Chapter 7 Lossless Compression Algorithms

Similar documents
Welcome Back to Fundamentals of Multimedia (MR412) Fall, 2012 Lecture 10 (Chapter 7) ZHU Yongxin, Winson

Intro. To Multimedia Engineering Lossless Compression

EE67I Multimedia Communication Systems Lecture 4

Fundamentals of Multimedia. Lecture 5 Lossless Data Compression Variable Length Coding

Lossless Compression Algorithms

Ch. 2: Compression Basics Multimedia Systems

Data Compression. An overview of Compression. Multimedia Systems and Applications. Binary Image Compression. Binary Image Compression

7.5 Dictionary-based Coding

Ch. 2: Compression Basics Multimedia Systems

Entropy Coding. - to shorten the average code length by assigning shorter codes to more probable symbols => Morse-, Huffman-, Arithmetic Code

Multimedia Systems. Part 20. Mahdi Vasighi

Multimedia Networking ECE 599

A Comparative Study of Entropy Encoding Techniques for Lossless Text Data Compression

David Rappaport School of Computing Queen s University CANADA. Copyright, 1996 Dale Carnegie & Associates, Inc.

Dictionary techniques

Engineering Mathematics II Lecture 16 Compression

IMAGE PROCESSING (RRY025) LECTURE 13 IMAGE COMPRESSION - I

ITCT Lecture 8.2: Dictionary Codes and Lempel-Ziv Coding

Chapter 5 VARIABLE-LENGTH CODING Information Theory Results (II)

Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay

Digital Image Processing

Data Compression Fundamentals

Greedy Algorithms CHAPTER 16

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression

EE-575 INFORMATION THEORY - SEM 092

Chapter 1. Digital Data Representation and Communication. Part 2

Data Compression Techniques

6. Finding Efficient Compressions; Huffman and Hu-Tucker

CS 335 Graphics and Multimedia. Image Compression

A Research Paper on Lossless Data Compression Techniques

Compression I: Basic Compression Algorithms

Source Coding Basics and Speech Coding. Yao Wang Polytechnic University, Brooklyn, NY11201

IMAGE COMPRESSION- I. Week VIII Feb /25/2003 Image Compression-I 1

CSE 421 Greedy: Huffman Codes

Compression. storage medium/ communications network. For the purpose of this lecture, we observe the following constraints:

MCS-375: Algorithms: Analysis and Design Handout #G2 San Skulrattanakulchai Gustavus Adolphus College Oct 21, Huffman Codes

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Image Coding and Data Compression

Compressing Data. Konstantin Tretyakov

Topic 5 Image Compression

Digital Image Processing

Repetition 1st lecture

Data Compression. Media Signal Processing, Presentation 2. Presented By: Jahanzeb Farooq Michael Osadebey

Lossless compression II

Data Compression 신찬수

VIDEO SIGNALS. Lossless coding

Distributed source coding

Image compression. Stefano Ferrari. Università degli Studi di Milano Methods for Image Processing. academic year

Lecture 6 Review of Lossless Coding (II)

CS/COE 1501

Huffman Coding. Version of October 13, Version of October 13, 2014 Huffman Coding 1 / 27

Data Compression. Guest lecture, SGDS Fall 2011

Encoding. A thesis submitted to the Graduate School of University of Cincinnati in

Image coding and compression

Greedy Algorithms. Alexandra Stefan

An On-line Variable Length Binary. Institute for Systems Research and. Institute for Advanced Computer Studies. University of Maryland

16.Greedy algorithms

Efficient Sequential Algorithms, Comp309. Motivation. Longest Common Subsequence. Part 3. String Algorithms

6. Finding Efficient Compressions; Huffman and Hu-Tucker Algorithms

SIGNAL COMPRESSION Lecture Lempel-Ziv Coding

Figure-2.1. Information system with encoder/decoders.

Department of electronics and telecommunication, J.D.I.E.T.Yavatmal, India 2

Wireless Communication

Information Theory and Communication

CS/COE 1501

Simple variant of coding with a variable number of symbols and fixlength codewords.

Image Compression - An Overview Jagroop Singh 1

An Advanced Text Encryption & Compression System Based on ASCII Values & Arithmetic Encoding to Improve Data Security

IMAGE COMPRESSION TECHNIQUES

So, what is data compression, and why do we need it?

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

Text Compression. Jayadev Misra The University of Texas at Austin July 1, A Very Incomplete Introduction To Information Theory 2

Text Compression through Huffman Coding. Terminology

Analysis of Parallelization Effects on Textual Data Compression

DEFLATE COMPRESSION ALGORITHM

A Comprehensive Review of Data Compression Techniques

CIS 121 Data Structures and Algorithms with Java Spring 2018

1.Define image compression. Explain about the redundancies in a digital image.

Image Compression for Mobile Devices using Prediction and Direct Coding Approach

EE 368. Weeks 5 (Notes)

A Novel Image Compression Technique using Simple Arithmetic Addition

Arithmetic Coding. Arithmetic Coding

CoE4TN4 Image Processing. Chapter 8 Image Compression

JPEG: An Image Compression System. Nimrod Peleg update: Nov. 2003

Data Compression Algorithms

Lecture 15. Error-free variable length schemes: Shannon-Fano code

A Comparative Study of Lossless Compression Algorithm on Text Data

CMPT 365 Multimedia Systems. Media Compression - Image

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Basic Compression Library

Optimization of Bit Rate in Medical Image Compression

ENSC Multimedia Communications Engineering Topic 4: Huffman Coding 2

Data Compression Techniques

Horn Formulae. CS124 Course Notes 8 Spring 2018

compression and coding ii

CS473-Algorithms I. Lecture 11. Greedy Algorithms. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS106B Handout 34 Autumn 2012 November 12 th, 2012 Data Compression and Huffman Encoding

ECE 499/599 Data Compression & Information Theory. Thinh Nguyen Oregon State University

CS 493: Algorithms for Massive Data Sets Dictionary-based compression February 14, 2002 Scribe: Tony Wirth LZ77

An undirected graph is a tree if and only of there is a unique simple path between any 2 of its vertices.

Transcription:

Chapter 7 Lossless Compression Algorithms 7.1 Introduction 7.2 Basics of Information Theory 7.3 Run-Length Coding 7.4 Variable-Length Coding (VLC) 7.5 Dictionary-based Coding 7.6 Arithmetic Coding 7.7 Lossless Image Compression Li, Drew, Liu 1

7.1 Introduction Compression: the process of coding that will effectively reduce the total number of bits needed to represent certain information. Fig. 7.1: A General Data Compression Scheme. Li, Drew, Liu 2

Introduction (Cont d) If the compression and decompression processes induce no information loss, then the compression scheme is lossless; otherwise, it is lossy. Compression ratio: compression ratio = B B 0 1 (7.1) B 0 number of bits before compression B 1 number of bits after compression Li, Drew, Liu 3

7.2 Basics of Information Theory The entropyηof an information source with alphabet S= {s 1, s 2,..., s n } is: η H ( S) p log i= 1 p i probability that symbol s i will occur in S. n = = n = i= 1 i p i 2 log 2 1 p i p i (7.2) (7.3) log 1 2 pi indicates the amount of information (self-information as defined by Shannon) contained in s i, which corresponds to the number of bits needed to encode s i. Li, Drew, Liu 4

Distribution of Gray-Level Intensities Fig. 7.2: Histograms for Two Gray-level Images. Fig. 7.2(a) shows the histogram of an image with uniformdistribution of gray-level intensities, i.e., i p i = 1/256. Hence, the entropy of this image is: log 2 256 = 8 (7.4) Fig. 7.2(b) shows the histogram of an image with two possible values. Its entropy is 0.92. Li, Drew, Liu 5

Entropy and Code Length As can be seen in Eq. (7.3): the entropy ηis a weighted-sum of terms log 1 2 pi ; hence it represents the averageamount of information contained per symbol in the source S. The entropy ηspecifies the lower bound for the average number of bits to code each symbol in S, i.e., η l (7.5) l -the average length (measured in bits) of the code words produced by the encoder. Li, Drew, Liu 6

7.3 Run-Length Coding MemorylessSource: an information source that is independently distributed. Namely, the value of the current symbol does not depend on the values of the previously appeared symbols. Instead of assuming memorylesssource, Run-Length Coding (RLC) exploits memory present in the information source. Rationale for RLC: if the information source has the property that symbols tend to form continuous groups, then such symbol and the length of the group can be coded. Li, Drew, Liu 7

7.4 Variable-Length Coding (VLC) 7.4.1 Shannon-FanoAlgorithm a top-down approach 1. Sort the symbols according to the frequency count of their occurrences. 2. Recursively divide the symbols into two parts, each with approximately the same number of counts, until all parts contain only one symbol. An Example: coding of HELLO Symbol H E L O Count 1 1 2 1 Frequency count of the symbols in HELLO. Li, Drew, Liu 8

Fig. 7.3: Coding Tree for HELLO by Shannon-Fano. Li, Drew, Liu 9

Table 7.1: Result of Performing Shannon-Fano on HELLO Symbol Count Log 2 Code # of bits used L 2 1.32 0 2 H 1 2.32 10 2 E 1 2.32 110 3 O 1 2.32 111 3 TOTAL # of bits: 10 Li, Drew, Liu 10

Fig. 7.4: Another coding tree for HELLO by Shannon-Fano. Li, Drew, Liu 11

Table 7.2: Another Result of Performing Shannon-Fano on HELLO (see Fig. 7.4) Symbol Count Log 2 Code # of bits used L 2 1.32 00 4 H 1 2.32 01 2 E 1 2.32 10 2 O 1 2.32 11 2 TOTAL # of bits: 10 Li, Drew, Liu 12

7.4.2 Huffman Coding ALGORITHM 7.1 Huffman Coding Algorithm a bottom-up approach 1. Initialization: Put all symbols on a list sorted according to their frequency counts. 2. Repeat until the list has only one symbol left: From the list pick two symbols with the lowest frequency counts. Form a Huffman subtree that has these two symbols as child nodes and create a parent node. Assign the sum of the children s frequency counts to the parent and insert it into the list such that the order is maintained. Delete the children from the list. 3. Assign a codeword for each leaf based on the path from the root. Li, Drew, Liu 13

Fig. 7.5: Coding Tree for HELLO using the Huffman Algorithm. Li, Drew, Liu 14

Huffman Coding (Cont d) In Fig. 7.5, new symbols P1, P2, P3 are created to refer to the parent nodes in the Huffman coding tree. The contents in the list are illustrated below: After initialization: L H E O After iteration (a): L P1 H After iteration (b): L P2 After iteration (c): P3 Li, Drew, Liu 15

Properties of Huffman Coding 1. Unique Prefix Property: No Huffman code is a prefix of any other Huffman code - precludes any ambiguity in decoding. 2. Optimality: minimum redundancy code -proved optimal for a given data model (i.e., a given, accurate, probability distribution): The two least frequent symbols will have the same length for their Huffman codes, differing only at the last bit. Symbols that occur more frequently will have shorter Huffman codes than symbols that occur less frequently. The average code length for an information source Sis strictly less than η+ 1. Combined with Eq. (7.5), we have: l < η + 1 (7.6) Li, Drew, Liu 16

Extended Huffman Coding Motivation: All codewordsin Huffman coding have integer bit lengths. It is wasteful when p i is very 1 large and hence is close to 0. log 2 pi Why not group several symbols together and assign a single codeword to the group as a whole? Extended Alphabet: For alphabet S= {s 1, s 2,..., s n }, if k symbols are grouped together, then the extended alphabet is: k symbols 67 4 84 S (k ) ={s 1 s 1 s 1,s 1 s 1 s 2,,s 1 s 1 s n,s 1 s 1 s 2 s 1,,s n s n s n }. the size of the new alphabet S (k) is n k. Li, Drew, Liu 17

Extended Huffman Coding (Cont d) It can be proven that the average # of bits for each symbol is: η l < η + 1 k An improvement over the original Huffman coding, but not much. (7.7) Problem: If kis relatively large (e.g., k 3), then for most practical applications where n 1, n k implies a huge symbol table impractical. Li, Drew, Liu 18

7.4.3 Adaptive Huffman Coding Adaptive Huffman Coding: statistics are gathered and updated dynamically as the data stream arrives. ENCODER ------- Initial_code(); DECODER ------- Initial_code(); while not EOF { get(c); encode(c); update_tree(c); } while not EOF { decode(c); output(c); update_tree(c); } Li, Drew, Liu 19

Adaptive Huffman Coding (Cont d) Initial_codeassigns symbols with some initially agreed upon codes, without any prior knowledge of the frequency counts. update_tree constructs an Adaptive Huffman tree. It basically does two things: a) increments the frequency counts for the symbols (including any new ones). b) updates the configuration of the tree. The encoderand decodermust use exactly the same initial_codeand update_tree routines. Li, Drew, Liu 20

Notes on Adaptive Huffman Tree Updating Nodes are numbered in order from left to right, bottom to top. The numbers in parentheses indicates the count. The tree must always maintain its siblingproperty, i.e., all nodes (internal and leaf) are arranged in the order of increasing counts. If the sibling property is about to be violated, a swapprocedure is invoked to update the tree by rearranging the nodes. When a swap is necessary, the farthest node with count Nis swapped with the node whose count has just been increased to N +1. Li, Drew, Liu 21

Fig. 7.6: Node Swapping for Updating an Adaptive Huffman Tree Li, Drew, Liu 22

Another Example: Adaptive Huffman Coding This is to clearly illustrate more implementation details. We show exactly what bitsare sent, as opposed to simply stating how the tree is updated. An additional rule: if any character/symbol is to be sent the first time, it must be preceded by a special symbol, NEW. The initial code for NEW is 0. The count for NEW is always kept as 0 (the count is never increased); hence it is always denoted as NEW:(0) in Fig. 7.7. Li, Drew, Liu 23

Table 7.3: Initial code assignment for AADCCDD using adaptive Huffman coding. Initial Code --------------------- NEW: 0 A: 00001 B: 00010 C: 00011 D: 00100...... Li, Drew, Liu 24

Fig. 7.7: Adaptive Huffman tree for AADCCDD. Li, Drew, Liu 25

Fig. 7.7 (Cont d): Adaptive Huffman tree for AADCCDD. Li, Drew, Liu 26

Table 7.4: Sequence of symbols and codes sent to the decoder Symbol NEW A A NEW D NEW C C D D Code 0 00001 1 0 00100 00 00011 001 101 101 It is important to emphasize that the code for a particular symbol changes during the adaptive Huffman coding process. For example, after AADCCDD, when the character D overtakes A as the most frequent symbol, its code changes from 101 to 0. The Squeeze Page on this book s web site provides a Java applet for adaptive Huffman coding. Li, Drew, Liu 27

7.5 Dictionary-based Coding LZW (Lempel, Ziv, Welch) uses fixed-length codewordsto represent variable-length strings of symbols/characters that commonly occur together, e.g., words in English text. The LZW encoder and decoder build up the same dictionary dynamically while receiving the data. LZW places longer and longer repeated entries into a dictionary, and then emits the codefor an element, rather than the string itself, if the element has already been placed in the dictionary. Li, Drew, Liu 28

ALGORITHM 7.2 - LZW Compression BEGIN s = next input character; while not EOF { c = next input character; if s + c exists in the dictionary s = s + c; else { output the code for s; // this is when we output (encode) for s+c, which //was a matching found in the dictionary in the //(above) if in the previous iteration add string s + c to the dictionary with a new code; s = c; } } output the code for s; END Li, Drew, Liu 29

Example 7.2 LZW compression for string ABABBABCABABBA Let s start with a very simple dictionary (also referred to as a string table ), initially containing only 3 characters, with codes as follows: Code String 1 A 2 B 3 C Now if the input string is ABABBABCABABBA, the LZW compression algorithm works as follows: Li, Drew, Liu 30

S C Output Code String 1 2 3 A B C A B A AB B BA B C A AB A AB ABB A B A B B A B C A B A B B A EOF 1 2 4 5 2 3 4 6 1 4 5 6 7 8 9 10 11 AB BA ABB BAB BC CA ABA ABBA The output codes are: 1 2 4 5 2 3 4 6 1. Instead of sending 14 characters, only 9 codes need to be sent (compression ratio = 14/9 = 1.56). Li, Drew, Liu 31

ALGORITHM 7.3 LZW Decompression (simple version) BEGIN s = NIL; while not EOF { k = next input code; entry = dictionary entry for k; //this is when we decode with dictionary entry //for string s + entry[0] which was added in the //previous iteration output entry; if (s!= NIL) add string s + entry[0] to dictionary with a new code; // entry[0] means the first character of Entry s = entry; } END Example 7.3: LZW decompression for string ABABBABCABABBA. Input codes to the decoder are 1 2 4 5 2 3 4 6 1. The initial string table is identical to what is used by the encoder. Li, Drew, Liu 32

The LZW decompression algorithm then works as follows: NIL A B AB BA B C AB ABB A S K Entry/output Code String 1 2 4 5 2 3 4 6 1 EOF A B AB BA B C AB ABB A 1 2 3 4 5 6 7 8 9 10 11 A B C AB BA ABB BAB BC CA ABA ABBA Apparently, the output string is ABABBABCABABBA, a truly lossless result! Li, Drew, Liu 33

ALGORITHM 7.4 LZW Decompression (modified) BEGIN s = NIL; while not EOF { k = next input code; entry = dictionary entry for k; /* exception handler */ if (entry == NULL) entry = s + s[0]; output entry; if (s!= NIL) add string s+entry[0] to dictionary with a new code; s = entry; } END Li, Drew, Liu 34

LZW Coding (Cont d) In real applications, the code length lis kept in the range of [l 0, l max ]. The dictionary initially has a size of 2 l0. When it is filled up, the code length will be increased by 1; this is allowed to repeat until l= l max. When l max is reached and the dictionary is filled up, it needs to be flushed (as in Unix compress, or to have the LRU (least recently used) entries removed. Li, Drew, Liu 35

7.6 Arithmetic Coding Arithmetic coding is a more modern coding method that usually out-performs Huffman coding. Huffman coding assigns each symbol a codeword which has an integral bit length. Arithmetic coding can treat the whole message as one unit. A message is represented by a half-open interval [a, b) where aand bare real numbers between 0 and 1. Initially, the interval is [0, 1). When the message becomes longer, the length of the interval shortens and the number of bits needed to represent the interval increases. Li, Drew, Liu 36

ALGORITHM 7.5 Arithmetic Coding Encoder BEGIN low = 0.0; high = 1.0; range = 1.0; while (symbol!= terminator) { get (symbol); low = low + range * Range_low(symbol); high = low + range * Range_high(symbol); range = high - low; } output a code so that low <= code < high; END Li, Drew, Liu 37

Example: Encoding in Arithmetic Coding Symbol Probability Range A 0.2 [0, 0.2) B 0.1 [0.2, 0.3) C 0.2 [0.3, 0.5) D 0.05 [0.5, 0.55) E 0.3 [0.55, 0.85) F 0.05 [0.85, 0.9) G 0.1 [0.9, 1.0) (a) Probability distribution of symbols. Fig. 7.8: Arithmetic Coding: Encode Symbols CAEE$ Li, Drew, Liu 38

Fig. 7.8(b): Graphical display of shrinking ranges. Li, Drew, Liu 39

Example: Encoding in Arithmetic Coding Symbol Low High Range 0 1.0 1.0 C 0.3 0.5 0.2 A 0.30 0.34 0.04 E 0.322 0.334 0.012 E 0.3286 0.3322 0.0036 $ 0.33184 0.33220 0.00036 (c) New low, high, and range generated. Fig. 7.8 (Cont d): Arithmetic Coding: Encode Symbols CAEE$ Li, Drew, Liu 40

PROCEDURE 7.2 Generating Codeword for Encoder BEGIN code = 0; k = 1; while (value(code) < low) { assign 1 to the kth binary fraction bit if (value(code) > high) replace the kth bit by 0 k = k + 1; } END The final step in Arithmetic encoding calls for the generation of a number that falls within the range [low, high). The above algorithm will ensure that the shortest binary codeword is found. Li, Drew, Liu 41

ALGORITHM 7.6 Arithmetic Coding Decoder BEGIN get binary code and convert to decimal value = value(code); DO { find a symbol s so that Range_low(s) <= value < Range_high(s); output s; low = Rang_low(s); high = Range_high(s); range = high - low; value = [value - low] / range; } UNTIL symbol s is a terminator END Li, Drew, Liu 42

Table 7.5: Arithmetic coding: decode symbols CAEE$ Value Output Symbol Range_low Range_high range 0.33203125 C 0.3 0.5 0.2 0.16015625 A 0.0 0.2 0.2 0.80078125 E 0.55 0.85 0.3 0.8359375 E 0.55 0.85 0.3 0.953125 $ 0.9 1.0 0.1 Li, Drew, Liu 43

7.6.2 Scaling and Incremental Coding The basic algorithm described in the last section has the followinglimitations that make its practical implementation infeasible. When it is used to code long sequences of symbols, the tag intervals shrink to a very small range. Representing these small intervals requires very high-precision numbers. The encoder will not produce any output codeworduntil the entire sequence is entered. Likewise, the decoder needs to have the codewordfor the entire sequence of the input symbols before decoding. Li, Drew, Liu 44

Some key observations: 1. Although the binary representations for the low, high, and any number within the small interval usually require many bits, they always have the same MSBs (Most Significant Bits). For example, 0.1000110 for 0.5469 (low), 0.1000111 for 0.5547 (high). 2. Subsequent intervals will always stay within the current interval. Hence, we can output the common MSBs and remove them from subsequent considerations. Li, Drew, Liu 45

Fig. 7.10: Scaling in arithmetic coding. (a) E1 Scaling, (b) E2 Scaling, (c) E3 Scaling. Li, Drew, Liu 46

Procedure 7.3: (E1 and E2 Scalings in Arithmetic Coding). BEGIN while (high <= 0.5) OR (low >= 0.5) { if (high <= 0.5) // E1 scaling { output 0 ; low = 2 * low; high = 2 * high; } else // E2 scaling { output 1 ; low = 2 * (low - 0.5); high = 2 * (high - 0.5); } } END Li, Drew, Liu 47

Example 7.4: (Arithmetic Coding with Scaling and Incremental Coding). Assume we only have three symbols A, B, C, and their probabilities are: A: 0.7, B: 0.2, C: 0.1. Suppose the input sequence for this example is ACB, and both the encoder and decoder know that the length of the sequence is 3. Li, Drew, Liu 48

Fig. 7.11: Example: arithmetic coding with scaling and incremental coding encoder Li, Drew, Liu 49

Fig. 7.12: Example: arithmetic coding with scaling and incremental coding decoder Li, Drew, Liu 50

E3 Scaling N E3 scaling steps followed by an E1 is equivalent to an E1 followed by N E2 steps. N E3 scaling steps followed by an E2 is equivalent to an E2 followed by N E1 steps. Therefore, a good way to handle the signaling of the E3 scaling is: postpone until there is an E1 or E2. If there is an E1 after N E3 operations, send 0 followed by N 1 s after the E1; if there is an E2 after N E3 operations, send 1 followed by N 0 s after the E2. Li, Drew, Liu 51

7.6.3 Integer Implementation Uses only integer arithmetic. It is quite common in modern multimedia applications. Basically, the unit interval is replaced by a range [0, N), where N is an integer, e.g. 255. Because the integer range could be so small, e.g., [0, 255), applying the scaling techniques similar to what was discussed above, now in integer arithmetic, is a necessity. The main motivation is to avoid any floating number operations. Li, Drew, Liu 52

7.6.4 Binary Arithmetic Coding Only use binary symbols, 0 and 1. The calculation of new intervals and the decision of which interval to take (first or second) are simpler. Fast Binary Arithmetic Coding (Q-coder, MQ-coder) was developed in multimedia standards such as JBIG, JBIG2, and JPEG-2000. The more advanced version, Context-Adaptive Binary Arithmetic Coding (CABAC) is used in H.264 (M-coder) and H.265. Li, Drew, Liu 53

Fig. 7.13: Binary arithmetic coding Li, Drew, Liu 54

Procedure 7.4 (Procedures for Adaptive Arithmetic Coding). ENCODER DECODER ------- ------- Initialization (reset counters) Initialization (reset counters) while (symbol!= terminator) { { while (symbol!= terminator) get(symbol); decode(symbol); encode(symbol); output(symbol); update stats and interval; update stats and interval; } } Li, Drew, Liu 55

Example 7.5: (Adaptive Binary Arithmetic Coding). Assume the input symbols to the encoder is 10001. Assume that both the encoder and decoder know the length of the sequence. ** For clarity and simplicity, the scaling procedure (for E1, E2, etc.) will not be used. Li, Drew, Liu 56

Fig. 7.14: Adaptive binary arithmetic coding encoder [input symbols:10001] Li, Drew, Liu 57

Fig. 7.15: Adaptive binary arithmetic coding decoder. [input: 0.546875 (binary 0.100011)] Li, Drew, Liu 58

7.7 Lossless Image Compression Approaches of Differential Coding of Images: Given an original image I(x, y), using a simple difference operator we can define a difference image d(x, y) as follows: d(x, y) = I(x, y) - I(x - 1, y) (7.9) or use the discrete version of the 2-D Laplacianoperator to define a difference image d(x, y) as d(x, y) = 4 I(x, y) - I(x, y - 1) - I(x, y + 1) - I(x + 1, y) - I(x - 1, y) (7.10) Due to spatial redundancy existed in normal images I, the difference image dwill have a narrower histogram and hence a smaller entropy, as shown in Fig. 7.9. Li, Drew, Liu 59

Fig. 7.16: Distributions for Original versus Derivative Images. (a,b): Original gray-level image and its partial derivative image; (c,d): Histograms for original and derivative images. (This figure uses a commonly employed image called Barb.) Li, Drew, Liu 60

7.7.2 Lossless JPEG Lossless JPEG: A special case of the JPEG image compression. The Predictive method 1. Forming a differential prediction: A predictor combines the values of up to three neighboring pixels as the predicted value for the current pixel, indicated by X in Fig. 7.10. The predictor can use any one of the seven schemes listed in Table 7.6. 2. Encoding: The encoder compares the prediction with the actual pixel value at the position X and encodes the difference using one of the lossless compression techniques we have discussed, e.g., the Huffman coding scheme. Li, Drew, Liu 61

Fig. 7.17: Neighboring Pixels for Predictors in Lossless JPEG. Note: Any of A, B, or C has already been decoded before it is used in the predictor, on the decoder side of an encode-decode cycle. Li, Drew, Liu 62

Table 7.6: Predictors for Lossless JPEG Predictor P1 P2 P3 P4 Prediction A B C A + B C P5 A + (B C) / 2 P6 B + (A C) / 2 P7 (A + B) / 2 Li, Drew, Liu 63

Table 7.7: Comparison with other lossless compression programs Compression Program Compression Ratio Lena Football F-18 Flowers Lossless JPEG 1.45 1.54 2.29 1.26 Optimal Lossless JPEG 1.49 1.67 2.71 1.33 Compress (LZW) 0.86 1.24 2.21 0.87 Gzip (LZ77) 1.08 1.36 3.10 1.05 Gzip -9 (optimal LZ77) 1.08 1.36 3.13 1.05 Pack(Huffman coding) 1.02 1.12 1.19 1.00 Li, Drew, Liu 64