SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Improvement of lossless Compression for JPEG files

                      Irina Bocharova, Kirill Yurkov,
          Mikhail Bogdanov, Roman Bolshakov, Alexander Buslaev,
             Yuri Konoplev, Anrew Tereskin, Oleg Finkelshteyn
                                 ITMO


                                autumn 2010 - spring 2011




-: big team from ITMO :-   ()        Compression of JPEG    autumn 2010 - spring 2011   1 / 27
Agenda



    Purpose
    Schemes of encoder and decoder
    encoding DC
    encoding RUN’s and AC
    Levenstein encoder
    Arithmetic encoder
    Results
    Problems




-: big team from ITMO :-   ()   Compression of JPEG   autumn 2010 - spring 2011   2 / 27
Purpose




    Realize a recoder of JPEG to reduce bit stream
    Requirements: bit-to-bit corrsepondense




-: big team from ITMO :-   ()   Compression of JPEG   autumn 2010 - spring 2011   3 / 27
Scheme of encoder




-: big team from ITMO :-   ()   Compression of JPEG   autumn 2010 - spring 2011   4 / 27
Scheme of decoder




-: big team from ITMO :-   ()   Compression of JPEG   autumn 2010 - spring 2011   5 / 27
encoding DC (DC Prediction)


                                        B               C

                                                              ?

                                                ?
                                        A               X



                                DCC , |DCB − DCA | < |DCB − DCC |
                  P=
                                DCA , otherwise

                           x - P encoded by arithmetic encoder.



-: big team from ITMO :-   ()           Compression of JPEG       autumn 2010 - spring 2011   6 / 27
encoding DC ( zero map, numbers of nonzero encoding )



                                y0             y1             y2




                                y3             x




                                 Context for encoding x:

                                 y 0 + λ1 y 1 + λ2 y 2 + λ3 y 3



-: big team from ITMO :-   ()          Compression of JPEG         autumn 2010 - spring 2011   7 / 27
AC blocks encoding




-: big team from ITMO :-   ()   Compression of JPEG   autumn 2010 - spring 2011   8 / 27
Runs and levels encoding




    We need to encode the pairs: (l0 , r0 ), (l1 , r1 ), . . . , (ln , rn , )
    The value n known to encoder. For encoding pair (li , ri ) we construct
    two dimensional context:
           n
           n−i




-: big team from ITMO :-   ()   Compression of JPEG   autumn 2010 - spring 2011   9 / 27
Arithmetic coding




                                                Arithmetic + Adaptive
                                                model




                                                          autumn 2010 - spring 2011   10 /
-: big team from ITMO :-   ()   Compression of JPEG                                   27
Levenstein code



    A universal code encoding the non-negative integers
    It works so:
    code of 0 is "0 and if we want to encode a positive number we do
    next:
        1   Init the step count var C to 1
        2   Write a binary representation of the number without the leading "1"to
            the beginning of the code.
        3   Let M be the number of bits written in step 2.
        4   If M is not 0, increment C, repeat from step 2 with M as the new
            number.
        5   Write C "1"bits and a "0"to the beginning of the code.




                                                          autumn 2010 - spring 2011   11 /
-: big team from ITMO :-   ()     Compression of JPEG                                 27
Some samples




                                                      autumn 2010 - spring 2011   12 /
-: big team from ITMO :-   ()   Compression of JPEG                               27
Some information about samples




                                                      autumn 2010 - spring 2011   13 /
-: big team from ITMO :-   ()   Compression of JPEG                               27
Results and Comparison



                       Picture      Size      PackJpg   PCAR
                         A10      842 KB      19.2 %    11.5 %
                        Afisha     213 KB      28.6 %    20.0 %
                         Bird     82 KB       17.7 %    9.4 %
                      Document    103 KB      29.7 %    25.4 %
                       Flower      5 KB       18.5 %    6.0 %
                       Monkey     30 KB       30.6 %    24.7 %
                       Portrait   63 KB       25.5 %    25.0 %




                                                          autumn 2010 - spring 2011   14 /
-: big team from ITMO :-   ()     Compression of JPEG                                 27
Problems (bit-to-bit)

    We need to read and write JFIF (JPEG) files maintatining bitwise
    identity.
    Two possible implementation paths:
           Full parser: file → internal structrures → file
                  Pros: very flexible, easy to process once we have the structure
                  Cons: implementing a writer adhering to the bitwise identity
                  requirement is difficult. High serialization overhead.
           Stream encoder: leaves most of non-interesting metadata as is
           (compressing using general-purpose stream methods)
                  Pros: faster, no serialization code (decoder reuses the jpeg header
                  parser from encoder), guarantees exactness in metadata
                  Cons: we lose flexibility, save some redundant information (e.g.
                  standard Huffman tables)
    After several attempts, we settled on the latter solution which works
    for an estimate of 95% of JPEG files in the wild (for those we are
    unable to process, a diagnostic is provided)
                                                                autumn 2010 - spring 2011   15 /
-: big team from ITMO :-   ()        Compression of JPEG                                    27
Problems (Unknown alphabet size)



    Starts from alphabet contains one symbol Ω = {ζ},
    where ζ is escape symbol
    For each new input symbol at+1
        1   a ∈ Ω,
                                                           τ (a)
            encode a with probality distribution p(a) =    t+1
        2   a∈Ω
              /
                                                                                  τ (a)
                  encode escape symbol with probability distribution p(a) =       t+1
                  encode a with Levenstein code
                  Ω = Ω ∪ {a}




                                                                   autumn 2010 - spring 2011   16 /
-: big team from ITMO :-   ()       Compression of JPEG                                        27
Thanks




    Questions ?




                                                      autumn 2010 - spring 2011   17 /
-: big team from ITMO :-   ()   Compression of JPEG                               27
References



          [Rissanen, J.J.; Langdon, G.G., 1979]
          Arithmetic coding
          IBM Journal of Research and Development, p: 149-162.

          [Levenstein V.I., 1968]
          About redundancy and slowdown of difference coding of natural
          numbers
          Problems of cybernetics, Moscow, Science, p: 173-179.

          [Krichevsky, R.E.; Trofimov V.K., 1981]
          The Performance of Universal Encoding
          IEEE Trans. Information Theory, Vol. IT-27, No. 2, pp. 199–207.




                                                         autumn 2010 - spring 2011   18 /
-: big team from ITMO :-   ()   Compression of JPEG                                  27
other information




                                                      autumn 2010 - spring 2011   19 /
-: big team from ITMO :-   ()   Compression of JPEG                               27

Weitere ähnliche Inhalte

Was ist angesagt?

Code generation in Compiler Design
Code generation in Compiler DesignCode generation in Compiler Design
Code generation in Compiler DesignKuppusamy P
 
Hypergraph Mining For Social Networks
Hypergraph Mining For Social NetworksHypergraph Mining For Social Networks
Hypergraph Mining For Social NetworksGiacomo Bergami
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
0015.register allocation-graph-coloring
0015.register allocation-graph-coloring0015.register allocation-graph-coloring
0015.register allocation-graph-coloringsean chen
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesIJERA Editor
 
CAPE Computer Science Unit 1 Paper 1 - Practice Paper
CAPE Computer Science Unit 1 Paper 1 - Practice PaperCAPE Computer Science Unit 1 Paper 1 - Practice Paper
CAPE Computer Science Unit 1 Paper 1 - Practice PaperAlex Stewart
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodIOSR Journals
 
Ec2203 digital electronics questions anna university by www.annaunivedu.org
Ec2203 digital electronics questions anna university by www.annaunivedu.orgEc2203 digital electronics questions anna university by www.annaunivedu.org
Ec2203 digital electronics questions anna university by www.annaunivedu.organnaunivedu
 
17430 data communication &amp; net
17430  data communication &amp; net17430  data communication &amp; net
17430 data communication &amp; netsoni_nits
 
module5: Encode/Decode Half & Full Adder
module5: Encode/Decode Half & Full Addermodule5: Encode/Decode Half & Full Adder
module5: Encode/Decode Half & Full Adderchandrakant shinde
 

Was ist angesagt? (11)

Code generation in Compiler Design
Code generation in Compiler DesignCode generation in Compiler Design
Code generation in Compiler Design
 
Cbls thuan
Cbls thuanCbls thuan
Cbls thuan
 
Hypergraph Mining For Social Networks
Hypergraph Mining For Social NetworksHypergraph Mining For Social Networks
Hypergraph Mining For Social Networks
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
 
0015.register allocation-graph-coloring
0015.register allocation-graph-coloring0015.register allocation-graph-coloring
0015.register allocation-graph-coloring
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
 
CAPE Computer Science Unit 1 Paper 1 - Practice Paper
CAPE Computer Science Unit 1 Paper 1 - Practice PaperCAPE Computer Science Unit 1 Paper 1 - Practice Paper
CAPE Computer Science Unit 1 Paper 1 - Practice Paper
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection Method
 
Ec2203 digital electronics questions anna university by www.annaunivedu.org
Ec2203 digital electronics questions anna university by www.annaunivedu.orgEc2203 digital electronics questions anna university by www.annaunivedu.org
Ec2203 digital electronics questions anna university by www.annaunivedu.org
 
17430 data communication &amp; net
17430  data communication &amp; net17430  data communication &amp; net
17430 data communication &amp; net
 
module5: Encode/Decode Half & Full Adder
module5: Encode/Decode Half & Full Addermodule5: Encode/Decode Half & Full Adder
module5: Encode/Decode Half & Full Adder
 

Andere mochten auch

present v0.1
present v0.1present v0.1
present v0.1d4k
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)danishrafiq
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 

Andere mochten auch (7)

present v0.1
present v0.1present v0.1
present v0.1
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Present v0.2

PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...cscpconf
 
Image compression and it’s security1
Image compression and it’s security1Image compression and it’s security1
Image compression and it’s security1Reyad Hossain
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICTouradj Ebrahimi
 
DEEP LEARNING TECHNIQUES POWER POINT PRESENTATION
DEEP LEARNING TECHNIQUES POWER POINT PRESENTATIONDEEP LEARNING TECHNIQUES POWER POINT PRESENTATION
DEEP LEARNING TECHNIQUES POWER POINT PRESENTATIONSelvaLakshmi63
 
JPEG2000 in a nutshell
JPEG2000 in a nutshellJPEG2000 in a nutshell
JPEG2000 in a nutshellBenoit Michel
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniquessipij
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
cp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfcp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfshaikmoosa2003
 
D0325016021
D0325016021D0325016021
D0325016021theijes
 
Lossy Light Field Compression
Lossy Light Field CompressionLossy Light Field Compression
Lossy Light Field CompressionDavid Bařina
 
“Challenges and Approaches for Cascaded DNNs: A Case Study of Face Detection ...
“Challenges and Approaches for Cascaded DNNs: A Case Study of Face Detection ...“Challenges and Approaches for Cascaded DNNs: A Case Study of Face Detection ...
“Challenges and Approaches for Cascaded DNNs: A Case Study of Face Detection ...Edge AI and Vision Alliance
 
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...IJCSEA Journal
 
MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingChristian Kehl
 

Ähnlich wie Present v0.2 (20)

PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
 
Multimedia Object - Image
Multimedia Object - ImageMultimedia Object - Image
Multimedia Object - Image
 
Er24902905
Er24902905Er24902905
Er24902905
 
Image compression and it’s security1
Image compression and it’s security1Image compression and it’s security1
Image compression and it’s security1
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AIC
 
DEEP LEARNING TECHNIQUES POWER POINT PRESENTATION
DEEP LEARNING TECHNIQUES POWER POINT PRESENTATIONDEEP LEARNING TECHNIQUES POWER POINT PRESENTATION
DEEP LEARNING TECHNIQUES POWER POINT PRESENTATION
 
JPEG2000 in a nutshell
JPEG2000 in a nutshellJPEG2000 in a nutshell
JPEG2000 in a nutshell
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniques
 
Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
cp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfcp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdf
 
D0325016021
D0325016021D0325016021
D0325016021
 
Lossy Light Field Compression
Lossy Light Field CompressionLossy Light Field Compression
Lossy Light Field Compression
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
 
H0545156
H0545156H0545156
H0545156
 
“Challenges and Approaches for Cascaded DNNs: A Case Study of Face Detection ...
“Challenges and Approaches for Cascaded DNNs: A Case Study of Face Detection ...“Challenges and Approaches for Cascaded DNNs: A Case Study of Face Detection ...
“Challenges and Approaches for Cascaded DNNs: A Case Study of Face Detection ...
 
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
 
MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video Encoding
 
21cm cosmology with ML
21cm cosmology with ML21cm cosmology with ML
21cm cosmology with ML
 
Jpeg and mpeg ppt
Jpeg and mpeg pptJpeg and mpeg ppt
Jpeg and mpeg ppt
 

Present v0.2

  • 1. Improvement of lossless Compression for JPEG files Irina Bocharova, Kirill Yurkov, Mikhail Bogdanov, Roman Bolshakov, Alexander Buslaev, Yuri Konoplev, Anrew Tereskin, Oleg Finkelshteyn ITMO autumn 2010 - spring 2011 -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 1 / 27
  • 2. Agenda Purpose Schemes of encoder and decoder encoding DC encoding RUN’s and AC Levenstein encoder Arithmetic encoder Results Problems -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 2 / 27
  • 3. Purpose Realize a recoder of JPEG to reduce bit stream Requirements: bit-to-bit corrsepondense -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 3 / 27
  • 4. Scheme of encoder -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 4 / 27
  • 5. Scheme of decoder -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 5 / 27
  • 6. encoding DC (DC Prediction) B C ? ? A X DCC , |DCB − DCA | < |DCB − DCC | P= DCA , otherwise x - P encoded by arithmetic encoder. -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 6 / 27
  • 7. encoding DC ( zero map, numbers of nonzero encoding ) y0 y1 y2 y3 x Context for encoding x: y 0 + λ1 y 1 + λ2 y 2 + λ3 y 3 -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 7 / 27
  • 8. AC blocks encoding -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 8 / 27
  • 9. Runs and levels encoding We need to encode the pairs: (l0 , r0 ), (l1 , r1 ), . . . , (ln , rn , ) The value n known to encoder. For encoding pair (li , ri ) we construct two dimensional context: n n−i -: big team from ITMO :- () Compression of JPEG autumn 2010 - spring 2011 9 / 27
  • 10. Arithmetic coding Arithmetic + Adaptive model autumn 2010 - spring 2011 10 / -: big team from ITMO :- () Compression of JPEG 27
  • 11. Levenstein code A universal code encoding the non-negative integers It works so: code of 0 is "0 and if we want to encode a positive number we do next: 1 Init the step count var C to 1 2 Write a binary representation of the number without the leading "1"to the beginning of the code. 3 Let M be the number of bits written in step 2. 4 If M is not 0, increment C, repeat from step 2 with M as the new number. 5 Write C "1"bits and a "0"to the beginning of the code. autumn 2010 - spring 2011 11 / -: big team from ITMO :- () Compression of JPEG 27
  • 12. Some samples autumn 2010 - spring 2011 12 / -: big team from ITMO :- () Compression of JPEG 27
  • 13. Some information about samples autumn 2010 - spring 2011 13 / -: big team from ITMO :- () Compression of JPEG 27
  • 14. Results and Comparison Picture Size PackJpg PCAR A10 842 KB 19.2 % 11.5 % Afisha 213 KB 28.6 % 20.0 % Bird 82 KB 17.7 % 9.4 % Document 103 KB 29.7 % 25.4 % Flower 5 KB 18.5 % 6.0 % Monkey 30 KB 30.6 % 24.7 % Portrait 63 KB 25.5 % 25.0 % autumn 2010 - spring 2011 14 / -: big team from ITMO :- () Compression of JPEG 27
  • 15. Problems (bit-to-bit) We need to read and write JFIF (JPEG) files maintatining bitwise identity. Two possible implementation paths: Full parser: file → internal structrures → file Pros: very flexible, easy to process once we have the structure Cons: implementing a writer adhering to the bitwise identity requirement is difficult. High serialization overhead. Stream encoder: leaves most of non-interesting metadata as is (compressing using general-purpose stream methods) Pros: faster, no serialization code (decoder reuses the jpeg header parser from encoder), guarantees exactness in metadata Cons: we lose flexibility, save some redundant information (e.g. standard Huffman tables) After several attempts, we settled on the latter solution which works for an estimate of 95% of JPEG files in the wild (for those we are unable to process, a diagnostic is provided) autumn 2010 - spring 2011 15 / -: big team from ITMO :- () Compression of JPEG 27
  • 16. Problems (Unknown alphabet size) Starts from alphabet contains one symbol Ω = {ζ}, where ζ is escape symbol For each new input symbol at+1 1 a ∈ Ω, τ (a) encode a with probality distribution p(a) = t+1 2 a∈Ω / τ (a) encode escape symbol with probability distribution p(a) = t+1 encode a with Levenstein code Ω = Ω ∪ {a} autumn 2010 - spring 2011 16 / -: big team from ITMO :- () Compression of JPEG 27
  • 17. Thanks Questions ? autumn 2010 - spring 2011 17 / -: big team from ITMO :- () Compression of JPEG 27
  • 18. References [Rissanen, J.J.; Langdon, G.G., 1979] Arithmetic coding IBM Journal of Research and Development, p: 149-162. [Levenstein V.I., 1968] About redundancy and slowdown of difference coding of natural numbers Problems of cybernetics, Moscow, Science, p: 173-179. [Krichevsky, R.E.; Trofimov V.K., 1981] The Performance of Universal Encoding IEEE Trans. Information Theory, Vol. IT-27, No. 2, pp. 199–207. autumn 2010 - spring 2011 18 / -: big team from ITMO :- () Compression of JPEG 27
  • 19. other information autumn 2010 - spring 2011 19 / -: big team from ITMO :- () Compression of JPEG 27