SlideShare a Scribd company logo
1 of 30
• Data compression implies sending or storing a smaller number of bits.
Lossless Compression
In lossless data compression, the integrity of the data is preserved.
The original data and the data after compression and decompression are exactly the same because,
in these methods, the compression and decompression algorithms are exact inverses of each other:
no part of the data is lost in the process.
Redundant data is removed in compression and added during decompression. Lossless
compression methods are normally used when we cannot afford to lose any data.
Lossless Compression: Examples
• Text Compression
• It is very important that the reconstruction is identical to the text
original, as very small differences can result in statements with very
different meanings.
Consider the sentences “Do not send money” and
“Do now send money.”
Lossless Compression: Examples
 suppose we compressed a radiological image in a lossy fashion, and the
difference between the reconstruction and the original was visually
undetectable.
 If this image was later enhanced, the previously undetectable differences
may cause the appearance of artifacts that could seriously mislead the
radiologist
Lossless Compression: Examples
• Data obtained from satellites often are processed later to obtain
different numerical indicators of vegetation, deforestation, and so on.
• If the reconstructed data are not identical to the original data,
processing may result in “enhancement” of the differences.
• It may not be possible to go back and obtain the same data over
again
Lossy Compression
• Lossy compression techniques involve some loss of information, and data
that have been compressed using lossy techniques generally cannot be
recovered or reconstructed exactly.
• In many applications, this lack of exact reconstruction is not a problem.
• For example, when storing or transmitting speech, the exact value of each
sample of speech is not necessary.
• Similarly, when viewing a reconstruction of a video sequence, the fact that
the reconstruction is different from the original is generally not important
as long as the differences do not result in annoying artifacts.
• Thus, video is generally compressed using lossy compression.
Performance of data compression technique
• (i) Compression ratio
• (ii) Distortion
• (iii) Compression rate
• (iv) Fidelity and Quality
• (v) Self Information
Compression ratio:
• The ratio of the number of bits required to represent the data before
compression to the number of bits required to represent the data
after compression.
• Ex. Suppose storing n image requires 65536 bytes, this image is
compressed and the compressed version requires 16384 bytes.
• Compression Ratio=Bits required before compression / Bits required after compression
= 65536/16384 = 4
• So the compression ratio is 4:1.
• It can be also represented in terms of reduction in the amount of data
required as a percentage i.e 75%
• ie =( (4-1)/4)*100= 75
Distortion
• The difference between the original and the
reconstruction is called as ‘Distortion’.
• Lossy techniques are generally used for the compression
of data that originate as analog signals, such as speech
and video.
• Absolute difference measure
d(x,y)= | x-y |
Squared error measure
d(x,y)=(x-y)2
Compression rate
•
• It is the average number of bits required to represent a
single sample
• Ex. In the case of the compressed image if we assume 8
bits per byte (or pixel) the average number of bits per
pixel in the compressed representation is 2.
• Thus we would say that the compression rate is 2 bits/
pixel
Fidelity and Quality:
• The difference between the reconstruction and the
are fidelity and quality.
• When we say that the fidelity or quality of a
is high, we mean that the difference between the
reconstruction and the original is small.
• Whether the difference is a mathematical or a perceptual
difference should be evident from the context
Ex. The barking of a dog during a burglary is a high probability event and therefore does
not contain too much information theory. However if the dog did not bark furring a
burglary, this is a low-probability event and contains a lot of information.
Phases of Compression
• Modeling
• Coding
• Modelling suppose we need to compress a file
111222233
132432
• Coding
132432
10 1110 110 11110 1110 110
If we were to transmit or store the binary representations of these numbers, we would need to use 5 bits per
sample. The structure in the data can be characterized by an equation
CASE 1
• The difference between the data and the model. The difference (or residual) is given by
the
• 010 −1 1 −101 −1 −111
• The residual sequence consists of only three numbers −1 0 1.
• Assign a code of 00 to −1,
• a code of 01 to 0,
• and a code of 10 to 1,
• 01 10 01 00 10 00 01 10 00 00 10 10
• so need to use 2 bits to represent each element of the residual sequence.
• Therefore, compression can be obtained by transmitting or storing the parameters of the
model and the residual sequence
• The sequence does not seem to follow a simple law as in the previous case.
• Each value is close to the previous value.
• Suppose we send the first value, then in place of subsequent values we send
the difference between it and the previous value.
CASE 2
The sequence of transmitted values would be
• The number of distinct values has been reduced.
• Fewer bits are required to represent each number and compression is achieved.
• The decoder adds each received value to the previous decoded value to obtain the
reconstruction corresponding to the received value.
• Techniques that use the past values of a sequence to predict the current value and then encode
the error in prediction, or residual, are called predictive coding schemes

More Related Content

Similar to dc module1 part 1.pptx

Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and videosangusajjan
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoKavya P K
 
ImageCompression.ppt
ImageCompression.pptImageCompression.ppt
ImageCompression.pptdudoo1
 
ImageCompression.ppt
ImageCompression.pptImageCompression.ppt
ImageCompression.pptssuser6d1fca
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introductionsangusajjan
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
notes_Image Compression_edited.ppt
notes_Image Compression_edited.pptnotes_Image Compression_edited.ppt
notes_Image Compression_edited.pptHarisMasood20
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.pptHarisMasood20
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.pptHarisMasood20
 
image compression in data compression
image compression in data compressionimage compression in data compression
image compression in data compressionZaabir Ali
 

Similar to dc module1 part 1.pptx (20)

Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and stegano
 
ImageCompression.ppt
ImageCompression.pptImageCompression.ppt
ImageCompression.ppt
 
ImageCompression.ppt
ImageCompression.pptImageCompression.ppt
ImageCompression.ppt
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introduction
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Image Security
Image SecurityImage Security
Image Security
 
notes_Image Compression_edited.ppt
notes_Image Compression_edited.pptnotes_Image Compression_edited.ppt
notes_Image Compression_edited.ppt
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
 
Compressionbasics
CompressionbasicsCompressionbasics
Compressionbasics
 
Image compression
Image compressionImage compression
Image compression
 
WT in IP.ppt
WT in IP.pptWT in IP.ppt
WT in IP.ppt
 
image compression in data compression
image compression in data compressionimage compression in data compression
image compression in data compression
 
Source coding
Source codingSource coding
Source coding
 

More from AzmiNizar1

myofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptxmyofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptxAzmiNizar1
 
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdfBiochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdfAzmiNizar1
 
Vaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunologyVaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunologyAzmiNizar1
 
Vaginal Bleeding .pptx
Vaginal Bleeding .pptxVaginal Bleeding .pptx
Vaginal Bleeding .pptxAzmiNizar1
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptxAzmiNizar1
 
1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdfAzmiNizar1
 
Checkpointing.pptx
Checkpointing.pptxCheckpointing.pptx
Checkpointing.pptxAzmiNizar1
 
Genetic Algorithm (1).pdf
Genetic Algorithm (1).pdfGenetic Algorithm (1).pdf
Genetic Algorithm (1).pdfAzmiNizar1
 
L20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.pptL20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.pptAzmiNizar1
 

More from AzmiNizar1 (10)

myofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptxmyofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptx
 
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdfBiochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
 
Vaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunologyVaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunology
 
Vaginal Bleeding .pptx
Vaginal Bleeding .pptxVaginal Bleeding .pptx
Vaginal Bleeding .pptx
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptx
 
1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf
 
Checkpointing.pptx
Checkpointing.pptxCheckpointing.pptx
Checkpointing.pptx
 
Genetic Algorithm (1).pdf
Genetic Algorithm (1).pdfGenetic Algorithm (1).pdf
Genetic Algorithm (1).pdf
 
Chapter9.pdf
Chapter9.pdfChapter9.pdf
Chapter9.pdf
 
L20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.pptL20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.ppt
 

Recently uploaded

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Recently uploaded (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

dc module1 part 1.pptx

  • 1.
  • 2.
  • 3.
  • 4. • Data compression implies sending or storing a smaller number of bits.
  • 5. Lossless Compression In lossless data compression, the integrity of the data is preserved. The original data and the data after compression and decompression are exactly the same because, in these methods, the compression and decompression algorithms are exact inverses of each other: no part of the data is lost in the process. Redundant data is removed in compression and added during decompression. Lossless compression methods are normally used when we cannot afford to lose any data.
  • 6. Lossless Compression: Examples • Text Compression • It is very important that the reconstruction is identical to the text original, as very small differences can result in statements with very different meanings. Consider the sentences “Do not send money” and “Do now send money.”
  • 7. Lossless Compression: Examples  suppose we compressed a radiological image in a lossy fashion, and the difference between the reconstruction and the original was visually undetectable.  If this image was later enhanced, the previously undetectable differences may cause the appearance of artifacts that could seriously mislead the radiologist
  • 8. Lossless Compression: Examples • Data obtained from satellites often are processed later to obtain different numerical indicators of vegetation, deforestation, and so on. • If the reconstructed data are not identical to the original data, processing may result in “enhancement” of the differences. • It may not be possible to go back and obtain the same data over again
  • 9. Lossy Compression • Lossy compression techniques involve some loss of information, and data that have been compressed using lossy techniques generally cannot be recovered or reconstructed exactly. • In many applications, this lack of exact reconstruction is not a problem. • For example, when storing or transmitting speech, the exact value of each sample of speech is not necessary. • Similarly, when viewing a reconstruction of a video sequence, the fact that the reconstruction is different from the original is generally not important as long as the differences do not result in annoying artifacts. • Thus, video is generally compressed using lossy compression.
  • 10.
  • 11. Performance of data compression technique • (i) Compression ratio • (ii) Distortion • (iii) Compression rate • (iv) Fidelity and Quality • (v) Self Information
  • 12. Compression ratio: • The ratio of the number of bits required to represent the data before compression to the number of bits required to represent the data after compression. • Ex. Suppose storing n image requires 65536 bytes, this image is compressed and the compressed version requires 16384 bytes. • Compression Ratio=Bits required before compression / Bits required after compression = 65536/16384 = 4 • So the compression ratio is 4:1. • It can be also represented in terms of reduction in the amount of data required as a percentage i.e 75% • ie =( (4-1)/4)*100= 75
  • 13. Distortion • The difference between the original and the reconstruction is called as ‘Distortion’. • Lossy techniques are generally used for the compression of data that originate as analog signals, such as speech and video. • Absolute difference measure d(x,y)= | x-y | Squared error measure d(x,y)=(x-y)2
  • 14.
  • 15. Compression rate • • It is the average number of bits required to represent a single sample • Ex. In the case of the compressed image if we assume 8 bits per byte (or pixel) the average number of bits per pixel in the compressed representation is 2. • Thus we would say that the compression rate is 2 bits/ pixel
  • 16.
  • 17. Fidelity and Quality: • The difference between the reconstruction and the are fidelity and quality. • When we say that the fidelity or quality of a is high, we mean that the difference between the reconstruction and the original is small. • Whether the difference is a mathematical or a perceptual difference should be evident from the context
  • 18.
  • 19. Ex. The barking of a dog during a burglary is a high probability event and therefore does not contain too much information theory. However if the dog did not bark furring a burglary, this is a low-probability event and contains a lot of information.
  • 20.
  • 21. Phases of Compression • Modeling • Coding
  • 22.
  • 23. • Modelling suppose we need to compress a file 111222233 132432
  • 24.
  • 25. • Coding 132432 10 1110 110 11110 1110 110
  • 26. If we were to transmit or store the binary representations of these numbers, we would need to use 5 bits per sample. The structure in the data can be characterized by an equation CASE 1
  • 27. • The difference between the data and the model. The difference (or residual) is given by the • 010 −1 1 −101 −1 −111 • The residual sequence consists of only three numbers −1 0 1. • Assign a code of 00 to −1, • a code of 01 to 0, • and a code of 10 to 1, • 01 10 01 00 10 00 01 10 00 00 10 10 • so need to use 2 bits to represent each element of the residual sequence. • Therefore, compression can be obtained by transmitting or storing the parameters of the model and the residual sequence
  • 28.
  • 29. • The sequence does not seem to follow a simple law as in the previous case. • Each value is close to the previous value. • Suppose we send the first value, then in place of subsequent values we send the difference between it and the previous value. CASE 2
  • 30. The sequence of transmitted values would be • The number of distinct values has been reduced. • Fewer bits are required to represent each number and compression is achieved. • The decoder adds each received value to the previous decoded value to obtain the reconstruction corresponding to the received value. • Techniques that use the past values of a sequence to predict the current value and then encode the error in prediction, or residual, are called predictive coding schemes