SlideShare a Scribd company logo
1 of 18
1
Under The Guidance of :- prof. Sidramayya S.M.
Presented by
Anil Khandekar
2BU14EC403
Electronics And Communication Engineering
SGBIT, Belgaum
CONTENTS
 Introduction
 Motivation
 Literature survey
 data compression methods
 lossless compression
• Run-length encoding
• Huffman coding
 Lossy compression methods
• Jpeg process
• Mpeg process
 Applications
 Conclusion
 References
2
INTRODUCTION
 Data compression is often referred to as coding, where coding
is a very general term encompassing any special representation
of data which satisfies a given need.
 Information theory is defined to be the study of efficient coding
and its consequences, in the form of speed of transmission and
probability of error.
 Data compression may be viewed as a branch of information
theory in which the primary objective is to minimize the
amount of data to be transmitted.
3
Motivation
 To broaden knowledge of compression techniques as well as
the mathematical foundations of data compression.
 To become aware of existing compression standards and some
compression utilities available.
 We can improve our programming skills by doing the
laboratory work on Data Compression.
4
Literature survey
 IEEE Explore Lossless data compression techniques, Published
in WESCON/94. Conference Record
Which are the different techniques of lossless data compression is explained
in detail.
 Introduction To Data Compression, 3rd Edition Paperback – 2010
by Sayood Khalid
Lossy compression technique and their different types are explained
 Information Theory and Coding by Giridhar , Pooja publication , 2014
edition
We get to know about different encoding algorithm such as Huffman coding
technique etc .
5
Data compression methods
 Data compression means sending or storing a smaller number
of bits.
6
Lossless compression
 In lossless data compression, the integrity of the data is
preserved.
 The original data and the data after compression and
decompression are exactly the same because the compression
and decompression algorithms are exactly the inverse of each
other.
 Example:
 Run-length encoding
 Huffman encoding
7
Run-length Encoding
 It does not need knowledge of the frequently of occurrence of
symbols and can be very efficient if data are represented as 0s
and 1s.
 For example:
8
Huffman coding
 In Huffman coding, you assign shorter codes to symbols that
occur more frequently and longer codes to those that occur
less frequently.
 For example:
9
Character A B C D E
------------------------------------------------------
Frequency 17 12 12 27 32
Final Tree and Code
10
Lossy compression methods
 Loss of information is acceptable in a picture of video.
 The reason is that our eyes and ears cannot distinguish subtle
changes.
 Loss of information is not acceptable in a text file or a program
file.
 For examples:
 Joint photographic experts group (JPEG)
 Motion picture experts group (MPEG)
11
JPEG process
 DTC: discrete cosine transform
 Quantization
 Compression
12
Video compression--MPEG
 MPEG method
 Spatial compression
 The spatial compression of each frame is done with JPEG.
 Temporal compression
 The temporal compression removes the redundant frames.
 MPEG method first divides frames into three categories:
I-frames, P-frames, B-frames.
13
MPEG frames
 I-frames: (intra-coded frame)
 It is an independent frame that is not related to any other frame.
 They are present at regular intervals.
 I-frames are independent of other frames and cannot be constructed from
other frames.
 P-frames: (predicted frame)
 It is related to the preceding I-frame or P-frame.
 Each P-frame contains only the changes from the preceding frame.
 P-frames can be constructed only from previous I- or P-frames.
 B-frames: (bidirectional frame)
 It is relative to the preceding and following I-frame or P-frame.
 Each B-frame is relative to the past and the future.
 A B-frame is never related to another B-frame.
14
Applications
 satellite imagery
 mini discs
 MP3 technology
 fax
 digital cameras
 DVD technology
 Modems
 wireless telephony
 database design
 storage and transmission of CT and MRI scans
 Mammography
 digital images, high definition television (HDTV), and video games
15
Conclusion And Future Scope
 Conclusion
Image coding based on models of human perception, scalability,
robustness, error resilience, and complexity are a few of the many
challenges in image coding to be fully resolved and may affect
image data compression performance in the years to come.
 Future Scope
Data compression that make use of the archive data format
for maintaining high security within the system using the
encryption of the data packets. data compression increases
the communication channel capacity.
16
References
 International Journal of Advanced Research in Computer Science
and Software Engineering, Volume 3, Issue 10, October 2013
'Multimedia Data Compression Techniques‘
 Sachin Dhawan-’A review of image compression and comparison of
its algorithms, IJECT Vol. 2, Issue 1’
 IEEE Xplore Lossless data compression techniques, Published
in WESCON/94. Idea/Microelectronics. Conference Record
 Wallace, G., The JPEG still picture compression standard,
Communications of the ACM, 34 (199 ) 31-44.
17
18

More Related Content

What's hot

Image compression in digital image processing
Image compression in digital image processingImage compression in digital image processing
Image compression in digital image processingDHIVYADEVAKI
 
B03208016
B03208016B03208016
B03208016inventy
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applicationsManasitilak
 
A New Lossless Medical Image Compression Technique using Hybrid Prediction Model
A New Lossless Medical Image Compression Technique using Hybrid Prediction ModelA New Lossless Medical Image Compression Technique using Hybrid Prediction Model
A New Lossless Medical Image Compression Technique using Hybrid Prediction ModelCSCJournals
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 
Hiding Image within Video Clip
Hiding Image within Video ClipHiding Image within Video Clip
Hiding Image within Video ClipIOSR Journals
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 

What's hot (20)

Ijrdtvlis11 140006
Ijrdtvlis11 140006Ijrdtvlis11 140006
Ijrdtvlis11 140006
 
Image compression in digital image processing
Image compression in digital image processingImage compression in digital image processing
Image compression in digital image processing
 
B03208016
B03208016B03208016
B03208016
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
A New Lossless Medical Image Compression Technique using Hybrid Prediction Model
A New Lossless Medical Image Compression Technique using Hybrid Prediction ModelA New Lossless Medical Image Compression Technique using Hybrid Prediction Model
A New Lossless Medical Image Compression Technique using Hybrid Prediction Model
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Hiding Image within Video Clip
Hiding Image within Video ClipHiding Image within Video Clip
Hiding Image within Video Clip
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Info hiding
Info hidingInfo hiding
Info hiding
 
Steganography
SteganographySteganography
Steganography
 

Similar to Compression technologies

Data compression, data security, and machine learning
Data compression, data security, and machine learningData compression, data security, and machine learning
Data compression, data security, and machine learningChris Huang
 
Chapter 5 - Data Compression
Chapter 5 - Data CompressionChapter 5 - Data Compression
Chapter 5 - Data CompressionPratik Pradhan
 
Fibonacci Video Encryption
Fibonacci Video EncryptionFibonacci Video Encryption
Fibonacci Video EncryptionJun Steed Huang
 
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...Léia de Sousa
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
 
A Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosA Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosINFOGAIN PUBLICATION
 
Data compression using huffman coding
Data compression using huffman codingData compression using huffman coding
Data compression using huffman codingSATYENDRAKUMAR279
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesTELKOMNIKA JOURNAL
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET Journal
 
A hybrid predictive technique for lossless image compression
A hybrid predictive technique for lossless image compressionA hybrid predictive technique for lossless image compression
A hybrid predictive technique for lossless image compressionjournalBEEI
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
An overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceAn overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceINFOGAIN PUBLICATION
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABIJEEE
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
 

Similar to Compression technologies (20)

M.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit vM.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit v
 
Data compression, data security, and machine learning
Data compression, data security, and machine learningData compression, data security, and machine learning
Data compression, data security, and machine learning
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Chapter 5 - Data Compression
Chapter 5 - Data CompressionChapter 5 - Data Compression
Chapter 5 - Data Compression
 
Fibonacci Video Encryption
Fibonacci Video EncryptionFibonacci Video Encryption
Fibonacci Video Encryption
 
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
Chrome server2 print_http_www_uni_mannheim_de_acm97_papers_soderquist_m_13736...
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
A Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System VideosA Novel Approach for Compressing Surveillance System Videos
A Novel Approach for Compressing Surveillance System Videos
 
Data compression using huffman coding
Data compression using huffman codingData compression using huffman coding
Data compression using huffman coding
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
It3116411644
It3116411644It3116411644
It3116411644
 
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
 
A hybrid predictive technique for lossless image compression
A hybrid predictive technique for lossless image compressionA hybrid predictive technique for lossless image compression
A hybrid predictive technique for lossless image compression
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
I1803035762
I1803035762I1803035762
I1803035762
 
An overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceAn overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importance
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLAB
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Compression technologies

  • 1. 1 Under The Guidance of :- prof. Sidramayya S.M. Presented by Anil Khandekar 2BU14EC403 Electronics And Communication Engineering SGBIT, Belgaum
  • 2. CONTENTS  Introduction  Motivation  Literature survey  data compression methods  lossless compression • Run-length encoding • Huffman coding  Lossy compression methods • Jpeg process • Mpeg process  Applications  Conclusion  References 2
  • 3. INTRODUCTION  Data compression is often referred to as coding, where coding is a very general term encompassing any special representation of data which satisfies a given need.  Information theory is defined to be the study of efficient coding and its consequences, in the form of speed of transmission and probability of error.  Data compression may be viewed as a branch of information theory in which the primary objective is to minimize the amount of data to be transmitted. 3
  • 4. Motivation  To broaden knowledge of compression techniques as well as the mathematical foundations of data compression.  To become aware of existing compression standards and some compression utilities available.  We can improve our programming skills by doing the laboratory work on Data Compression. 4
  • 5. Literature survey  IEEE Explore Lossless data compression techniques, Published in WESCON/94. Conference Record Which are the different techniques of lossless data compression is explained in detail.  Introduction To Data Compression, 3rd Edition Paperback – 2010 by Sayood Khalid Lossy compression technique and their different types are explained  Information Theory and Coding by Giridhar , Pooja publication , 2014 edition We get to know about different encoding algorithm such as Huffman coding technique etc . 5
  • 6. Data compression methods  Data compression means sending or storing a smaller number of bits. 6
  • 7. Lossless compression  In lossless data compression, the integrity of the data is preserved.  The original data and the data after compression and decompression are exactly the same because the compression and decompression algorithms are exactly the inverse of each other.  Example:  Run-length encoding  Huffman encoding 7
  • 8. Run-length Encoding  It does not need knowledge of the frequently of occurrence of symbols and can be very efficient if data are represented as 0s and 1s.  For example: 8
  • 9. Huffman coding  In Huffman coding, you assign shorter codes to symbols that occur more frequently and longer codes to those that occur less frequently.  For example: 9 Character A B C D E ------------------------------------------------------ Frequency 17 12 12 27 32
  • 10. Final Tree and Code 10
  • 11. Lossy compression methods  Loss of information is acceptable in a picture of video.  The reason is that our eyes and ears cannot distinguish subtle changes.  Loss of information is not acceptable in a text file or a program file.  For examples:  Joint photographic experts group (JPEG)  Motion picture experts group (MPEG) 11
  • 12. JPEG process  DTC: discrete cosine transform  Quantization  Compression 12
  • 13. Video compression--MPEG  MPEG method  Spatial compression  The spatial compression of each frame is done with JPEG.  Temporal compression  The temporal compression removes the redundant frames.  MPEG method first divides frames into three categories: I-frames, P-frames, B-frames. 13
  • 14. MPEG frames  I-frames: (intra-coded frame)  It is an independent frame that is not related to any other frame.  They are present at regular intervals.  I-frames are independent of other frames and cannot be constructed from other frames.  P-frames: (predicted frame)  It is related to the preceding I-frame or P-frame.  Each P-frame contains only the changes from the preceding frame.  P-frames can be constructed only from previous I- or P-frames.  B-frames: (bidirectional frame)  It is relative to the preceding and following I-frame or P-frame.  Each B-frame is relative to the past and the future.  A B-frame is never related to another B-frame. 14
  • 15. Applications  satellite imagery  mini discs  MP3 technology  fax  digital cameras  DVD technology  Modems  wireless telephony  database design  storage and transmission of CT and MRI scans  Mammography  digital images, high definition television (HDTV), and video games 15
  • 16. Conclusion And Future Scope  Conclusion Image coding based on models of human perception, scalability, robustness, error resilience, and complexity are a few of the many challenges in image coding to be fully resolved and may affect image data compression performance in the years to come.  Future Scope Data compression that make use of the archive data format for maintaining high security within the system using the encryption of the data packets. data compression increases the communication channel capacity. 16
  • 17. References  International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013 'Multimedia Data Compression Techniques‘  Sachin Dhawan-’A review of image compression and comparison of its algorithms, IJECT Vol. 2, Issue 1’  IEEE Xplore Lossless data compression techniques, Published in WESCON/94. Idea/Microelectronics. Conference Record  Wallace, G., The JPEG still picture compression standard, Communications of the ACM, 34 (199 ) 31-44. 17
  • 18. 18