Lec 05 Arithmetic Coding

Size: px
Start display at page:

Download "Lec 05 Arithmetic Coding"

Transcription

1 ECE 5578 Multimedia Communication Lec 05 Arithmetic Coding Zhu Li Dept of CSEE, UMKC web: phone: x2346 Z. Li, Multimedia Communciation, 208 p.

2 Outline Lecture 04 ReCap Arithmetic Coding About Homework- and Lab Z. Li, Multimedia Communciation, 208 p.2

3 JPEG Coding Block (8x8 pel) based coding DCT transform to find sparse representation Quantization reflects human visual system Zig-Zag scan to convert 2D to D string Run-Level pairs to have even more compact representation Hoffman Coding on Level Category Fixed on the Level with in the category = * Quant Table: Z. Li, Multimedia Communciation, 208 p.3

4 Coding of AC Coefficients Zigzag scanning: Example Example: zigzag scanning result EOB (Run, level) representation: (0, 24), (0, -3), (, -4), (0, -2), (, 6), (0, -2), (3, -), (0, -), (3, 2), (0, -2), (5, -), EOB Z. Li, Multimedia Communciation, 208 p.4

5 Coding of AC Coefficients Run / Catg. Base codeword Run / Catg. Base Codeword Run / Cat. Base codeword EOB ZRL 00 0/ 00 / 00 5/ 00 0/2 0 /2 0 5/2 00 0/3 00 /3 00 5/3 0 0/4 0 /4 00 5/ /5 00 /5 00 5/5 00 ZRL: represent 6 zeros when number of zeros exceeds 5. Example: 20 zeros followed by -: (ZRL), (4, -). (Run, Level) sequence: (0, 24), (0, -3), (, -4), Run/Cat. Sequence: 0/5, 0/5, /3, 24 is the 24-th entry in Category 5 (0, 24): is the 3-th entry in Category 3 (, -4): 00 0 Z. Li, Multimedia Communciation, 208 p.5

6 Outline Lecture 04 ReCap Arithmetic Coding Basic Encoding and Decoding Uniqueness and Efficiency Scaling and Incremental Coding Integer Implementation About Homework- and Lab Z. Li, Multimedia Communciation, 208 p.6

7 Arithmetic Coding The SciFi Story When I was in my 5 th grade. Aliens visit earth. Z. Li, Multimedia Communciation, 208 p.7

8 Huffman Coding Replacing an input symbol with a codeword Need a probability distribution Hard to adapt to changing statistics Need to store the codeword table Minimum codeword length is bit Arithmetic Coding Replace the entire input with a single floating-point number Does not need the probability distribution Adaptive coding is very easy No need to keep and send codeword table Fractional codeword length Z. Li, Multimedia Communciation, 208 p.8

9 Introduction Recall table look-up decoding of Huffman code N: alphabet size L: Max code word length Divide [0, 2^L] into N intervals 00 One interval for one symbol Interval size is roughly 00 0 proportional to symbol prob Arithmetic coding applies this idea recursively Normalizes the range [0, 2 L ] to [0, ]. Map an input sequence (multiple symbols) to a unique tag in [0, ). abcd.. dcba.. 0 Z. Li, Multimedia Communciation, 208 p.9

10 Arithmetic Coding Symbol set and prob: a (0.8), b(0.02), c(0.8) Disjoint and complete partition of the range [0, ) [0, 0.8), [0.8, 0.82), [0.82, ) Each interval corresponds to one symbol Interval size is proportional to symbol probability The first symbol restricts the tag position to be in one of the intervals The reduced interval is partitioned recursively as more symbols are processed Observation: once the tag falls into an interval, it never gets out of it a b c Z. Li, Multimedia Communciation, 208 p.0

11 Some Questions to think about: Why compression is achieved this way? How to implement it efficiently? How to decode the sequence? Why is it better than Huffman code? Z. Li, Multimedia Communciation, 208 p.

12 Example: Symbol Prob Map to real line range [0, ) Order does not matter Decoder needs to use the same order Disjoint but complete partition: : [0, 0.8): 0, : [0.8, 0.82): 0.8, : [0.82, ): 0.82, Z. Li, Multimedia Communciation, 208 p.2

13 Concept of the encoding (not practical) Input sequence: 32 Range Range Range Range Termination: Encode the lower end or midpoint to signal the end. Difficulties:. Shrinking of interval requires very high precision for long sequence. 2. No output is generated until the entire sequence has been processed. Z. Li, Multimedia Communciation, 208 p.3

14 Encoder Pseudo Code Cumulative Density Function (CDF) For continuous distribution: x ò - F ( x) = P( X x) = p( x) dx X Probability Mass Function For discrete distribution: X Properties: Non-decreasing Piece-wise constant å F ( i) = P( X i) = P( X = k) X k =- P( X = i) = F ( i) - F ( i -). X Each segment is closed at the lower end. i X.0 CDF X Z. Li, Multimedia Communciation, 208 p.4

15 Encoder Pseudo Code Keep track of LOW, HIGH, RANGE Any two are sufficient, e.g., LOW and RANGE. LOW=0.0, HIGH=.0; while (not EOF) { n = ReadSymbol(); RANGE = HIGH - LOW; HIGH = LOW + RANGE * CDF(n); LOW = LOW + RANGE * CDF(n-); } output LOW; Input HIGH LOW RANGE Initial *0.8= *0 = *= *0.82= *0.82= *0.8= *0= *0.8= Z. Li, Multimedia Communciation, 208 p.5

16 Concept of the Decoding Arithmetic Decoding (conceptual) Suppose encoder encodes the lower end: Decode Zoom In by * CDF Decode 3 Decode * CDF * CDF Decode Drawback: need to recalculate all thresholds each time. Z. Li, Multimedia Communciation, 208 p.6

17 Simplified Decoding (Floating Pt Ops) Normalize RANGE to [0, ) each time No need to recalculate the thresholds. Receive Decode 2 3 x x - low range x =( ) / 0.8 = Decode x =( ) / 0.8 = Decode 2 x =( ) / 0.02 = 0 Decode. Stop Z. Li, Multimedia Communciation, 208 p.7

18 Decoder Pseudo Code Low = 0; high = ; x = GetEncodedNumber(); While (x low) { n = DecodeOneSymbol(x); output symbol n; x = (x - CDF(n-)) / (CDF(n) - CDF(n-)); }; But this method still needs high-precision floating point operations. It also needs to read all input at the beginning of the decoding. Z. Li, Multimedia Communciation, 208 p.8

19 Outline Lecture 04 ReCap Arithmetic Coding Basic Encoding and Decoding Uniqueness and Efficiency Scaling and Incremental Coding About Homework- and Lab Z. Li, Multimedia Communciation, 208 p.9

20 Uniqueness Range Termination: Encode the midpoint (or lower end) to signal the end. How to represent the final tag uniquely and efficiently? Answer: Take the binary value of the tag T(X) and truncate to (X is the sequence {x,, x m }, not individual symbol) Proof: é ù l( X ) = log + bits. ( ) ê p X ú T(X) = F(X -) + p( X ), p(x) > 2 Assuming midpoint tag: First show the truncated code is unique, that is, code is within [F(X-), F(X)). ). ë û T ( X ) F( ) T(X) X ) T(X) So ë û l( X ) < X l ( bit longer than Shannon code is below the high end of the interval. Z. Li, Multimedia Communciation, 208 p.20 0.

21 Uniqueness and Efficiency 2). By def, 2 Together with -l( X ) = 2 æ é ù ö -ç log p( X ) + è ê ú ø 2 æ ö -ç log + è p( X ) ø T(X) = F(X -) + p( X ), p(x) > 2 T(X) - F(X -) = p( X ) ³ 2 2 T(X)- êë T(X) úû l( X ) - ( ) 2 l X = l(x) p( X ) F(X) T(X) ë û ³ F( X ). T(X) l X ) ( - ³ ( 2 -l X ) ( 2 -l X ) ët(x) û l( X ) Thus ët(x) û F( ) F( X -) X ) < X l ( F(X-) So the truncated code is still in the interval. This proves the uniqueness. Z. Li, Multimedia Communciation, 208 p.2

22 Uniqueness and Efficiency Prove the code is uniquely decodable (prefix free): Any code with prefix é ö êët(x) û, ët(x) û + l( X ) l( X ) l( X ) ø ë ët(x) û l( X ) is in 2 Need to show that this is in [F(X-), F(X) ): We already show ë û ³ F( X ). T(X) l X ) ( - F ( X ) - T(X) > X 2 Only need to show ë û l( X ) l( ) p( X ) F X ) - > 2 2 ët(x) û > F( X ) -T ( X ) = l( X ) l( ) ( X ët(x) û ( X ) é ù is prefix free if l( X ) = log + bits. l ( ) ê p X ú F(X) ë T(X) + 2 û l( X ) ët(x) û l( X ) F(X-) l( X ) Z. Li, Multimedia Communciation, 208 p.22

23 Uniqueness and Efficiency Efficiency of arithmetic code: bits. ) ( log ) ( + ú ú ù ê ê é = m m X p X l { } 2 ) ( ) ( log ) ( ) ( log ) ( ) ( ) ( + = ø ö ç ç è æ + + ø ö ç ç è æ ú + ú ù ê ê é = = å å m m m m m m m X H X p X P X p X P X l X p E L l(x) is the bits to code a sequence {x,x 2,, x m }. Assume iid sequence, ) ( ) ( X mh X H m = m X H m L X H 2 ) ( ) ( + L/m H(X) for large m, stronger than prev results. : {,..., } m X x x m Z. Li, Multimedia Communciation, 208 p.23

24 Uniqueness and Efficiency Comparison with Huffman code: Expected length of Huffman code: H ( X ) * L H ( X ) + Huffman code can reduce the overhead by jointly encoding more symbols, but needs much larger alphabet size. Arithmetic coding is more efficient for longer sequences. Z. Li, Multimedia Communciation, 208 p.24

25 Binary Arithmetic Coding Arithmetic coding is slow in general: To decode a symbol, we need a series of decisions and multiplications: While (Tag > LOW + RANGE * Sum(n) / N - ) { n++; } The complexity is greatly reduced if we have only two symbols: 0 and. symbol 0 symbol 0 x Only two intervals: [0, x), [x, ) Z. Li, Multimedia Communciation, 208 p.25

26 Encoding of Binary Arithmetic Coding HIGH LOW + RANGE CDF( n) LOW LOW + RANGE CDF( n -) LOW = 0, HIGH = Prob(0)=0.6. Sequence: 00 LOW = 0, HIGH = LOW = 0.36, HIGH = LOW = 0.504, HIGH = LOW = 0.504, HIGH = Only need to update LOW or HIGH for each symbol. Z. Li, Multimedia Communciation, 208 p.26

27 Decoding of Binary Arithmetic Coding Tag General case (integer implementation): While (Tag > LOW + RANGE * Sum(n) / N - )) { n++; } Binary case: only one condition to check if (Tag > LOW + RANGE * Sum(Symbol0) / N - ) { n = ; } else { n = 0; } Z. Li, Multimedia Communciation, 208 p.27

28 Applications of Binary Arithmetic Coding Increasingly popular: JBIG, JBIG2, JPEG2000, H.264 Convert non-binary signals into binary: Golomb-Rice Code: used in H.264. Bit-plane coding: used in JPEG2000. B = [B0, B,, BK-]: binary representation of B. Chain rule: H(B) = H(B0) +H(B B0) + + H(BK- B0, BK-2). To code B0, needs P0(0): Prob(B0=0). To code B, needs P(0 i): Prob(B=0 B0 = i), i = 0,. More details: AVC Binary Adaptive Arithmetic Coding: CABAC HEVC Arithmetic Coding: Z. Li, Multimedia Communciation, 208 p.28

29 Outline Lecture 04 ReCap Arithmetic Coding Basic Encoding and Decoding Uniqueness and Efficiency Scaling and Incremental Coding About Homework- and Lab Z. Li, Multimedia Communciation, 208 p.29

30 Scaling and Incremental Coding Problems of Previous examples: Need high precision No output is generated until the entire sequence is encoded. Decoder needs to read all input before decoding. Key Observation: As the RANGE reduces, many MSB s of LOW and HIGH become identical: Example: Binary form of and : , , We can output identical MSB s and re-scale the rest: Incremental encoding Can achieve infinite precision with finite-precision integers. Three scaling scenarios: E, E2, E3 Important Rules: Apply as many scalings as possible before further encoding and decoding. Z. Li, Multimedia Communciation, 208 p.30

31 E (lower half) and E 2 (higher half) Scaling E: [LOW HIGH) in [0, 0.5) LOW: 0.0xxxxxxx (binary), HIGH: 0.0xxxxxxx Output 0, then shift left by bit [0, 0.5) [0, ): E(x) = 2 x E2: [LOW HIGH) in [0.5, ) LOW: 0.xxxxxxx, HIGH: 0.xxxxxxx Output, subtract 0.5, shift left by bit [0.5, ) [0, ): E2(x) = 2(x - 0.5) The 3 rd 0 scaling, E3(mid), will be studied later: LOW < 0.5, HIGH > 0.5, but range < 0.5. Z. Li, Multimedia Communciation, 208 p.3

32 Encoding with E and E2 Input Input Input Symbol Prob E2: Output 2(x 0.5) E2: Output E: 2x, Output 0 E: Output 0 E: Output 0 Input E2: Output Encode any value in the tag, e.g., 0.5 Output All: 000 (0.7734) Z. Li, Multimedia Communciation,

33 To verify LOW = ( in binary), HIGH = ( in binary). So we can send out 000 (0.5325) Equivalent to E2 E E E E2 After left shift by 5 bits: LOW = ( ) x 32 = HIGH = ( ) x 32 = Same as the result in the last page. (In this example, suppose 7 bits are enough for the decoding) Z. Li, Multimedia Communciation, 208 p.33

34 Comparison with Huffman Rule: Complete all possible scaling before encoding the next symbol Symbol Prob. 0.8 Input Symbol does not cause any output Input Symbol 3 generates bit Input Symbol 2 generates 5 bits Symbols with larger probabilities generates less number of bits. Sometimes no bit is generated at all Advantage over Huffman coding Large probabilities are desired in arithmetic coding Can use context-adaptive method to create larger probability and to improve compression ratio Z. Li, Multimedia Communciation, 208 p.34

35 Incremental Decoding If input is 000, the st symbol can be decoded without ambiguity after 5 bits are read. When 6 bits are read, the status is: Read 5 bits: Decode. After reading 6 bits: Tag: 000, No scaling Decode 3, E2 scaling: Shift out bit, read bit Tag: 000 ( ) Decode 2, E2 scaling Tag: 0000 ( ) E: Tag: 0000 (0.875) E: Tag: 0000 (0.375) E: Tag: 0000 (0.75) E2: Tag: (0.5) Decode Z. Li, Multimedia Communciation, 208 p.35

36 Encoding Pseudo Code with E, E2 Rule: Complete all possible scalings before further decoding. Adjust LOW, HIGH and Tag together. (For floating-point implementation) EncodeSymbol(n) { //Update variables RANGE = HIGH - LOW; HIGH = LOW + RANGE * CDF(n); LOW = LOW + RANGE * CDF(n-); Symbol Prob. CDF } //Apply all possible scalings before encoding the //next symbol while LOW, HIGH in [0, 0.5) or [0.5, ) { Output 0 for E and for E2 scale LOW, HIGH by E or E2 rule } Z. Li, Multimedia Communciation, 208 p.36

37 Decoding Pseudo Code with E, E2 (For floating-point implementation) DecodeSymbol(Tag) { RANGE = HIGH - LOW; n = ; While ( (tag - LOW) / RANGE >= CDF(n) ) { n++; } HIGH = LOW + RANGE * CDF(n); LOW = LOW + RANGE * CDF(n-); Symbol Prob. CDF //keep scaling before decoding next symbol while LOW, HIGH in [0, 0.5) or [0.5, ) { scale LOW, HIGH by E or E2 rule read one more bit, update Tag } return n; } Z. Li, Multimedia Communciation, 208 p.37

38 E3 Scaling: [0.25, 0.75) [0, ) If RANGE straddles /2, E and E2 cannot be applied, but the range can be quite small Example: LOW=0.4999, HIGH=0.500 Binary: LOW=0.0., HIGH=0.000 We may not have enough bits to represent the interval. E3 Scaling: [0.25, 0.75) [0, ): E3(x) = 2(x ) Z. Li, Multimedia Communciation, 208 p.38

39 Example Previous example without E3: Input Input (E2: Output ) Input E2: Output E: Output With E3: Input E3: (x-0.25)x2 E2: Output state after E2 E3 = state after E E2, but outputs are different Z. Li, Multimedia Communciation,

40 Encoding Operation with E3 Without E3: Input E2: Output E: Output With E3: Input E3 (no output) E2: Output Output 0 here! Don t send anything when E3 is used, but send a 0 after E2: Same output, same final state Equivalent operations Z. Li, Multimedia Communciation,

41 Decoding for E3 0 Without E3: Input 000 Read 6 bits: Tag: 000 ( ) Decode Decode 3, E2 scaling Tag: 000 ( ) Decode 2, E2 scaling Tag: 0000 ( ) E: Tag: 0000 (0.875) With E3: Tag: 000 ( ) E3: Tag: 000 ( ) Decode 2, E2 scaling Tag: 0000 (0.875) Apply E3 whenever it is possible, everything else is same. Z. Li, Multimedia Communciation, 208 p.4

42 Summary of Different Scalings Need E scaling Need E2 scaling Need E3 scaling No scaling is required. Continue to encode/decode the next symbol. Z. Li, Multimedia Communciation, 208 p.42

43 HW- Info Theory: Entropy, Conditional Entropy, Mutual Info, Relative Entropy (KL Divergence) Hoffman Coding Residual Image Error statistics and Golomb coding Pixel value prediction filtering Residual error distribution modeling Optimal m selection in Golomb coding Z. Li, Multimedia Communciation, 208 p.43

44 Summary VLC is the real world image coding solution Elements of Hoffman and Golomb coding schemes are incorporated JPEG: introduced DC prediction, AC zigzag scan, run-level VLC H264: introduced reverse order coding. Z. Li, Multimedia Communciation, 208 p.44

Lec 05 Arithmetic Coding

Lec 05 Arithmetic Coding Outline CS/EE 5590 / ENG 40 Special Topics (7804, 785, 7803 Lec 05 Arithetic Coding Lecture 04 ReCap Arithetic Coding About Hoework- and Lab Zhu Li Course Web: http://l.web.ukc.edu/lizhu/teaching/06sp.video-counication/ain.htl

More information

Lec 04 Variable Length Coding (VLC) in JPEG

Lec 04 Variable Length Coding (VLC) in JPEG ECE 5578 Multimedia Communication Lec 04 Variable Length Coding (VLC) in JPEG Zhu Li Dept of CSEE, UMKC Z. Li Multimedia Communciation, 2018 p.1 Outline Lecture 03 ReCap VLC JPEG Image Coding Framework

More information

CMPT 365 Multimedia Systems. Lossless Compression

CMPT 365 Multimedia Systems. Lossless Compression CMPT 365 Multimedia Systems Lossless Compression Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Outline Why compression? Entropy Variable Length Coding Shannon-Fano Coding

More information

Lec 03 Entropy and Coding II Hoffman and Golomb Coding

Lec 03 Entropy and Coding II Hoffman and Golomb Coding CS/EE 5590 / ENG 40 Special Topics Multimedia Communication, Spring 207 Lec 03 Entropy and Coding II Hoffman and Golomb Coding Zhu Li Z. Li Multimedia Communciation, 207 Spring p. Outline Lecture 02 ReCap

More information

CMPT 365 Multimedia Systems. Final Review - 1

CMPT 365 Multimedia Systems. Final Review - 1 CMPT 365 Multimedia Systems Final Review - 1 Spring 2017 CMPT365 Multimedia Systems 1 Outline Entropy Lossless Compression Shannon-Fano Coding Huffman Coding LZW Coding Arithmetic Coding Lossy Compression

More information

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding SIGNAL COMPRESSION Lecture 3 4.9.2007 Shannon-Fano-Elias Codes and Arithmetic Coding 1 Shannon-Fano-Elias Coding We discuss how to encode the symbols {a 1, a 2,..., a m }, knowing their probabilities,

More information

EE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018

EE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018 Please submit the solutions on Gradescope. EE376A: Homework #3 Due by 11:59pm Saturday, February 10th, 2018 1. Optimal codeword lengths. Although the codeword lengths of an optimal variable length code

More information

Shannon-Fano-Elias coding

Shannon-Fano-Elias coding Shannon-Fano-Elias coding Suppose that we have a memoryless source X t taking values in the alphabet {1, 2,..., L}. Suppose that the probabilities for all symbols are strictly positive: p(i) > 0, i. The

More information

3F1 Information Theory, Lecture 3

3F1 Information Theory, Lecture 3 3F1 Information Theory, Lecture 3 Jossy Sayir Department of Engineering Michaelmas 2013, 29 November 2013 Memoryless Sources Arithmetic Coding Sources with Memory Markov Example 2 / 21 Encoding the output

More information

Gaussian source Assumptions d = (x-y) 2, given D, find lower bound of I(X;Y)

Gaussian source Assumptions d = (x-y) 2, given D, find lower bound of I(X;Y) Gaussian source Assumptions d = (x-y) 2, given D, find lower bound of I(X;Y) E{(X-Y) 2 } D

More information

Lecture 3 : Algorithms for source coding. September 30, 2016

Lecture 3 : Algorithms for source coding. September 30, 2016 Lecture 3 : Algorithms for source coding September 30, 2016 Outline 1. Huffman code ; proof of optimality ; 2. Coding with intervals : Shannon-Fano-Elias code and Shannon code ; 3. Arithmetic coding. 1/39

More information

Data Compression Techniques (Spring 2012) Model Solutions for Exercise 2

Data Compression Techniques (Spring 2012) Model Solutions for Exercise 2 582487 Data Compression Techniques (Spring 22) Model Solutions for Exercise 2 If you have any feedback or corrections, please contact nvalimak at cs.helsinki.fi.. Problem: Construct a canonical prefix

More information

1 Introduction to information theory

1 Introduction to information theory 1 Introduction to information theory 1.1 Introduction In this chapter we present some of the basic concepts of information theory. The situations we have in mind involve the exchange of information through

More information

Basics of DCT, Quantization and Entropy Coding

Basics of DCT, Quantization and Entropy Coding Basics of DCT, Quantization and Entropy Coding Nimrod Peleg Update: April. 7 Discrete Cosine Transform (DCT) First used in 97 (Ahmed, Natarajan and Rao). Very close to the Karunen-Loeve * (KLT) transform

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE General e Image Coder Structure Motion Video x(s 1,s 2,t) or x(s 1,s 2 ) Natural Image Sampling A form of data compression; usually lossless, but can be lossy Redundancy Removal Lossless compression: predictive

More information

Chapter 5: Data Compression

Chapter 5: Data Compression Chapter 5: Data Compression Definition. A source code C for a random variable X is a mapping from the range of X to the set of finite length strings of symbols from a D-ary alphabet. ˆX: source alphabet,

More information

Motivation for Arithmetic Coding

Motivation for Arithmetic Coding Motivation for Arithmetic Coding Motivations for arithmetic coding: 1) Huffman coding algorithm can generate prefix codes with a minimum average codeword length. But this length is usually strictly greater

More information

CSE 408 Multimedia Information System Yezhou Yang

CSE 408 Multimedia Information System Yezhou Yang Image and Video Compression CSE 408 Multimedia Information System Yezhou Yang Lots of slides from Hassan Mansour Class plan Today: Project 2 roundup Today: Image and Video compression Nov 10: final project

More information

CSEP 590 Data Compression Autumn Arithmetic Coding

CSEP 590 Data Compression Autumn Arithmetic Coding CSEP 590 Data Compression Autumn 2007 Arithmetic Coding Reals in Binary Any real number x in the interval [0,1) can be represented in binary as.b 1 b 2... where b i is a bit. x 0 0 1 0 1... binary representation

More information

Overview. Analog capturing device (camera, microphone) PCM encoded or raw signal ( wav, bmp, ) A/D CONVERTER. Compressed bit stream (mp3, jpg, )

Overview. Analog capturing device (camera, microphone) PCM encoded or raw signal ( wav, bmp, ) A/D CONVERTER. Compressed bit stream (mp3, jpg, ) Overview Analog capturing device (camera, microphone) Sampling Fine Quantization A/D CONVERTER PCM encoded or raw signal ( wav, bmp, ) Transform Quantizer VLC encoding Compressed bit stream (mp3, jpg,

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yaroslavsky. Fundamentals of Digital Image Processing. Course 0555.330 Lec. 6. Principles of image coding The term image coding or image compression refers to processing image digital data aimed at

More information

Basics of DCT, Quantization and Entropy Coding. Nimrod Peleg Update: Dec. 2005

Basics of DCT, Quantization and Entropy Coding. Nimrod Peleg Update: Dec. 2005 Basics of DCT, Quantization and Entropy Coding Nimrod Peleg Update: Dec. 2005 Discrete Cosine Transform (DCT) First used in 974 (Ahmed, Natarajan and Rao). Very close to the Karunen-Loeve * (KLT) transform

More information

lossless, optimal compressor

lossless, optimal compressor 6. Variable-length Lossless Compression The principal engineering goal of compression is to represent a given sequence a, a 2,..., a n produced by a source as a sequence of bits of minimal possible length.

More information

Lecture 4 : Adaptive source coding algorithms

Lecture 4 : Adaptive source coding algorithms Lecture 4 : Adaptive source coding algorithms February 2, 28 Information Theory Outline 1. Motivation ; 2. adaptive Huffman encoding ; 3. Gallager and Knuth s method ; 4. Dictionary methods : Lempel-Ziv

More information

3F1 Information Theory, Lecture 3

3F1 Information Theory, Lecture 3 3F1 Information Theory, Lecture 3 Jossy Sayir Department of Engineering Michaelmas 2011, 28 November 2011 Memoryless Sources Arithmetic Coding Sources with Memory 2 / 19 Summary of last lecture Prefix-free

More information

(Classical) Information Theory II: Source coding

(Classical) Information Theory II: Source coding (Classical) Information Theory II: Source coding Sibasish Ghosh The Institute of Mathematical Sciences CIT Campus, Taramani, Chennai 600 113, India. p. 1 Abstract The information content of a random variable

More information

10-704: Information Processing and Learning Fall Lecture 10: Oct 3

10-704: Information Processing and Learning Fall Lecture 10: Oct 3 0-704: Information Processing and Learning Fall 206 Lecturer: Aarti Singh Lecture 0: Oct 3 Note: These notes are based on scribed notes from Spring5 offering of this course. LaTeX template courtesy of

More information

Chapter 2 Date Compression: Source Coding. 2.1 An Introduction to Source Coding 2.2 Optimal Source Codes 2.3 Huffman Code

Chapter 2 Date Compression: Source Coding. 2.1 An Introduction to Source Coding 2.2 Optimal Source Codes 2.3 Huffman Code Chapter 2 Date Compression: Source Coding 2.1 An Introduction to Source Coding 2.2 Optimal Source Codes 2.3 Huffman Code 2.1 An Introduction to Source Coding Source coding can be seen as an efficient way

More information

Homework Set #2 Data Compression, Huffman code and AEP

Homework Set #2 Data Compression, Huffman code and AEP Homework Set #2 Data Compression, Huffman code and AEP 1. Huffman coding. Consider the random variable ( x1 x X = 2 x 3 x 4 x 5 x 6 x 7 0.50 0.26 0.11 0.04 0.04 0.03 0.02 (a Find a binary Huffman code

More information

Coding for Discrete Source

Coding for Discrete Source EGR 544 Communication Theory 3. Coding for Discrete Sources Z. Aliyazicioglu Electrical and Computer Engineering Department Cal Poly Pomona Coding for Discrete Source Coding Represent source data effectively

More information

Autumn Coping with NP-completeness (Conclusion) Introduction to Data Compression

Autumn Coping with NP-completeness (Conclusion) Introduction to Data Compression Autumn Coping with NP-completeness (Conclusion) Introduction to Data Compression Kirkpatrick (984) Analogy from thermodynamics. The best crystals are found by annealing. First heat up the material to let

More information

EE376A - Information Theory Midterm, Tuesday February 10th. Please start answering each question on a new page of the answer booklet.

EE376A - Information Theory Midterm, Tuesday February 10th. Please start answering each question on a new page of the answer booklet. EE376A - Information Theory Midterm, Tuesday February 10th Instructions: You have two hours, 7PM - 9PM The exam has 3 questions, totaling 100 points. Please start answering each question on a new page

More information

MARKOV CHAINS A finite state Markov chain is a sequence of discrete cv s from a finite alphabet where is a pmf on and for

MARKOV CHAINS A finite state Markov chain is a sequence of discrete cv s from a finite alphabet where is a pmf on and for MARKOV CHAINS A finite state Markov chain is a sequence S 0,S 1,... of discrete cv s from a finite alphabet S where q 0 (s) is a pmf on S 0 and for n 1, Q(s s ) = Pr(S n =s S n 1 =s ) = Pr(S n =s S n 1

More information

4F5: Advanced Communications and Coding Handout 2: The Typical Set, Compression, Mutual Information

4F5: Advanced Communications and Coding Handout 2: The Typical Set, Compression, Mutual Information 4F5: Advanced Communications and Coding Handout 2: The Typical Set, Compression, Mutual Information Ramji Venkataramanan Signal Processing and Communications Lab Department of Engineering ramji.v@eng.cam.ac.uk

More information

PROBABILITY AND INFORMATION THEORY. Dr. Gjergji Kasneci Introduction to Information Retrieval WS

PROBABILITY AND INFORMATION THEORY. Dr. Gjergji Kasneci Introduction to Information Retrieval WS PROBABILITY AND INFORMATION THEORY Dr. Gjergji Kasneci Introduction to Information Retrieval WS 2012-13 1 Outline Intro Basics of probability and information theory Probability space Rules of probability

More information

Chapter 3 Source Coding. 3.1 An Introduction to Source Coding 3.2 Optimal Source Codes 3.3 Shannon-Fano Code 3.4 Huffman Code

Chapter 3 Source Coding. 3.1 An Introduction to Source Coding 3.2 Optimal Source Codes 3.3 Shannon-Fano Code 3.4 Huffman Code Chapter 3 Source Coding 3. An Introduction to Source Coding 3.2 Optimal Source Codes 3.3 Shannon-Fano Code 3.4 Huffman Code 3. An Introduction to Source Coding Entropy (in bits per symbol) implies in average

More information

Data Compression Techniques

Data Compression Techniques Data Compression Techniques Part 1: Entropy Coding Lecture 4: Asymmetric Numeral Systems Juha Kärkkäinen 08.11.2017 1 / 19 Asymmetric Numeral Systems Asymmetric numeral systems (ANS) is a recent entropy

More information

Entropy as a measure of surprise

Entropy as a measure of surprise Entropy as a measure of surprise Lecture 5: Sam Roweis September 26, 25 What does information do? It removes uncertainty. Information Conveyed = Uncertainty Removed = Surprise Yielded. How should we quantify

More information

Information Theory. Week 4 Compressing streams. Iain Murray,

Information Theory. Week 4 Compressing streams. Iain Murray, Information Theory http://www.inf.ed.ac.uk/teaching/courses/it/ Week 4 Compressing streams Iain Murray, 2014 School of Informatics, University of Edinburgh Jensen s inequality For convex functions: E[f(x)]

More information

Multimedia. Multimedia Data Compression (Lossless Compression Algorithms)

Multimedia. Multimedia Data Compression (Lossless Compression Algorithms) Course Code 005636 (Fall 2017) Multimedia Multimedia Data Compression (Lossless Compression Algorithms) Prof. S. M. Riazul Islam, Dept. of Computer Engineering, Sejong University, Korea E-mail: riaz@sejong.ac.kr

More information

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 jzhang@cse.unsw.edu.au

More information

Summary of Last Lectures

Summary of Last Lectures Lossless Coding IV a k p k b k a 0.16 111 b 0.04 0001 c 0.04 0000 d 0.16 110 e 0.23 01 f 0.07 1001 g 0.06 1000 h 0.09 001 i 0.15 101 100 root 1 60 1 0 0 1 40 0 32 28 23 e 17 1 0 1 0 1 0 16 a 16 d 15 i

More information

repetition, part ii Ole-Johan Skrede INF Digital Image Processing

repetition, part ii Ole-Johan Skrede INF Digital Image Processing repetition, part ii Ole-Johan Skrede 24.05.2017 INF2310 - Digital Image Processing Department of Informatics The Faculty of Mathematics and Natural Sciences University of Oslo today s lecture Coding and

More information

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments. Tutorial 1. Acknowledgement and References for lectures 1 to 5

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments. Tutorial 1. Acknowledgement and References for lectures 1 to 5 Lecture : Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP959 Multimedia Systems S 006 jzhang@cse.unsw.edu.au Acknowledgement

More information

EE376A: Homework #2 Solutions Due by 11:59pm Thursday, February 1st, 2018

EE376A: Homework #2 Solutions Due by 11:59pm Thursday, February 1st, 2018 Please submit the solutions on Gradescope. Some definitions that may be useful: EE376A: Homework #2 Solutions Due by 11:59pm Thursday, February 1st, 2018 Definition 1: A sequence of random variables X

More information

Multimedia Information Systems

Multimedia Information Systems Multimedia Information Systems Samson Cheung EE 639, Fall 2004 Lecture 3 & 4: Color, Video, and Fundamentals of Data Compression 1 Color Science Light is an electromagnetic wave. Its color is characterized

More information

Communications Theory and Engineering

Communications Theory and Engineering Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 AEP Asymptotic Equipartition Property AEP In information theory, the analog of

More information

U Logo Use Guidelines

U Logo Use Guidelines COMP2610/6261 - Information Theory Lecture 15: Arithmetic Coding U Logo Use Guidelines Mark Reid and Aditya Menon logo is a contemporary n of our heritage. presents our name, d and our motto: arn the nature

More information

Lecture 16. Error-free variable length schemes (contd.): Shannon-Fano-Elias code, Huffman code

Lecture 16. Error-free variable length schemes (contd.): Shannon-Fano-Elias code, Huffman code Lecture 16 Agenda for the lecture Error-free variable length schemes (contd.): Shannon-Fano-Elias code, Huffman code Variable-length source codes with error 16.1 Error-free coding schemes 16.1.1 The Shannon-Fano-Elias

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 5 Other Coding Techniques Instructional Objectives At the end of this lesson, the students should be able to:. Convert a gray-scale image into bit-plane

More information

EE5585 Data Compression January 29, Lecture 3. x X x X. 2 l(x) 1 (1)

EE5585 Data Compression January 29, Lecture 3. x X x X. 2 l(x) 1 (1) EE5585 Data Compression January 29, 2013 Lecture 3 Instructor: Arya Mazumdar Scribe: Katie Moenkhaus Uniquely Decodable Codes Recall that for a uniquely decodable code with source set X, if l(x) is the

More information

Lecture 3. Mathematical methods in communication I. REMINDER. A. Convex Set. A set R is a convex set iff, x 1,x 2 R, θ, 0 θ 1, θx 1 + θx 2 R, (1)

Lecture 3. Mathematical methods in communication I. REMINDER. A. Convex Set. A set R is a convex set iff, x 1,x 2 R, θ, 0 θ 1, θx 1 + θx 2 R, (1) 3- Mathematical methods in communication Lecture 3 Lecturer: Haim Permuter Scribe: Yuval Carmel, Dima Khaykin, Ziv Goldfeld I. REMINDER A. Convex Set A set R is a convex set iff, x,x 2 R, θ, θ, θx + θx

More information

THE currently prevalent video coding framework (e.g. A Novel Video Coding Framework using Self-adaptive Dictionary

THE currently prevalent video coding framework (e.g. A Novel Video Coding Framework using Self-adaptive Dictionary JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO., AUGUST 20XX 1 A Novel Video Coding Framework using Self-adaptive Dictionary Yuanyi Xue, Student Member, IEEE, and Yao Wang, Fellow, IEEE Abstract In this paper,

More information

Huffman Coding. C.M. Liu Perceptual Lab, College of Computer Science National Chiao-Tung University

Huffman Coding. C.M. Liu Perceptual Lab, College of Computer Science National Chiao-Tung University Huffman Coding C.M. Liu Perceptual Lab, College of Computer Science National Chiao-Tung University http://www.csie.nctu.edu.tw/~cmliu/courses/compression/ Office: EC538 (03)573877 cmliu@cs.nctu.edu.tw

More information

ECE 587 / STA 563: Lecture 5 Lossless Compression

ECE 587 / STA 563: Lecture 5 Lossless Compression ECE 587 / STA 563: Lecture 5 Lossless Compression Information Theory Duke University, Fall 2017 Author: Galen Reeves Last Modified: October 18, 2017 Outline of lecture: 5.1 Introduction to Lossless Source

More information

4. Quantization and Data Compression. ECE 302 Spring 2012 Purdue University, School of ECE Prof. Ilya Pollak

4. Quantization and Data Compression. ECE 302 Spring 2012 Purdue University, School of ECE Prof. Ilya Pollak 4. Quantization and Data Compression ECE 32 Spring 22 Purdue University, School of ECE Prof. What is data compression? Reducing the file size without compromising the quality of the data stored in the

More information

encoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256

encoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256 General Models for Compression / Decompression -they apply to symbols data, text, and to image but not video 1. Simplest model (Lossless ( encoding without prediction) (server) Signal Encode Transmit (client)

More information

Information & Correlation

Information & Correlation Information & Correlation Jilles Vreeken 11 June 2014 (TADA) Questions of the day What is information? How can we measure correlation? and what do talking drums have to do with this? Bits and Pieces What

More information

Capacity of a channel Shannon s second theorem. Information Theory 1/33

Capacity of a channel Shannon s second theorem. Information Theory 1/33 Capacity of a channel Shannon s second theorem Information Theory 1/33 Outline 1. Memoryless channels, examples ; 2. Capacity ; 3. Symmetric channels ; 4. Channel Coding ; 5. Shannon s second theorem,

More information

Multimedia Communications. Mathematical Preliminaries for Lossless Compression

Multimedia Communications. Mathematical Preliminaries for Lossless Compression Multimedia Communications Mathematical Preliminaries for Lossless Compression What we will see in this chapter Definition of information and entropy Modeling a data source Definition of coding and when

More information

CSEP 521 Applied Algorithms Spring Statistical Lossless Data Compression

CSEP 521 Applied Algorithms Spring Statistical Lossless Data Compression CSEP 52 Applied Algorithms Spring 25 Statistical Lossless Data Compression Outline for Tonight Basic Concepts in Data Compression Entropy Prefix codes Huffman Coding Arithmetic Coding Run Length Coding

More information

ECE 587 / STA 563: Lecture 5 Lossless Compression

ECE 587 / STA 563: Lecture 5 Lossless Compression ECE 587 / STA 563: Lecture 5 Lossless Compression Information Theory Duke University, Fall 28 Author: Galen Reeves Last Modified: September 27, 28 Outline of lecture: 5. Introduction to Lossless Source

More information

Objective: Reduction of data redundancy. Coding redundancy Interpixel redundancy Psychovisual redundancy Fall LIST 2

Objective: Reduction of data redundancy. Coding redundancy Interpixel redundancy Psychovisual redundancy Fall LIST 2 Image Compression Objective: Reduction of data redundancy Coding redundancy Interpixel redundancy Psychovisual redundancy 20-Fall LIST 2 Method: Coding Redundancy Variable-Length Coding Interpixel Redundancy

More information

Chapter 2: Source coding

Chapter 2: Source coding Chapter 2: meghdadi@ensil.unilim.fr University of Limoges Chapter 2: Entropy of Markov Source Chapter 2: Entropy of Markov Source Markov model for information sources Given the present, the future is independent

More information

Lecture 5: Asymptotic Equipartition Property

Lecture 5: Asymptotic Equipartition Property Lecture 5: Asymptotic Equipartition Property Law of large number for product of random variables AEP and consequences Dr. Yao Xie, ECE587, Information Theory, Duke University Stock market Initial investment

More information

Bandwidth: Communicate large complex & highly detailed 3D models through lowbandwidth connection (e.g. VRML over the Internet)

Bandwidth: Communicate large complex & highly detailed 3D models through lowbandwidth connection (e.g. VRML over the Internet) Compression Motivation Bandwidth: Communicate large complex & highly detailed 3D models through lowbandwidth connection (e.g. VRML over the Internet) Storage: Store large & complex 3D models (e.g. 3D scanner

More information

Source Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria

Source Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria Source Coding Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Asymptotic Equipartition Property Optimal Codes (Huffman Coding) Universal

More information

Basic Principles of Lossless Coding. Universal Lossless coding. Lempel-Ziv Coding. 2. Exploit dependences between successive symbols.

Basic Principles of Lossless Coding. Universal Lossless coding. Lempel-Ziv Coding. 2. Exploit dependences between successive symbols. Universal Lossless coding Lempel-Ziv Coding Basic principles of lossless compression Historical review Variable-length-to-block coding Lempel-Ziv coding 1 Basic Principles of Lossless Coding 1. Exploit

More information

Lecture 11: Polar codes construction

Lecture 11: Polar codes construction 15-859: Information Theory and Applications in TCS CMU: Spring 2013 Lecturer: Venkatesan Guruswami Lecture 11: Polar codes construction February 26, 2013 Scribe: Dan Stahlke 1 Polar codes: recap of last

More information

Image Compression. Qiaoyong Zhong. November 19, CAS-MPG Partner Institute for Computational Biology (PICB)

Image Compression. Qiaoyong Zhong. November 19, CAS-MPG Partner Institute for Computational Biology (PICB) Image Compression Qiaoyong Zhong CAS-MPG Partner Institute for Computational Biology (PICB) November 19, 2012 1 / 53 Image Compression The art and science of reducing the amount of data required to represent

More information

Compression and Coding

Compression and Coding Compression and Coding Theory and Applications Part 1: Fundamentals Gloria Menegaz 1 Transmitter (Encoder) What is the problem? Receiver (Decoder) Transformation information unit Channel Ordering (significance)

More information

Image Compression - JPEG

Image Compression - JPEG Overview of JPEG CpSc 86: Multimedia Systems and Applications Image Compression - JPEG What is JPEG? "Joint Photographic Expert Group". Voted as international standard in 99. Works with colour and greyscale

More information

Basic Principles of Video Coding

Basic Principles of Video Coding Basic Principles of Video Coding Introduction Categories of Video Coding Schemes Information Theory Overview of Video Coding Techniques Predictive coding Transform coding Quantization Entropy coding Motion

More information

Multimedia Communications. Scalar Quantization

Multimedia Communications. Scalar Quantization Multimedia Communications Scalar Quantization Scalar Quantization In many lossy compression applications we want to represent source outputs using a small number of code words. Process of representing

More information

10-704: Information Processing and Learning Fall Lecture 9: Sept 28

10-704: Information Processing and Learning Fall Lecture 9: Sept 28 10-704: Information Processing and Learning Fall 2016 Lecturer: Siheng Chen Lecture 9: Sept 28 Note: These notes are based on scribed notes from Spring15 offering of this course. LaTeX template courtesy

More information

Multimedia Networking ECE 599

Multimedia Networking ECE 599 Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on lectures from B. Lee, B. Girod, and A. Mukherjee 1 Outline Digital Signal Representation

More information

Multimedia & Computer Visualization. Exercise #5. JPEG compression

Multimedia & Computer Visualization. Exercise #5. JPEG compression dr inż. Jacek Jarnicki, dr inż. Marek Woda Institute of Computer Engineering, Control and Robotics Wroclaw University of Technology {jacek.jarnicki, marek.woda}@pwr.wroc.pl Exercise #5 JPEG compression

More information

BASICS OF COMPRESSION THEORY

BASICS OF COMPRESSION THEORY BASICS OF COMPRESSION THEORY Why Compression? Task: storage and transport of multimedia information. E.g.: non-interlaced HDTV: 0x0x0x = Mb/s!! Solutions: Develop technologies for higher bandwidth Find

More information

EECS 229A Spring 2007 * * (a) By stationarity and the chain rule for entropy, we have

EECS 229A Spring 2007 * * (a) By stationarity and the chain rule for entropy, we have EECS 229A Spring 2007 * * Solutions to Homework 3 1. Problem 4.11 on pg. 93 of the text. Stationary processes (a) By stationarity and the chain rule for entropy, we have H(X 0 ) + H(X n X 0 ) = H(X 0,

More information

Wavelet Scalable Video Codec Part 1: image compression by JPEG2000

Wavelet Scalable Video Codec Part 1: image compression by JPEG2000 1 Wavelet Scalable Video Codec Part 1: image compression by JPEG2000 Aline Roumy aline.roumy@inria.fr May 2011 2 Motivation for Video Compression Digital video studio standard ITU-R Rec. 601 Y luminance

More information

ECE Advanced Communication Theory, Spring 2009 Homework #1 (INCOMPLETE)

ECE Advanced Communication Theory, Spring 2009 Homework #1 (INCOMPLETE) ECE 74 - Advanced Communication Theory, Spring 2009 Homework #1 (INCOMPLETE) 1. A Huffman code finds the optimal codeword to assign to a given block of source symbols. (a) Show that cannot be a Huffman

More information

F O R SOCI AL WORK RESE ARCH

F O R SOCI AL WORK RESE ARCH 7 TH EUROPE AN CONFERENCE F O R SOCI AL WORK RESE ARCH C h a l l e n g e s i n s o c i a l w o r k r e s e a r c h c o n f l i c t s, b a r r i e r s a n d p o s s i b i l i t i e s i n r e l a t i o n

More information

CSCI 2570 Introduction to Nanocomputing

CSCI 2570 Introduction to Nanocomputing CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication

More information

Information Theory and Coding Techniques

Information Theory and Coding Techniques Information Theory and Coding Techniques Lecture 1.2: Introduction and Course Outlines Information Theory 1 Information Theory and Coding Techniques Prof. Ja-Ling Wu Department of Computer Science and

More information

Information Theory. M1 Informatique (parcours recherche et innovation) Aline Roumy. January INRIA Rennes 1/ 73

Information Theory. M1 Informatique (parcours recherche et innovation) Aline Roumy. January INRIA Rennes 1/ 73 1/ 73 Information Theory M1 Informatique (parcours recherche et innovation) Aline Roumy INRIA Rennes January 2018 Outline 2/ 73 1 Non mathematical introduction 2 Mathematical introduction: definitions

More information

Can the sample being transmitted be used to refine its own PDF estimate?

Can the sample being transmitted be used to refine its own PDF estimate? Can the sample being transmitted be used to refine its own PDF estimate? Dinei A. Florêncio and Patrice Simard Microsoft Research One Microsoft Way, Redmond, WA 98052 {dinei, patrice}@microsoft.com Abstract

More information

Entropy Coding. Connectivity coding. Entropy coding. Definitions. Lossles coder. Input: a set of symbols Output: bitstream. Idea

Entropy Coding. Connectivity coding. Entropy coding. Definitions. Lossles coder. Input: a set of symbols Output: bitstream. Idea Connectivity coding Entropy Coding dd 7, dd 6, dd 7, dd 5,... TG output... CRRRLSLECRRE Entropy coder output Connectivity data Edgebreaker output Digital Geometry Processing - Spring 8, Technion Digital

More information

Lecture 11: Continuous-valued signals and differential entropy

Lecture 11: Continuous-valued signals and differential entropy Lecture 11: Continuous-valued signals and differential entropy Biology 429 Carl Bergstrom September 20, 2008 Sources: Parts of today s lecture follow Chapter 8 from Cover and Thomas (2007). Some components

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

State of the art Image Compression Techniques

State of the art Image Compression Techniques Chapter 4 State of the art Image Compression Techniques In this thesis we focus mainly on the adaption of state of the art wavelet based image compression techniques to programmable hardware. Thus, an

More information

Coding of memoryless sources 1/35

Coding of memoryless sources 1/35 Coding of memoryless sources 1/35 Outline 1. Morse coding ; 2. Definitions : encoding, encoding efficiency ; 3. fixed length codes, encoding integers ; 4. prefix condition ; 5. Kraft and Mac Millan theorems

More information

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding SIGNAL COMPRESSION Lecture 7 Variable to Fix Encoding 1. Tunstall codes 2. Petry codes 3. Generalized Tunstall codes for Markov sources (a presentation of the paper by I. Tabus, G. Korodi, J. Rissanen.

More information

EE376A - Information Theory Final, Monday March 14th 2016 Solutions. Please start answering each question on a new page of the answer booklet.

EE376A - Information Theory Final, Monday March 14th 2016 Solutions. Please start answering each question on a new page of the answer booklet. EE376A - Information Theory Final, Monday March 14th 216 Solutions Instructions: You have three hours, 3.3PM - 6.3PM The exam has 4 questions, totaling 12 points. Please start answering each question on

More information

Exercises with solutions (Set B)

Exercises with solutions (Set B) Exercises with solutions (Set B) 3. A fair coin is tossed an infinite number of times. Let Y n be a random variable, with n Z, that describes the outcome of the n-th coin toss. If the outcome of the n-th

More information

Sample solutions to Homework 4, Information-Theoretic Modeling (Fall 2014)

Sample solutions to Homework 4, Information-Theoretic Modeling (Fall 2014) Sample solutions to Homework 4, Information-Theoretic Modeling (Fall 204) Jussi Määttä October 2, 204 Question [First, note that we use the symbol! as an end-of-message symbol. When we see it, we know

More information

Lecture 8: Channel and source-channel coding theorems; BEC & linear codes. 1 Intuitive justification for upper bound on channel capacity

Lecture 8: Channel and source-channel coding theorems; BEC & linear codes. 1 Intuitive justification for upper bound on channel capacity 5-859: Information Theory and Applications in TCS CMU: Spring 23 Lecture 8: Channel and source-channel coding theorems; BEC & linear codes February 7, 23 Lecturer: Venkatesan Guruswami Scribe: Dan Stahlke

More information

Information Theory. David Rosenberg. June 15, New York University. David Rosenberg (New York University) DS-GA 1003 June 15, / 18

Information Theory. David Rosenberg. June 15, New York University. David Rosenberg (New York University) DS-GA 1003 June 15, / 18 Information Theory David Rosenberg New York University June 15, 2015 David Rosenberg (New York University) DS-GA 1003 June 15, 2015 1 / 18 A Measure of Information? Consider a discrete random variable

More information

Data Compression Techniques

Data Compression Techniques Data Compression Techniques Part 2: Text Compression Lecture 5: Context-Based Compression Juha Kärkkäinen 14.11.2017 1 / 19 Text Compression We will now look at techniques for text compression. These techniques

More information

Data Compression. Limit of Information Compression. October, Examples of codes 1

Data Compression. Limit of Information Compression. October, Examples of codes 1 Data Compression Limit of Information Compression Radu Trîmbiţaş October, 202 Outline Contents Eamples of codes 2 Kraft Inequality 4 2. Kraft Inequality............................ 4 2.2 Kraft inequality

More information

Introduction to information theory and coding

Introduction to information theory and coding Introduction to information theory and coding Louis WEHENKEL Set of slides No 5 State of the art in data compression Stochastic processes and models for information sources First Shannon theorem : data

More information