chapter ] LZ is the basis of virtually all commercially available compression softwares (PK Zip, stuff-it, etc.); There are hundreds of variation of LZ algorithm; the version presented here is the simplest, and is not as good as those used in commercial softwares. Basic idea of LZ algorithm Use simple adaptation rule to construct the table of source outpus to encode. Huffman code probabilities of source known encoding table selected ahead of time fixed-to-variable length code The LZ algorithm Two step procedure LZ code probability law unknown encoding table constructed as encoding progresses variable-to-fixed length code. Given a source output x = (x,..., x n ) (n large), the encoder looks for the longest sourceword w in the table that prefixes x (that is x = (w, x )) and sends it.. Table is updated with a new sourceword (w, x), where x is the source ouput following w. Example Suppose we must encode and decode the following source output that takes values in an alphabet {a, b}. x = abbbbba

2 . Encoding algorithm Step 0. Start with table of two entries: a and b. Codewords and are L bit longs with L fixed (say 0 bits) a = ( ) b = ( ) Step. Begin encoding.. We look for the longest codeword that prefixes x: it is a. We send codeword.. We remove the prefix from x a bbbbba bbbbba. We add to the table since a is the next source output a = ( ) b = ( ) = ( ) Step.. Look for the longest source codeword that prefixes x: is is. We send codeword.. We remove the prefix from x bbbbba bbbbba. We add b to the table since b is the next source output a = ( ) b = ( ) = ( ) b = ( )

3 Step.. Look for the longest source codeword that prefixes x: is is b. We send codeword.. We remove the prefix from x b bbbba bbbba. We add ba to the table since a is the next source output a = ( ) b = ( ) = ( ) b = ( ) Step.. Look for the longest source codeword that prefixes x: is is b. We send codeword.. We remove the prefix from x b b bbba bbba. We add ba to the table since a is the next source output a = ( ) b = ( ) = ( ) b = ( ) ba 6 =...

4 Step 5.. Look for the longest source codeword that prefixes x: is is ba. We send codeword 6.. We remove the prefix from x b b ba abba 6 6. We add b to the table since a is the next source output abba a = ( ) b = ( ) = ( ) b = ( ) ba 6 =... b 7 =... We continue until data symbols in x are exhausted.. Decoding algorithm The decoder must be able to accept the fixed length codewords produced by the encoder and contruct the original sequence of a s and b s. To do so, it must also reconstruct the encoding table on the fly. In the previous example, the decoder receives the sequence of codewords 6. Step 0. Decoder starts with the same table as encoder at Step 0. a = ( ) b = ( ) Step. Decoder receives codeword. Therefore it decodes an a. It must add a? to the list, where? is the next source output. This is what the encoder did, but the decoder does not know yet what? will be. The decision is deferred until next time. x = a a = ( ) b = ( ) a? = ( )

5 Step. Decoder receives codeword, which cannot be decoded yet. But since it received a rather than a, it knows the blank must be filled with an a. Thus it replaces a? by in the table, and adds? to the table, deferring the decision on? until next symbol. x = a a = ( ) b = ( ) = ( )? = ( ) Step. Decoder receives codeword, which is decoded as b. Knowing this, the decoder can decide that? = b. Encoder adds b? to the table and defers the decision until next symbol. x = ab a = ( ) b = ( ) = ( ) b = ( ) b? 5 = (... ) Step. Decoder receives codeword, which is decoded as b. Knowing this, the decoder can decide that b? = ba. Encoder adds b? to the table and defers the decision until next symbol. And so on... References x = abb a = ( ) b = ( ) = ( ) b = ( ) ba 5 = (... ) b? 6 = (... ) [] T. M. Cover and J. A. Thomas, Elements of Information Theory, st ed. Wiley-Interscience, 99. 5

Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology

Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology Course Presentation Multimedia Systems Entropy Coding Mahdi Amiri February 2011 Sharif University of Technology Data Compression Motivation Data storage and transmission cost money Use fewest number of

More information

A Brief Introduction to Information Theory and Lossless Coding

A Brief Introduction to Information Theory and Lossless Coding A Brief Introduction to Information Theory and Lossless Coding 1 INTRODUCTION This document is intended as a guide to students studying 4C8 who have had no prior exposure to information theory. All of

More information

Information Theory and Communication Optimal Codes

Information Theory and Communication Optimal Codes Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

Lecture5: Lossless Compression Techniques

Lecture5: Lossless Compression Techniques Fixed to fixed mapping: we encoded source symbols of fixed length into fixed length code sequences Fixed to variable mapping: we encoded source symbols of fixed length into variable length code sequences

More information

Entropy, Coding and Data Compression

Entropy, Coding and Data Compression Entropy, Coding and Data Compression Data vs. Information yes, not, yes, yes, not not In ASCII, each item is 3 8 = 24 bits of data But if the only possible answers are yes and not, there is only one bit

More information

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression # 2 ECE 253a Digital Image Processing Pamela Cosman /4/ Introductory material for image compression Motivation: Low-resolution color image: 52 52 pixels/color, 24 bits/pixel 3/4 MB 3 2 pixels, 24 bits/pixel

More information

Introduction to Source Coding

Introduction to Source Coding Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow

More information

FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING

FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING FAST LEMPEL-ZIV (LZ 78) COMPLEXITY ESTIMATION USING CODEBOOK HASHING Harman Jot, Rupinder Kaur M.Tech, Department of Electronics and Communication, Punjabi University, Patiala, Punjab, India I. INTRODUCTION

More information

COMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam

COMM901 Source Coding and Compression Winter Semester 2013/2014. Midterm Exam German University in Cairo - GUC Faculty of Information Engineering & Technology - IET Department of Communication Engineering Dr.-Ing. Heiko Schwarz COMM901 Source Coding and Compression Winter Semester

More information

Channel Coding/Decoding. Hamming Method

Channel Coding/Decoding. Hamming Method Channel Coding/Decoding Hamming Method INFORMATION TRANSFER ACROSS CHANNELS Sent Received messages symbols messages source encoder Source coding Channel coding Channel Channel Source decoder decoding decoding

More information

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley - A Greedy Algorithm Slides based on Kevin Wayne / Pearson-Addison Wesley Greedy Algorithms Greedy Algorithms Build up solutions in small steps Make local decisions Previous decisions are never reconsidered

More information

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 1 LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 2 STORAGE SPACE Uncompressed graphics, audio, and video data require substantial storage capacity. Storing uncompressed video is not possible

More information

MAS.160 / MAS.510 / MAS.511 Signals, Systems and Information for Media Technology Fall 2007

MAS.160 / MAS.510 / MAS.511 Signals, Systems and Information for Media Technology Fall 2007 MIT OpenCourseWare http://ocw.mit.edu MAS.160 / MAS.510 / MAS.511 Signals, Systems and Information for Media Technology Fall 2007 For information about citing these materials or our Terms of Use, visit:

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

Information Theory and Huffman Coding

Information Theory and Huffman Coding Information Theory and Huffman Coding Consider a typical Digital Communication System: A/D Conversion Sampling and Quantization D/A Conversion Source Encoder Source Decoder bit stream bit stream Channel

More information

Chapter 1 INTRODUCTION TO SOURCE CODING AND CHANNEL CODING. Whether a source is analog or digital, a digital communication

Chapter 1 INTRODUCTION TO SOURCE CODING AND CHANNEL CODING. Whether a source is analog or digital, a digital communication 1 Chapter 1 INTRODUCTION TO SOURCE CODING AND CHANNEL CODING 1.1 SOURCE CODING Whether a source is analog or digital, a digital communication system is designed to transmit information in digital form.

More information

SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON).

SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON). SOME EXAMPLES FROM INFORMATION THEORY (AFTER C. SHANNON). 1. Some easy problems. 1.1. Guessing a number. Someone chose a number x between 1 and N. You are allowed to ask questions: Is this number larger

More information

MAS160: Signals, Systems & Information for Media Technology. Problem Set 4. DUE: October 20, 2003

MAS160: Signals, Systems & Information for Media Technology. Problem Set 4. DUE: October 20, 2003 MAS160: Signals, Systems & Information for Media Technology Problem Set 4 DUE: October 20, 2003 Instructors: V. Michael Bove, Jr. and Rosalind Picard T.A. Jim McBride Problem 1: Simple Psychoacoustic Masking

More information

Lecture 1 Introduction

Lecture 1 Introduction Lecture 1 Introduction I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw September 22, 2015 1 / 46 I-Hsiang Wang IT Lecture 1 Information Theory Information

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program.

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program. Combined Error Correcting and Compressing Codes Extended Summary Thomas Wenisch Peter F. Swaszek Augustus K. Uht 1 University of Rhode Island, Kingston RI Submitted to International Symposium on Information

More information

COURSE MATERIAL Subject Name: Communication Theory UNIT V

COURSE MATERIAL Subject Name: Communication Theory UNIT V NH-67, TRICHY MAIN ROAD, PULIYUR, C.F. - 639114, KARUR DT. DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING COURSE MATERIAL Subject Name: Communication Theory Subject Code: 080290020 Class/Sem:

More information

Coding for Efficiency

Coding for Efficiency Let s suppose that, over some channel, we want to transmit text containing only 4 symbols, a, b, c, and d. Further, let s suppose they have a probability of occurrence in any block of text we send as follows

More information

Problem Sheet 1 Probability, random processes, and noise

Problem Sheet 1 Probability, random processes, and noise Problem Sheet 1 Probability, random processes, and noise 1. If F X (x) is the distribution function of a random variable X and x 1 x 2, show that F X (x 1 ) F X (x 2 ). 2. Use the definition of the cumulative

More information

ECE Advanced Communication Theory, Spring 2007 Midterm Exam Monday, April 23rd, 6:00-9:00pm, ELAB 325

ECE Advanced Communication Theory, Spring 2007 Midterm Exam Monday, April 23rd, 6:00-9:00pm, ELAB 325 C 745 - Advanced Communication Theory, Spring 2007 Midterm xam Monday, April 23rd, 600-900pm, LAB 325 Overview The exam consists of five problems for 150 points. The points for each part of each problem

More information

A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES

A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES A SURVEY ON DICOM IMAGE COMPRESSION AND DECOMPRESSION TECHNIQUES Shreya A 1, Ajay B.N 2 M.Tech Scholar Department of Computer Science and Engineering 2 Assitant Professor, Department of Computer Science

More information

3. Image Formats. Figure1:Example of bitmap and Vector representation images

3. Image Formats. Figure1:Example of bitmap and Vector representation images 3. Image Formats. Introduction With the growth in computer graphics and image applications the ability to store images for later manipulation became increasingly important. With no standards for image

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution 2.1. General Purpose There are many popular general purpose lossless compression techniques, that can be applied to any type of data. 2.1.1. Run Length Encoding Run Length Encoding is a compression technique

More information

A Hybrid Technique for Image Compression

A Hybrid Technique for Image Compression Australian Journal of Basic and Applied Sciences, 5(7): 32-44, 2011 ISSN 1991-8178 A Hybrid Technique for Image Compression Hazem (Moh'd Said) Abdel Majid Hatamleh Computer DepartmentUniversity of Al-Balqa

More information

Compression. Encryption. Decryption. Decompression. Presentation of Information to client site

Compression. Encryption. Decryption. Decompression. Presentation of Information to client site DOCUMENT Anup Basu Audio Image Video Data Graphics Objectives Compression Encryption Network Communications Decryption Decompression Client site Presentation of Information to client site Multimedia -

More information

Digital Asset Management 2. Introduction to Digital Media Format

Digital Asset Management 2. Introduction to Digital Media Format Digital Asset Management 2. Introduction to Digital Media Format 2010-09-09 Content content = essence + metadata 2 Digital media data types Table. File format used in Macromedia Director File import File

More information

SYLLABUS of the course BASIC ELECTRONICS AND DIGITAL SIGNAL PROCESSING. Master in Computer Science, University of Bolzano-Bozen, a.y.

SYLLABUS of the course BASIC ELECTRONICS AND DIGITAL SIGNAL PROCESSING. Master in Computer Science, University of Bolzano-Bozen, a.y. SYLLABUS of the course BASIC ELECTRONICS AND DIGITAL SIGNAL PROCESSING Master in Computer Science, University of Bolzano-Bozen, a.y. 2017-2018 Lecturer: LEONARDO RICCI (last updated on November 27, 2017)

More information

Module 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains:

Module 8: Video Coding Basics Lecture 40: Need for video coding, Elements of information theory, Lossless coding. The Lecture Contains: The Lecture Contains: The Need for Video Coding Elements of a Video Coding System Elements of Information Theory Symbol Encoding Run-Length Encoding Entropy Encoding file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2040/40_1.htm[12/31/2015

More information

CHAPTER 6: REGION OF INTEREST (ROI) BASED IMAGE COMPRESSION FOR RADIOGRAPHIC WELD IMAGES. Every image has a background and foreground detail.

CHAPTER 6: REGION OF INTEREST (ROI) BASED IMAGE COMPRESSION FOR RADIOGRAPHIC WELD IMAGES. Every image has a background and foreground detail. 69 CHAPTER 6: REGION OF INTEREST (ROI) BASED IMAGE COMPRESSION FOR RADIOGRAPHIC WELD IMAGES 6.0 INTRODUCTION Every image has a background and foreground detail. The background region contains details which

More information

Speeding up Lossless Image Compression: Experimental Results on a Parallel Machine

Speeding up Lossless Image Compression: Experimental Results on a Parallel Machine Speeding up Lossless Image Compression: Experimental Results on a Parallel Machine Luigi Cinque 1, Sergio De Agostino 1, and Luca Lombardi 2 1 Computer Science Department Sapienza University Via Salaria

More information

ECE 499/599 Data Compression/Information Theory Spring 06. Dr. Thinh Nguyen. Homework 2 Due 04/27/06 at the beginning of the class

ECE 499/599 Data Compression/Information Theory Spring 06. Dr. Thinh Nguyen. Homework 2 Due 04/27/06 at the beginning of the class ECE 499/599 Data Compression/Information Theory Spring 06 Dr. Thinh Nguyen Homework 2 Due 04/27/06 at the beginning of the class Problem 2: Suppose you are given a task of compressing a Klingon text consisting

More information

Indian Institute of Technology, Roorkee, India

Indian Institute of Technology, Roorkee, India Volume-, Issue-, Feb.-7 A COMPARATIVE STUDY OF LOSSLESS COMPRESSION TECHNIQUES J P SATI, M J NIGAM, Indian Institute of Technology, Roorkee, India E-mail: jypsati@gmail.com, mkndnfec@gmail.com Abstract-

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 14: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 25 th, 2015 1 Previous Lecture: Source Code Generation: Lossless

More information

Course Developer: Ranjan Bose, IIT Delhi

Course Developer: Ranjan Bose, IIT Delhi Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information

More information

Raster Image File Formats

Raster Image File Formats Raster Image File Formats 1995-2016 Josef Pelikán & Alexander Wilkie CGG MFF UK Praha pepca@cgg.mff.cuni.cz http://cgg.mff.cuni.cz/~pepca/ 1 / 35 Raster Image Capture Camera Area sensor (CCD, CMOS) Colours:

More information

Computing and Communications 2. Information Theory -Channel Capacity

Computing and Communications 2. Information Theory -Channel Capacity 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication

More information

Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information

Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information Images with (a) coding redundancy; (b) spatial redundancy; (c) irrelevant information 1992 2008 R. C. Gonzalez & R. E. Woods For the image in Fig. 8.1(a): 1992 2008 R. C. Gonzalez & R. E. Woods Measuring

More information

CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES

CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 119 CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 5.1 INTRODUCTION In this work the peak powers of the OFDM signal is reduced by applying Adaptive Huffman Codes (AHC). First the encoding

More information

The Need for Data Compression. Data Compression (for Images) -Compressing Graphical Data. Lossy vs Lossless compression

The Need for Data Compression. Data Compression (for Images) -Compressing Graphical Data. Lossy vs Lossless compression The Need for Data Compression Data Compression (for Images) -Compressing Graphical Data Graphical images in bitmap format take a lot of memory e.g. 1024 x 768 pixels x 24 bits-per-pixel = 2.4Mbyte =18,874,368

More information

Comm. 502: Communication Theory. Lecture 6. - Introduction to Source Coding

Comm. 502: Communication Theory. Lecture 6. - Introduction to Source Coding Comm. 50: Communication Theory Lecture 6 - Introduction to Source Coding Digital Communication Systems Source of Information User of Information Source Encoder Source Decoder Channel Encoder Channel Decoder

More information

Transient Errors and Rollback Recovery in LZ Compression

Transient Errors and Rollback Recovery in LZ Compression Transient Errors and Rollback Recovery in LZ Compression Wei-Je Huang and Edward J. McCluskey CETER FOR RELIABLE COMPUTIG Computer Systems Laboratory, Department of Electrical Engineering Stanford University,

More information

The idea of similarity is through the Hamming

The idea of similarity is through the Hamming Hamming distance A good channel code is designed so that, if a few bit errors occur in transmission, the output can still be identified as the correct input. This is possible because although incorrect,

More information

Data Compression via Logic Synthesis

Data Compression via Logic Synthesis Data Compression via Logic Synthesis Luca Amarú 1, Pierre-Emmanuel Gaillardon 1, Andreas Burg 2, Giovanni De Micheli 1 Integrated Systems Laboratory (LSI), EPFL, Switzerland 1 Telecommunication Circuits

More information

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Subject Name: Information Coding Techniques UNIT I INFORMATION ENTROPY FUNDAMENTALS

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Subject Name: Information Coding Techniques UNIT I INFORMATION ENTROPY FUNDAMENTALS DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Name: Year /Sem: II / IV UNIT I INFORMATION ENTROPY FUNDAMENTALS PART A (2 MARKS) 1. What is uncertainty? 2. What is prefix coding? 3. State the

More information

Monday, February 2, Is assigned today. Answers due by noon on Monday, February 9, 2015.

Monday, February 2, Is assigned today. Answers due by noon on Monday, February 9, 2015. Monday, February 2, 2015 Topics for today Homework #1 Encoding checkers and chess positions Constructing variable-length codes Huffman codes Homework #1 Is assigned today. Answers due by noon on Monday,

More information

ECE/OPTI533 Digital Image Processing class notes 288 Dr. Robert A. Schowengerdt 2003

ECE/OPTI533 Digital Image Processing class notes 288 Dr. Robert A. Schowengerdt 2003 Motivation Large amount of data in images Color video: 200Mb/sec Landsat TM multispectral satellite image: 200MB High potential for compression Redundancy (aka correlation) in images spatial, temporal,

More information

Arithmetic Compression on SPIHT Encoded Images

Arithmetic Compression on SPIHT Encoded Images Arithmetic Compression on SPIHT Encoded Images Todd Owen, Scott Hauck {towen, hauck}@ee.washington.edu Dept of EE, University of Washington Seattle WA, 98195-2500 UWEE Technical Report Number UWEETR-2002-0007

More information

International Journal of High Performance Computing Applications

International Journal of High Performance Computing Applications International Journal of High Performance Computing Applications http://hpc.sagepub.com Lossless and Near-Lossless Compression of Ecg Signals with Block-Sorting Techniques Ziya Arnavut International Journal

More information

Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}

Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e} Outline efinition of ntroy Three ntroy coding techniques: Huffman coding rithmetic coding Lemel-Ziv coding ntroy oding (taken from the Technion) ntroy ntroy of a set of elements e,,e n with robabilities,

More information

Greedy Algorithms. Kleinberg and Tardos, Chapter 4

Greedy Algorithms. Kleinberg and Tardos, Chapter 4 Greedy Algorithms Kleinberg and Tardos, Chapter 4 1 Selecting gas stations Road trip from Fort Collins to Durango on a given route with length L, and fuel stations at positions b i. Fuel capacity = C miles.

More information

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10] Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Steganography

More information

GENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE

GENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE GENERIC CODE DESIGN ALGORITHMS FOR REVERSIBLE VARIABLE-LENGTH CODES FROM THE HUFFMAN CODE Wook-Hyun Jeong and Yo-Sung Ho Kwangju Institute of Science and Technology (K-JIST) Oryong-dong, Buk-gu, Kwangju,

More information

Information Theory: the Day after Yesterday

Information Theory: the Day after Yesterday : the Day after Yesterday Department of Electrical Engineering and Computer Science Chicago s Shannon Centennial Event September 23, 2016 : the Day after Yesterday IT today Outline The birth of information

More information

Tarek M. Sobh and Tarek Alameldin

Tarek M. Sobh and Tarek Alameldin Operator/System Communication : An Optimizing Decision Tool Tarek M. Sobh and Tarek Alameldin Department of Computer and Information Science School of Engineering and Applied Science University of Pennsylvania,

More information

Image compression using Weighted Average and Least Significant Bit Elimination Approach S.Subbulakshmi 1 Ezhilarasi Kanagasabai 2

Image compression using Weighted Average and Least Significant Bit Elimination Approach S.Subbulakshmi 1 Ezhilarasi Kanagasabai 2 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 Image compression using Weighted Average and Least Significant Bit Elimination Approach

More information

Wednesday, February 1, 2017

Wednesday, February 1, 2017 Wednesday, February 1, 2017 Topics for today Encoding game positions Constructing variable-length codes Huffman codes Encoding Game positions Some programs that play two-player games (e.g., tic-tac-toe,

More information

Learning, prediction and selection algorithms for opportunistic spectrum access

Learning, prediction and selection algorithms for opportunistic spectrum access Learning, prediction and selection algorithms for opportunistic spectrum access TRINITY COLLEGE DUBLIN Hamed Ahmadi Research Fellow, CTVR, Trinity College Dublin Future Cellular, Wireless, Next Generation

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 VHDL design of lossy DWT based image compression technique for video conferencing Anitha Mary. M 1 and Dr.N.M. Nandhitha 2 1 VLSI Design, Sathyabama University Chennai, Tamilnadu 600119, India 2 ECE, Sathyabama

More information

Multimedia Communications. Lossless Image Compression

Multimedia Communications. Lossless Image Compression Multimedia Communications Lossless Image Compression Old JPEG-LS JPEG, to meet its requirement for a lossless mode of operation, has chosen a simple predictive method which is wholly independent of the

More information

REVIEW OF IMAGE COMPRESSION TECHNIQUES FOR MULTIMEDIA IMAGES

REVIEW OF IMAGE COMPRESSION TECHNIQUES FOR MULTIMEDIA IMAGES REVIEW OF IMAGE COMPRESSION TECHNIQUES FOR MULTIMEDIA IMAGES 1 Tamanna, 2 Neha Bassan 1 Student- Department of Computer science, Lovely Professional University Phagwara 2 Assistant Professor, Department

More information

UNIT 7C Data Representation: Images and Sound

UNIT 7C Data Representation: Images and Sound UNIT 7C Data Representation: Images and Sound 1 Pixels An image is stored in a computer as a sequence of pixels, picture elements. 2 1 Resolution The resolution of an image is the number of pixels used

More information

ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010)

ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010) ECE 8771, Information Theory & Coding for Digital Communications Summer 2010 Syllabus & Outline (Draft 1 - May 12, 2010) Instructor: Kevin Buckley, Tolentine 433a, 610-519-5658 (W), 610-519-4436 (F), buckley@ece.vill.edu,

More information

Digital Image Processing Introduction

Digital Image Processing Introduction Digital Processing Introduction Dr. Hatem Elaydi Electrical Engineering Department Islamic University of Gaza Fall 2015 Sep. 7, 2015 Digital Processing manipulation data might experience none-ideal acquisition,

More information

6.450: Principles of Digital Communication 1

6.450: Principles of Digital Communication 1 6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of

More information

Lab 9: Huff(man)ing and Puffing Due April 18/19 (Implementation plans due 4/16, reports due 4/20)

Lab 9: Huff(man)ing and Puffing Due April 18/19 (Implementation plans due 4/16, reports due 4/20) Lab 9: Huff(man)ing and Puffing Due April 18/19 (Implementation plans due 4/16, reports due 4/20) The number of bits required to encode an image for digital storage or transmission can be quite large.

More information

TCET3202 Analog and digital Communications II

TCET3202 Analog and digital Communications II NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York DEPARTMENT: SUBJECT CODE AND TITLE: COURSE DESCRIPTION: REQUIRED COURSE Electrical and Telecommunications Engineering Technology TCET3202

More information

Chapter 9 Image Compression Standards

Chapter 9 Image Compression Standards Chapter 9 Image Compression Standards 9.1 The JPEG Standard 9.2 The JPEG2000 Standard 9.3 The JPEG-LS Standard 1IT342 Image Compression Standards The image standard specifies the codec, which defines how

More information

On the efficiency of luminance-based palette reordering of color-quantized images

On the efficiency of luminance-based palette reordering of color-quantized images On the efficiency of luminance-based palette reordering of color-quantized images Armando J. Pinho 1 and António J. R. Neves 2 1 Dep. Electrónica e Telecomunicações / IEETA, University of Aveiro, 3810

More information

Comparison of Data Compression in Text Using Huffman, Shannon-Fano, Run Length Encoding, and Tunstall Method

Comparison of Data Compression in Text Using Huffman, Shannon-Fano, Run Length Encoding, and Tunstall Method Comparison of Data Compression in Text Using Huffman, Shannon-Fano, Run Length Encoding, and Tunstall Method Dea Ayu Rachesti College Student, Faculty of Electrical Engineering, Telkom University, Bandung,

More information

Lossless Layout Compression for Maskless Lithography Systems

Lossless Layout Compression for Maskless Lithography Systems Lossless Layout Compression for Maskless Lithography Systems Vito Dai * and Avideh Zakhor Video and Image Processing Lab Department of Electrical Engineering and Computer Science Univ. of California/Berkeley

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Modified TiBS Algorithm for Image Compression

Modified TiBS Algorithm for Image Compression Modified TiBS Algorithm for Image Compression Pravin B. Pokle 1, Vaishali Dhumal 2,Jayantkumar Dorave 3 123 (Department of Electronics Engineering, Priyadarshini J.L.College of Engineering/ RTM N University,

More information

B. Tech. (SEM. VI) EXAMINATION, (2) All question early equal make. (3) In ease of numerical problems assume data wherever not provided.

B. Tech. (SEM. VI) EXAMINATION, (2) All question early equal make. (3) In ease of numerical problems assume data wherever not provided. " 11111111111111111111111111111111111111111111111111111111111111III *U-3091/8400* Printed Pages : 7 TEC - 601! I i B. Tech. (SEM. VI) EXAMINATION, 2007-08 DIGIT AL COMMUNICATION \ V Time: 3 Hours] [Total

More information

To compress or not to compress? Gabriele Buch, Frank Burkert, Joachim Hagenauer. Department of Communications Engineering,

To compress or not to compress? Gabriele Buch, Frank Burkert, Joachim Hagenauer. Department of Communications Engineering, To compress or not to compress? Gabriele Buch, Frank Burkert, Joachim Hagenauer and Bernhard Kukla Department of Communications Engineering, Technical University of Munich, Arcisstr 1, D-8090 Munich, Germany

More information

HUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St.

HUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St. Catherine Bénéteau and Patrick J. Van Fleet University of South Florida and University of St. Thomas SACNAS 2009 Mini Course WEDNESDAY, 14 OCTOBER, 2009 (1:40-3:00) LECTURE 2 SACNAS 2009 1 / 10 All lecture

More information

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr. Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system

More information

EE 8510: Multi-user Information Theory

EE 8510: Multi-user Information Theory EE 8510: Multi-user Information Theory Distributed Source Coding for Sensor Networks: A Coding Perspective Final Project Paper By Vikrham Gowreesunker Acknowledgment: Dr. Nihar Jindal Distributed Source

More information

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC Outline, Lecture 6 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Error Control Overview : n ARQ vs. FEC n Link vs. End-to-End : n Objectives n How Codes Work Code Examples: n Parity

More information

A Modified Image Template for FELICS Algorithm for Lossless Image Compression

A Modified Image Template for FELICS Algorithm for Lossless Image Compression Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet A Modified

More information

A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION

A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION Akhand Pratap Singh 1, Dr. Anjali Potnis 2, Abhineet Kumar 3 1 Dept. of electrical and electronics engineering, NITTTR Bhopal, M.P, India 2 Asst. professor,

More information

Simple, Fast, and Efficient Natural Language Adaptive Compression

Simple, Fast, and Efficient Natural Language Adaptive Compression Simple, Fast, and Efficient Natural Language Adaptive Compression Nieves R. Brisaboa, Antonio Fariña, Gonzalo Navarro and José R. Paramá Database Lab., Univ. da Coruña, Facultade de Informática, Campus

More information

Starting a Digitization Project: Basic Requirements

Starting a Digitization Project: Basic Requirements Starting a Digitization Project: Basic Requirements Item Type Book Authors Deka, Dipen Citation Starting a Digitization Project: Basic Requirements 2008-11, Publisher Assam College Librarians' Association

More information

UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, April 28, Midterm Solutions (Prepared by TA Shouvik Ganguly)

UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, April 28, Midterm Solutions (Prepared by TA Shouvik Ganguly) UCSD ECE54C Handout #2 Prof. Young-Han Kim Thursday, April 28, 26 Midterm Solutions (Prepared by TA Shouvik Ganguly) There are 3 problems, each problem with multiple parts, each part worth points. Your

More information

RAKE: a Simple and Efficient Lossless Compression Algorithm for the Internet of Things

RAKE: a Simple and Efficient Lossless Compression Algorithm for the Internet of Things RAKE: a Simple and Efficient Lossless Compression Algorithm for the Internet of Things Giuseppe Campobello, Antonino Segreto, Sarah Zanafi 2, Salvatore Serrano Department of Engineering - University of

More information

A STUDY OF IMAGE COMPRESSION TECHNIQUES AND ITS APPLICATION IN TELEMEDICINE AND TELECONSULTATION

A STUDY OF IMAGE COMPRESSION TECHNIQUES AND ITS APPLICATION IN TELEMEDICINE AND TELECONSULTATION A STUDY OF IMAGE COMPRESSION TECHNIQUES AND ITS APPLICATION IN TELEMEDICINE AND TELECONSULTATION 1 HIMALI B. KOTAK, 2 SANJAY A. VALAKI 1, 2 Department of Computer Engineering, Government Polytechnic, Bhuj,

More information

Huffman Coding with Non-Sorted Frequencies

Huffman Coding with Non-Sorted Frequencies Huffman Coding with Non-Sorted Frequencies Shmuel T. Klein and Dana Shapira Abstract. A standard way of implementing Huffman s optimal code construction algorithm is by using a sorted sequence of frequencies.

More information

Solutions to Assignment-2 MOOC-Information Theory

Solutions to Assignment-2 MOOC-Information Theory Solutions to Assignment-2 MOOC-Information Theory 1. Which of the following is a prefix-free code? a) 01, 10, 101, 00, 11 b) 0, 11, 01 c) 01, 10, 11, 00 Solution:- The codewords of (a) are not prefix-free

More information

Fundamentals of Digital Communications and Data Transmission

Fundamentals of Digital Communications and Data Transmission Fundamentals of Digital Communications and Data Transmission 29 th October 2008 Abdullah Al-Meshal Overview Introduction Communication systems Digital communication system Importance of Digital transmission

More information

Lossless Image Compression Techniques Comparative Study

Lossless Image Compression Techniques Comparative Study Lossless Image Compression Techniques Comparative Study Walaa Z. Wahba 1, Ashraf Y. A. Maghari 2 1M.Sc student, Faculty of Information Technology, Islamic university of Gaza, Gaza, Palestine 2Assistant

More information

Topics. 1. Raster vs vector graphics. 2. File formats. 3. Purpose of use. 4. Decreasing file size

Topics. 1. Raster vs vector graphics. 2. File formats. 3. Purpose of use. 4. Decreasing file size Topics 1. Raster vs vector graphics 2. File formats 3. Purpose of use 4. Decreasing file size Vector graphics Object-oriented graphics or drawings Consist of a series of mathematically defined points that

More information

Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai

Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai Slides credited from Hsueh-I Lu, Hsu-Chun Hsiao, & Michael Tsai Mini-HW 6 Released Due on 11/09 (Thu) 17:20 Homework 2 Due on 11/09 (Thur) 17:20 Midterm Time: 11/16 (Thur) 14:20-17:20 Format: close book

More information

Speech Coding in the Frequency Domain

Speech Coding in the Frequency Domain Speech Coding in the Frequency Domain Speech Processing Advanced Topics Tom Bäckström Aalto University October 215 Introduction The speech production model can be used to efficiently encode speech signals.

More information

Lossless Grayscale Image Compression using Blockwise Entropy Shannon (LBES)

Lossless Grayscale Image Compression using Blockwise Entropy Shannon (LBES) Volume No., July Lossless Grayscale Image Compression using Blockwise ntropy Shannon (LBS) S. Anantha Babu Ph.D. (Research Scholar) & Assistant Professor Department of Computer Science and ngineering V

More information