SlideShare ist ein Scribd-Unternehmen logo
1 von 34
NationalInstituteofScienceandTechnology
[1]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
A Review of Data Compression Techniques
Presented
by
Sudeepta Mishra
Roll# CS200117052
At
NIST,Berhampur
Under the guidance of
Mr. Rowdra Ghatak
NationalInstituteofScienceandTechnology
[2]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Introduction
• Data compression is the process of encoding data so
that it takes less storage space or less transmission time
than it would if it were not compressed.
• Compression is possible because most real-world data
is very redundant
NationalInstituteofScienceandTechnology
[3]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Different Compression Techniques
• Mainly two types of data Compression techniques are
there.
– Loss less Compression.
Useful in spreadsheets, text, executable program
Compression.
– Lossy less Compression.
Compression of images, movies and sounds.
NationalInstituteofScienceandTechnology
[4]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Types of Loss less data Compression
• Dictionary coders.
– Zip (file format).
– Lempel Ziv.
• Entropy encoding.
– Huffman coding (simple entropy coding).
• Run-length encoding.
NationalInstituteofScienceandTechnology
[5]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Dictionary-Based Compression
• Dictionary-based algorithms do not encode
single symbols as variable-length bit strings;
they encode variable-length strings of symbols
as single tokens.
• The tokens form an index into a phrase
dictionary.
• If the tokens are smaller than the phrases
they replace, compression occurs.
NationalInstituteofScienceandTechnology
[6]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Types of Dictionary
• Static Dictionary.
• Semi-Adaptive Dictionary.
• Adaptive Dictionary.
– Lempel Ziv algorithms belong to this category of
dictionary coders. The dictionary is being built in a
single pass, while at the same time encoding the data.
– The decoder can build up the dictionary in the same
way as the encoder while decompressing the data.
NationalInstituteofScienceandTechnology
[7]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
• Using a English Dictionary the string:
“A good example of how dictionary based compression works”
• Gives : 1/1 822/3 674/4 1343/60 928/75 550/32 173/46 421/2
• Using the dictionary as lookup table, each word is coded as
x/y, where, x gives the page no. and y gives the number of
the word on that page. If the dictionary has 2,200 pages
with less than 256 entries per page: Therefore x requires 12
bits and y requires 8 bits, i.e., 20 bits per word (2.5 bytes per
word). Using ASCII coding the above string requires 48
bytes, whereas our encoding requires only 20 (<-2.5 * 8)
bytes: 50% compression.
Dictionary-Based Compression: Example
NationalInstituteofScienceandTechnology
[8]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Lempel Ziv
• It is a family of algorithms, stemming from the two
algorithms proposed by Jacob Ziv and Abraham Lempel in
their landmark papers in 1977 and 1978.
LZ77 LZ78
LZR
LZHLZSS LZB
LZFG
LZC LZT LZMW
LZW
LZJ
NationalInstituteofScienceandTechnology
[9]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
LZW Algorithm
• It is An improved version of LZ78 algorithm.
• Published by Terry Welch in 1984.
• A dictionary that is indexed by “codes” is used.
The dictionary is assumed to be initialized with
256 entries (indexed with ASCII codes 0 through
255) representing the ASCII table.
NationalInstituteofScienceandTechnology
[10]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression)
W = NIL;
while (there is input){
K = next symbol from input;
if (WK exists in the dictionary) {
W = WK;
} else {
output (index(W));
add WK to the dictionary;
W = K;
}
}
NationalInstituteofScienceandTechnology
[11]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Flow Chart
START
W= NULL
IS EOF
?
K=NEXT INPUT
IS WK
FOUND?
W=WK
OUTPUT INDEX OF W
ADD WK TO DICTIONARY
STOP
W=K
YES
NO
YES
NO
NationalInstituteofScienceandTechnology
[12]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• Input string is
• The Initial
Dictionary
contains symbols
like
a, b, c, d with their
index values as 1, 2,
3, 4 respectively.
• Now the input string
is read from left to
right. Starting from
a.
a b d c a d a c
a 1
b 2
c 3
d 4
NationalInstituteofScienceandTechnology
[13]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• W = Null
• K = a
• WK = a
In the dictionary.
a b d c a d a c
a 1
b 2
c 3
d 4
K
NationalInstituteofScienceandTechnology
[14]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• K = b.
• WK = ab
is not in the dictionary.
• Add WK to
dictionary
• Output code for a.
• Set W = b
a b d c a d a c
K
1
ab 5a 1
b 2
c 3
d 4
NationalInstituteofScienceandTechnology
[15]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• K = d
• WK = bd
Not in the dictionary.
Add bd to dictionary.
• Output code b
• Set W = d
a b d c a d a c
1
K
2
ab 5a 1
b 2
c 3
d 4
bd 6
NationalInstituteofScienceandTechnology
[16]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• K = a
• WK = da
not in the dictionary.
• Add it to dictionary.
• Output code d
• Set W = a
a b d a b d a c
1
K
2 4
ab 5a 1
b 2
c 3
d 4
bd 6
da 7
NationalInstituteofScienceandTechnology
[17]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• K = b
• WK = ab
It is in the dictionary.
a b d a b d a c
1
K
2 4
ab 5a 1
b 2
c 3
d 4
bd 6
da 7
NationalInstituteofScienceandTechnology
[18]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• K = d
• WK = abd
Not in the dictionary.
• Add W to the
dictionary.
• Output code for W.
• Set W = d
a b d a b d a c
1
K
2 4 5
ab 5a 1
b 2
c 3
d 4
bd 6
da 7
abd 8
NationalInstituteofScienceandTechnology
[19]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• K = a
• WK = da
In the dictionary.
a b d a b d a c
1
K
2 4 5
ab 5a 1
b 2
c 3
d 4
bd 6
da 7
abd 8
NationalInstituteofScienceandTechnology
[20]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• K = c
• WK = dac
Not in the dictionary.
• Add WK to the
dictionary.
• Output code for W.
• Set W = c
• No input left so
output code for W.
a b d a b d a c
1
K
2 4 5
ab 5a 1
b 2
c 3
d 4
bd 6
da 7
abd 8
7
dac 9
NationalInstituteofScienceandTechnology
[21]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Compression) Example
• The final output
string is
1 2 4 5 7 3
• Stop.
cadbadba
1
K
2 4 5
5ab
4d
3c
2b
1a
6bd
7da
8abd
7
9dac
3
NationalInstituteofScienceandTechnology
[22]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
LZW Decompression Algorithm
read a character k;
output k;
w = k;
while ( read a character k )
/* k could be a character or a code. */
{ entry = dictionary entry for k;
output entry;
add w + entry[0] to dictionary;
w = entry; }
NationalInstituteofScienceandTechnology
[23]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
LZW Decompression Algorithm Flow Chart
START
Output K
IS EOF
?
K=NEXT INPUT
ENTRY=DICTIONARY INDEX (K)
ADD W+ENTRY[0] TO DICTIONARY
STOP
W=ENTRY
K=INPUT
W=K
YES
NO
Output ENTRY
NationalInstituteofScienceandTechnology
[24]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Decompression) Example
• K = 1
• Out put K (i.e. a)
• W = K
1
K
2 4 5
4d
3c
2b
1a
7 3
a
NationalInstituteofScienceandTechnology
[25]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Decompression) Example
• K = 2
• entry = b
• Output entry
• Add W + entry[0] to
dictionary
• W = entry[0] (i.e. b)
1
K
2 4 5
4d
3c
2b
1a
7 3
a b
5ab
NationalInstituteofScienceandTechnology
[26]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Decompression) Example
• K = 4
• entry = d
• Output entry
• Add W + entry[0] to
dictionary
• W = entry[0] (i.e. d)
1
K
2 4 5
4d
3c
2b
1a
7 3
a b
5ab
6bd
d
NationalInstituteofScienceandTechnology
[27]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Decompression) Example
• K = 5
• entry = ab
• Output entry
• Add W + entry[0] to
dictionary
• W = entry[0] (i.e. a)
1
K
2 4 5
4d
3c
2b
1a
7 3
a b
5ab
6bd
d a b
7da
NationalInstituteofScienceandTechnology
[28]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Decompression) Example
• K = 7
• entry = da
• Output entry
• Add W + entry[0] to
dictionary
• W = entry[0] (i.e. d)
1
K
2 4 5
4d
3c
2b
1a
7 3
a b
5ab
6bd
d a b
7da
d a
8abd
NationalInstituteofScienceandTechnology
[29]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
The LZW Algorithm (Decompression) Example
• K = 3
• entry = c
• Output entry
• Add W + entry[0] to
dictionary
• W = entry[0] (i.e. c)
1
K
2 4 5
4d
3c
2b
1a
7 3
a b
5ab
6bd
d a b
7da
d a
8abd
c
9dac
NationalInstituteofScienceandTechnology
[30]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Advantages
• As LZW is adaptive dictionary coding no need to
transfer the dictionary explicitly.
• It will be created at the decoder side.
• LZW can be made really fast, it grabs a fixed number
of bits from input, so bit parsing is very easy, and table
look up is automatic.
NationalInstituteofScienceandTechnology
[31]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Problems with the encoder
• What if we run out of space?
– Keep track of unused entries and use LRU (Last
Recently Used).
– Monitor compression performance and flush
dictionary when performance is poor.
NationalInstituteofScienceandTechnology
[32]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Conclusion
• LZW has given new dimensions for the development of
new compression techniques.
• It has been implemented in well known compression
format like Acrobat PDF and many other types of
compression packages.
• In combination with other compression techniques
many other different compression techniques are
developed like LZMS.
NationalInstituteofScienceandTechnology
[33]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
REFERENCES
[1] http://www.bambooweb.com/articles/d/a/Data_Compression.html
[2] http://tuxtina.de/files/seminar/LempelZivReport.pdf
[3] BELL, T. C., CLEARY, J. G., AND WITTEN, I. H. Text
Compression. Prentice Hall, Upper Sadle River, NJ, 1990.
[4] http://www.cs.cf.ac.uk/Dave/Multimedia/node214.html
[5] http://download.cdsoft.co.uk/tutorials/rlecompression/Run-
Length Encoding (RLE) Tutorial.htm
[6] David Salomon, Data Compression The Complete Reference,
Second Edition. Springer-Verlac, New York, Inc, 2001 reprint.
[7] http://www.programmersheaven.com/2/Art_Huffman_p1.htm
[8] http://www.programmersheaven.com/2/Art_Huffman_p2.htm
[9] Khalid Sayood, Introduction to Data Compression Second
Edition, Chapter 5, pp. 137-157, Harcourt India Private Limited.
NationalInstituteofScienceandTechnology
[34]
Technical Seminar Presentation 2005
Sudeepta Mishra
NationalInstituteofScienceandTechnology
Sudeepta Mishra CS200117052
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cody Roux - Pure Type Systems - Boston Haskell Meetup
Cody Roux - Pure Type Systems - Boston Haskell MeetupCody Roux - Pure Type Systems - Boston Haskell Meetup
Cody Roux - Pure Type Systems - Boston Haskell MeetupGreg Hale
 
Lecture 3 RE NFA DFA
Lecture 3   RE NFA DFA Lecture 3   RE NFA DFA
Lecture 3 RE NFA DFA Rebaz Najeeb
 
0015.register allocation-graph-coloring
0015.register allocation-graph-coloring0015.register allocation-graph-coloring
0015.register allocation-graph-coloringsean chen
 
The mixed-signal modelling language VHDL-AMS and its semantics (ICNACSA 1999)
The mixed-signal modelling language VHDL-AMS and its semantics (ICNACSA 1999)The mixed-signal modelling language VHDL-AMS and its semantics (ICNACSA 1999)
The mixed-signal modelling language VHDL-AMS and its semantics (ICNACSA 1999)Peter Breuer
 
Declarative Semantics Definition - Term Rewriting
Declarative Semantics Definition - Term RewritingDeclarative Semantics Definition - Term Rewriting
Declarative Semantics Definition - Term RewritingGuido Wachsmuth
 
Introduction - Imperative and Object-Oriented Languages
Introduction - Imperative and Object-Oriented LanguagesIntroduction - Imperative and Object-Oriented Languages
Introduction - Imperative and Object-Oriented LanguagesGuido Wachsmuth
 
20141204.journal club
20141204.journal club20141204.journal club
20141204.journal clubHayaru SHOUNO
 
Register allocation and assignment
Register allocation and assignmentRegister allocation and assignment
Register allocation and assignmentKarthi Keyan
 
Assembly language (addition and subtraction)
Assembly language (addition and subtraction)Assembly language (addition and subtraction)
Assembly language (addition and subtraction)Muhammad Umar Farooq
 
Optimizing Set-Similarity Join and Search with Different Prefix Schemes
Optimizing Set-Similarity Join and Search with Different Prefix SchemesOptimizing Set-Similarity Join and Search with Different Prefix Schemes
Optimizing Set-Similarity Join and Search with Different Prefix SchemesHPCC Systems
 
St Petersburg R user group meetup 2, Parallel R
St Petersburg R user group meetup 2, Parallel RSt Petersburg R user group meetup 2, Parallel R
St Petersburg R user group meetup 2, Parallel RAndrew Bzikadze
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,paperpublications3
 
Certified bit coded regular expression parsing
Certified bit coded regular expression parsingCertified bit coded regular expression parsing
Certified bit coded regular expression parsingrodrigogribeiro
 
Cs6660 compiler design may june 2017 answer key
Cs6660 compiler design may june 2017  answer keyCs6660 compiler design may june 2017  answer key
Cs6660 compiler design may june 2017 answer keyappasami
 

Was ist angesagt? (20)

Assembly Language -I
Assembly Language -IAssembly Language -I
Assembly Language -I
 
Cody Roux - Pure Type Systems - Boston Haskell Meetup
Cody Roux - Pure Type Systems - Boston Haskell MeetupCody Roux - Pure Type Systems - Boston Haskell Meetup
Cody Roux - Pure Type Systems - Boston Haskell Meetup
 
Lecture 3 RE NFA DFA
Lecture 3   RE NFA DFA Lecture 3   RE NFA DFA
Lecture 3 RE NFA DFA
 
0015.register allocation-graph-coloring
0015.register allocation-graph-coloring0015.register allocation-graph-coloring
0015.register allocation-graph-coloring
 
The mixed-signal modelling language VHDL-AMS and its semantics (ICNACSA 1999)
The mixed-signal modelling language VHDL-AMS and its semantics (ICNACSA 1999)The mixed-signal modelling language VHDL-AMS and its semantics (ICNACSA 1999)
The mixed-signal modelling language VHDL-AMS and its semantics (ICNACSA 1999)
 
Declarative Semantics Definition - Term Rewriting
Declarative Semantics Definition - Term RewritingDeclarative Semantics Definition - Term Rewriting
Declarative Semantics Definition - Term Rewriting
 
Introduction - Imperative and Object-Oriented Languages
Introduction - Imperative and Object-Oriented LanguagesIntroduction - Imperative and Object-Oriented Languages
Introduction - Imperative and Object-Oriented Languages
 
20141204.journal club
20141204.journal club20141204.journal club
20141204.journal club
 
Optimization of dfa
Optimization of dfaOptimization of dfa
Optimization of dfa
 
Register allocation and assignment
Register allocation and assignmentRegister allocation and assignment
Register allocation and assignment
 
Assembly language (addition and subtraction)
Assembly language (addition and subtraction)Assembly language (addition and subtraction)
Assembly language (addition and subtraction)
 
Cfg part i
Cfg   part iCfg   part i
Cfg part i
 
Optimizing Set-Similarity Join and Search with Different Prefix Schemes
Optimizing Set-Similarity Join and Search with Different Prefix SchemesOptimizing Set-Similarity Join and Search with Different Prefix Schemes
Optimizing Set-Similarity Join and Search with Different Prefix Schemes
 
Lexicalanalyzer
LexicalanalyzerLexicalanalyzer
Lexicalanalyzer
 
St Petersburg R user group meetup 2, Parallel R
St Petersburg R user group meetup 2, Parallel RSt Petersburg R user group meetup 2, Parallel R
St Petersburg R user group meetup 2, Parallel R
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
 
Certified bit coded regular expression parsing
Certified bit coded regular expression parsingCertified bit coded regular expression parsing
Certified bit coded regular expression parsing
 
Lecture4 lexical analysis2
Lecture4 lexical analysis2Lecture4 lexical analysis2
Lecture4 lexical analysis2
 
Term Rewriting
Term RewritingTerm Rewriting
Term Rewriting
 
Cs6660 compiler design may june 2017 answer key
Cs6660 compiler design may june 2017  answer keyCs6660 compiler design may june 2017  answer key
Cs6660 compiler design may june 2017 answer key
 

Andere mochten auch

Taxonomy of Differential Compression
Taxonomy of Differential CompressionTaxonomy of Differential Compression
Taxonomy of Differential CompressionLiwei Ren任力偉
 
Quantization
QuantizationQuantization
Quantizationwtyru1989
 
Introduction for Data Compression
Introduction for Data Compression Introduction for Data Compression
Introduction for Data Compression MANISH T I
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compressionM.k. Praveen
 

Andere mochten auch (10)

Taxonomy of Differential Compression
Taxonomy of Differential CompressionTaxonomy of Differential Compression
Taxonomy of Differential Compression
 
Quantization
QuantizationQuantization
Quantization
 
Introduction for Data Compression
Introduction for Data Compression Introduction for Data Compression
Introduction for Data Compression
 
Vector quantization
Vector quantizationVector quantization
Vector quantization
 
Audio compression
Audio compressionAudio compression
Audio compression
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Compression techniques
Compression techniquesCompression techniques
Compression techniques
 
Data compression
Data compressionData compression
Data compression
 
Compression
CompressionCompression
Compression
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
 

Ähnlich wie NIST Data Compression Seminar 2005

Sentimental analysis of financial articles using neural network
Sentimental analysis of financial articles using neural networkSentimental analysis of financial articles using neural network
Sentimental analysis of financial articles using neural networkBhavyateja Potineni
 
Verilog Lecture1
Verilog Lecture1Verilog Lecture1
Verilog Lecture1Béo Tú
 
Introduction to SeqAn, an Open-source C++ Template Library
Introduction to SeqAn, an Open-source C++ Template LibraryIntroduction to SeqAn, an Open-source C++ Template Library
Introduction to SeqAn, an Open-source C++ Template LibraryCan Ozdoruk
 
Layout design on MICROWIND
Layout design on MICROWINDLayout design on MICROWIND
Layout design on MICROWINDvaibhav jindal
 
dokumen.tips_logic-synthesis-report.pdf
dokumen.tips_logic-synthesis-report.pdfdokumen.tips_logic-synthesis-report.pdf
dokumen.tips_logic-synthesis-report.pdfNithishKumar475285
 
DSL Construction with Ruby - ThoughtWorks Masterclass Series 2009
DSL Construction with Ruby - ThoughtWorks Masterclass Series 2009DSL Construction with Ruby - ThoughtWorks Masterclass Series 2009
DSL Construction with Ruby - ThoughtWorks Masterclass Series 2009Harshal Hayatnagarkar
 
silent sound technology
silent sound technologysilent sound technology
silent sound technologyNajeeb p
 
IMAG 4850 Library Presentation
IMAG 4850 Library PresentationIMAG 4850 Library Presentation
IMAG 4850 Library Presentationedward.eckel
 
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...Raj Kumar Thenua
 
NL to OCL via SBVR
NL to OCL via SBVRNL to OCL via SBVR
NL to OCL via SBVRImran Bajwa
 
Sample_Mini Project.pptx
Sample_Mini Project.pptxSample_Mini Project.pptx
Sample_Mini Project.pptxLandlord13
 
CSEE&T 2017 SWEBOK Evolution Panel - View from ISO/IEC/JTC1/SC7/WG20 and SEMAT
CSEE&T 2017 SWEBOK Evolution Panel - View from ISO/IEC/JTC1/SC7/WG20 and SEMATCSEE&T 2017 SWEBOK Evolution Panel - View from ISO/IEC/JTC1/SC7/WG20 and SEMAT
CSEE&T 2017 SWEBOK Evolution Panel - View from ISO/IEC/JTC1/SC7/WG20 and SEMATHironori Washizaki
 
Session 01 _rtl_design_with_vhdl 101
Session 01 _rtl_design_with_vhdl 101Session 01 _rtl_design_with_vhdl 101
Session 01 _rtl_design_with_vhdl 101Mahmoud Abdellatif
 
Pengenalankepadaautocad
PengenalankepadaautocadPengenalankepadaautocad
Pengenalankepadaautocadwkhairil80
 
TrustNote Cryptographic Algorithms Overview
TrustNote Cryptographic Algorithms OverviewTrustNote Cryptographic Algorithms Overview
TrustNote Cryptographic Algorithms OverviewTrustNote Foundation
 

Ähnlich wie NIST Data Compression Seminar 2005 (20)

Sentimental analysis of financial articles using neural network
Sentimental analysis of financial articles using neural networkSentimental analysis of financial articles using neural network
Sentimental analysis of financial articles using neural network
 
Verilog Lecture1
Verilog Lecture1Verilog Lecture1
Verilog Lecture1
 
Introduction to SeqAn, an Open-source C++ Template Library
Introduction to SeqAn, an Open-source C++ Template LibraryIntroduction to SeqAn, an Open-source C++ Template Library
Introduction to SeqAn, an Open-source C++ Template Library
 
Layout design on MICROWIND
Layout design on MICROWINDLayout design on MICROWIND
Layout design on MICROWIND
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
dokumen.tips_logic-synthesis-report.pdf
dokumen.tips_logic-synthesis-report.pdfdokumen.tips_logic-synthesis-report.pdf
dokumen.tips_logic-synthesis-report.pdf
 
Ann
AnnAnn
Ann
 
FPGA DESIGN FLOW.pdf
FPGA DESIGN FLOW.pdfFPGA DESIGN FLOW.pdf
FPGA DESIGN FLOW.pdf
 
DSL Construction with Ruby - ThoughtWorks Masterclass Series 2009
DSL Construction with Ruby - ThoughtWorks Masterclass Series 2009DSL Construction with Ruby - ThoughtWorks Masterclass Series 2009
DSL Construction with Ruby - ThoughtWorks Masterclass Series 2009
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
 
IMAG 4850 Library Presentation
IMAG 4850 Library PresentationIMAG 4850 Library Presentation
IMAG 4850 Library Presentation
 
MINOR PROJECT
MINOR PROJECTMINOR PROJECT
MINOR PROJECT
 
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
M.Tech Thesis on Simulation and Hardware Implementation of NLMS algorithm on ...
 
NL to OCL via SBVR
NL to OCL via SBVRNL to OCL via SBVR
NL to OCL via SBVR
 
Sample_Mini Project.pptx
Sample_Mini Project.pptxSample_Mini Project.pptx
Sample_Mini Project.pptx
 
CSEE&T 2017 SWEBOK Evolution Panel - View from ISO/IEC/JTC1/SC7/WG20 and SEMAT
CSEE&T 2017 SWEBOK Evolution Panel - View from ISO/IEC/JTC1/SC7/WG20 and SEMATCSEE&T 2017 SWEBOK Evolution Panel - View from ISO/IEC/JTC1/SC7/WG20 and SEMAT
CSEE&T 2017 SWEBOK Evolution Panel - View from ISO/IEC/JTC1/SC7/WG20 and SEMAT
 
Session 01 _rtl_design_with_vhdl 101
Session 01 _rtl_design_with_vhdl 101Session 01 _rtl_design_with_vhdl 101
Session 01 _rtl_design_with_vhdl 101
 
Pengenalankepadaautocad
PengenalankepadaautocadPengenalankepadaautocad
Pengenalankepadaautocad
 
TrustNote Cryptographic Algorithms Overview
TrustNote Cryptographic Algorithms OverviewTrustNote Cryptographic Algorithms Overview
TrustNote Cryptographic Algorithms Overview
 
Live coding
Live codingLive coding
Live coding
 

Kürzlich hochgeladen

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Kürzlich hochgeladen (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

NIST Data Compression Seminar 2005

  • 1. NationalInstituteofScienceandTechnology [1] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 A Review of Data Compression Techniques Presented by Sudeepta Mishra Roll# CS200117052 At NIST,Berhampur Under the guidance of Mr. Rowdra Ghatak
  • 2. NationalInstituteofScienceandTechnology [2] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Introduction • Data compression is the process of encoding data so that it takes less storage space or less transmission time than it would if it were not compressed. • Compression is possible because most real-world data is very redundant
  • 3. NationalInstituteofScienceandTechnology [3] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Different Compression Techniques • Mainly two types of data Compression techniques are there. – Loss less Compression. Useful in spreadsheets, text, executable program Compression. – Lossy less Compression. Compression of images, movies and sounds.
  • 4. NationalInstituteofScienceandTechnology [4] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Types of Loss less data Compression • Dictionary coders. – Zip (file format). – Lempel Ziv. • Entropy encoding. – Huffman coding (simple entropy coding). • Run-length encoding.
  • 5. NationalInstituteofScienceandTechnology [5] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Dictionary-Based Compression • Dictionary-based algorithms do not encode single symbols as variable-length bit strings; they encode variable-length strings of symbols as single tokens. • The tokens form an index into a phrase dictionary. • If the tokens are smaller than the phrases they replace, compression occurs.
  • 6. NationalInstituteofScienceandTechnology [6] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Types of Dictionary • Static Dictionary. • Semi-Adaptive Dictionary. • Adaptive Dictionary. – Lempel Ziv algorithms belong to this category of dictionary coders. The dictionary is being built in a single pass, while at the same time encoding the data. – The decoder can build up the dictionary in the same way as the encoder while decompressing the data.
  • 7. NationalInstituteofScienceandTechnology [7] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 • Using a English Dictionary the string: “A good example of how dictionary based compression works” • Gives : 1/1 822/3 674/4 1343/60 928/75 550/32 173/46 421/2 • Using the dictionary as lookup table, each word is coded as x/y, where, x gives the page no. and y gives the number of the word on that page. If the dictionary has 2,200 pages with less than 256 entries per page: Therefore x requires 12 bits and y requires 8 bits, i.e., 20 bits per word (2.5 bytes per word). Using ASCII coding the above string requires 48 bytes, whereas our encoding requires only 20 (<-2.5 * 8) bytes: 50% compression. Dictionary-Based Compression: Example
  • 8. NationalInstituteofScienceandTechnology [8] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Lempel Ziv • It is a family of algorithms, stemming from the two algorithms proposed by Jacob Ziv and Abraham Lempel in their landmark papers in 1977 and 1978. LZ77 LZ78 LZR LZHLZSS LZB LZFG LZC LZT LZMW LZW LZJ
  • 9. NationalInstituteofScienceandTechnology [9] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 LZW Algorithm • It is An improved version of LZ78 algorithm. • Published by Terry Welch in 1984. • A dictionary that is indexed by “codes” is used. The dictionary is assumed to be initialized with 256 entries (indexed with ASCII codes 0 through 255) representing the ASCII table.
  • 10. NationalInstituteofScienceandTechnology [10] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) W = NIL; while (there is input){ K = next symbol from input; if (WK exists in the dictionary) { W = WK; } else { output (index(W)); add WK to the dictionary; W = K; } }
  • 11. NationalInstituteofScienceandTechnology [11] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Flow Chart START W= NULL IS EOF ? K=NEXT INPUT IS WK FOUND? W=WK OUTPUT INDEX OF W ADD WK TO DICTIONARY STOP W=K YES NO YES NO
  • 12. NationalInstituteofScienceandTechnology [12] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • Input string is • The Initial Dictionary contains symbols like a, b, c, d with their index values as 1, 2, 3, 4 respectively. • Now the input string is read from left to right. Starting from a. a b d c a d a c a 1 b 2 c 3 d 4
  • 13. NationalInstituteofScienceandTechnology [13] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • W = Null • K = a • WK = a In the dictionary. a b d c a d a c a 1 b 2 c 3 d 4 K
  • 14. NationalInstituteofScienceandTechnology [14] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • K = b. • WK = ab is not in the dictionary. • Add WK to dictionary • Output code for a. • Set W = b a b d c a d a c K 1 ab 5a 1 b 2 c 3 d 4
  • 15. NationalInstituteofScienceandTechnology [15] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • K = d • WK = bd Not in the dictionary. Add bd to dictionary. • Output code b • Set W = d a b d c a d a c 1 K 2 ab 5a 1 b 2 c 3 d 4 bd 6
  • 16. NationalInstituteofScienceandTechnology [16] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • K = a • WK = da not in the dictionary. • Add it to dictionary. • Output code d • Set W = a a b d a b d a c 1 K 2 4 ab 5a 1 b 2 c 3 d 4 bd 6 da 7
  • 17. NationalInstituteofScienceandTechnology [17] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • K = b • WK = ab It is in the dictionary. a b d a b d a c 1 K 2 4 ab 5a 1 b 2 c 3 d 4 bd 6 da 7
  • 18. NationalInstituteofScienceandTechnology [18] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • K = d • WK = abd Not in the dictionary. • Add W to the dictionary. • Output code for W. • Set W = d a b d a b d a c 1 K 2 4 5 ab 5a 1 b 2 c 3 d 4 bd 6 da 7 abd 8
  • 19. NationalInstituteofScienceandTechnology [19] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • K = a • WK = da In the dictionary. a b d a b d a c 1 K 2 4 5 ab 5a 1 b 2 c 3 d 4 bd 6 da 7 abd 8
  • 20. NationalInstituteofScienceandTechnology [20] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • K = c • WK = dac Not in the dictionary. • Add WK to the dictionary. • Output code for W. • Set W = c • No input left so output code for W. a b d a b d a c 1 K 2 4 5 ab 5a 1 b 2 c 3 d 4 bd 6 da 7 abd 8 7 dac 9
  • 21. NationalInstituteofScienceandTechnology [21] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Compression) Example • The final output string is 1 2 4 5 7 3 • Stop. cadbadba 1 K 2 4 5 5ab 4d 3c 2b 1a 6bd 7da 8abd 7 9dac 3
  • 22. NationalInstituteofScienceandTechnology [22] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 LZW Decompression Algorithm read a character k; output k; w = k; while ( read a character k ) /* k could be a character or a code. */ { entry = dictionary entry for k; output entry; add w + entry[0] to dictionary; w = entry; }
  • 23. NationalInstituteofScienceandTechnology [23] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 LZW Decompression Algorithm Flow Chart START Output K IS EOF ? K=NEXT INPUT ENTRY=DICTIONARY INDEX (K) ADD W+ENTRY[0] TO DICTIONARY STOP W=ENTRY K=INPUT W=K YES NO Output ENTRY
  • 24. NationalInstituteofScienceandTechnology [24] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Decompression) Example • K = 1 • Out put K (i.e. a) • W = K 1 K 2 4 5 4d 3c 2b 1a 7 3 a
  • 25. NationalInstituteofScienceandTechnology [25] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Decompression) Example • K = 2 • entry = b • Output entry • Add W + entry[0] to dictionary • W = entry[0] (i.e. b) 1 K 2 4 5 4d 3c 2b 1a 7 3 a b 5ab
  • 26. NationalInstituteofScienceandTechnology [26] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Decompression) Example • K = 4 • entry = d • Output entry • Add W + entry[0] to dictionary • W = entry[0] (i.e. d) 1 K 2 4 5 4d 3c 2b 1a 7 3 a b 5ab 6bd d
  • 27. NationalInstituteofScienceandTechnology [27] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Decompression) Example • K = 5 • entry = ab • Output entry • Add W + entry[0] to dictionary • W = entry[0] (i.e. a) 1 K 2 4 5 4d 3c 2b 1a 7 3 a b 5ab 6bd d a b 7da
  • 28. NationalInstituteofScienceandTechnology [28] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Decompression) Example • K = 7 • entry = da • Output entry • Add W + entry[0] to dictionary • W = entry[0] (i.e. d) 1 K 2 4 5 4d 3c 2b 1a 7 3 a b 5ab 6bd d a b 7da d a 8abd
  • 29. NationalInstituteofScienceandTechnology [29] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 The LZW Algorithm (Decompression) Example • K = 3 • entry = c • Output entry • Add W + entry[0] to dictionary • W = entry[0] (i.e. c) 1 K 2 4 5 4d 3c 2b 1a 7 3 a b 5ab 6bd d a b 7da d a 8abd c 9dac
  • 30. NationalInstituteofScienceandTechnology [30] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Advantages • As LZW is adaptive dictionary coding no need to transfer the dictionary explicitly. • It will be created at the decoder side. • LZW can be made really fast, it grabs a fixed number of bits from input, so bit parsing is very easy, and table look up is automatic.
  • 31. NationalInstituteofScienceandTechnology [31] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Problems with the encoder • What if we run out of space? – Keep track of unused entries and use LRU (Last Recently Used). – Monitor compression performance and flush dictionary when performance is poor.
  • 32. NationalInstituteofScienceandTechnology [32] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Conclusion • LZW has given new dimensions for the development of new compression techniques. • It has been implemented in well known compression format like Acrobat PDF and many other types of compression packages. • In combination with other compression techniques many other different compression techniques are developed like LZMS.
  • 33. NationalInstituteofScienceandTechnology [33] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 REFERENCES [1] http://www.bambooweb.com/articles/d/a/Data_Compression.html [2] http://tuxtina.de/files/seminar/LempelZivReport.pdf [3] BELL, T. C., CLEARY, J. G., AND WITTEN, I. H. Text Compression. Prentice Hall, Upper Sadle River, NJ, 1990. [4] http://www.cs.cf.ac.uk/Dave/Multimedia/node214.html [5] http://download.cdsoft.co.uk/tutorials/rlecompression/Run- Length Encoding (RLE) Tutorial.htm [6] David Salomon, Data Compression The Complete Reference, Second Edition. Springer-Verlac, New York, Inc, 2001 reprint. [7] http://www.programmersheaven.com/2/Art_Huffman_p1.htm [8] http://www.programmersheaven.com/2/Art_Huffman_p2.htm [9] Khalid Sayood, Introduction to Data Compression Second Edition, Chapter 5, pp. 137-157, Harcourt India Private Limited.
  • 34. NationalInstituteofScienceandTechnology [34] Technical Seminar Presentation 2005 Sudeepta Mishra NationalInstituteofScienceandTechnology Sudeepta Mishra CS200117052 Thank You