SlideShare a Scribd company logo
1 of 37
Download to read offline
DATA COMPRESSION USING
HUFFMAN CODING
Rahul V. Khanwani
Roll No. 47
Department Of Computer Science
HUFFMAN CODING
• Huffman Coding Algorithm— a bottom-up
approach.
• The Huffman coding is a procedure to generate a
binary code tree. The algorithm invented by David
Huffman in 1952 ensures that the probability for
the occurrence of every symbol results in its code
length.
• Huffman coding could perform effective data
compression by reducing the amount of redundancy
in the coding of symbols.Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Huffman Coding Algorithm
1. Initialization: Put all symbols on a list sorted according
to their frequency counts.
2. Repeat until the list has only one symbol left:
1. From the list pick two symbols with the lowest frequency
counts
2. Form a Huffman sub-tree that has these two symbols as
child nodes and create a parent node.
3. Assign the sum of the children’s frequency counts to the
parent and insert it into the list such that the order is
maintained.
4. Delete the children from the list.
3. Assign a codeword for each leaf based on the path from
the root.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Example:
Symbol Count
A 15
B 7
C 6
D 6
E 5
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Constructing A Tree of Nodes Who
Has Minimum Occurance
(11)
D(6) E(5)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Constructing A Tree of Nodes Who
Has Minimum Occurance
17
C(6) (11)
D(6) E(5)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Re-Constructing A Tree of Nodes Who
Has Minimum Occurance
17
(13)
B(7) C(6)
(11)
D(6) E(5)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Re-Constructing A Tree of Nodes Who
Has Minimum Occurance
(39)
A(15) (24)
(13)
B(7) C(6)
(11)
D(6) E(5)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Huffman Coding Result
Symbol Count Bits
A 15 0
B 7 100
C 6 101
D 6 110
E 5 111
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Comparison Of Huffman And Shanon-
Fano Coding Algorithm
Symbol Count Shanon-
Fano
Bit Size
Huffman Bit
Size
Shanon
Fano Total
Bits
Huffman
Total Bits
A 15 2 1 30 15
B 7 2 3 14 21
C 6 2 3 12 18
D 6 3 3 18 18
E 5 3 3 15 15
Total 89 87
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Comparison Conclusion
• Shannon-Fano and Huffman coding are close in
performance.
• But Huffman coding will always at least equal the
efficiency of Shannon-Fano coding, so it has become
the predominant coding method of its type.
• both algorithms take a similar amount of processing
power.
• it seems sensible to take the one that gives slightly
better performance.
• Huffman was able to prove that this coding method
cannot be improved on with any other integral bit-
width coding stream.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Huffman Coding Types:
• The construction of a code tree for the
Huffman coding is based on a certain
probability distribution.
• Varies In Three Types:
– static probability distribution
– dynamic probability distribution
– adaptive probability distribution
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Static probability distribution
• Coding procedures with static Huffman codes
operate with a predefined code tree.
• Provided that the source data correspond to the
adopted frequency distribution, an acceptable
efficiency of the coding can be achieved.
• It is not necessary to store the Huffman tree or
the frequencies within the encoded data.
• It is sufficient to keep them available within the
encoder or decoder software.
• Additionally the coding tables do not need to be
generated at run-time.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Dynamic probability distribution
• Instead of a static tree being identical for any
type of data, a dynamic analysis of the
probability distribution could take place.
• Codes generated from these code trees match
the real conditions clearly better than standard
distributions.
• The major disadvantage of this procedure is,
that the information about the Huffman tree has
to be embedded into the compressed files or
data transmissions.
• A code table or the symbol's frequencies must
be part of the header data.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive probability distribution
• The adaptive coding procedure uses a code
tree that is permanently adapted to the
previously encoded or decoded data. Starting
with an empty tree or a standard
distribution.
• each encoded symbol will be used to refine
the code tree. This way a continuous
adaption will be achieved and local variations
will be compensated at run-time.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive probability distribution
• Adaptive Huffman codes initially using empty
trees operate with a special control character
identifying new symbols currently not being
part of the tree.
• This variant is characterized by its minimum
requirements for header data, but the
attainable compression rate is unfavourable
at the beginning of the coding or for small
files.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Extended Huffman Coding
• Extended Alphabet : For alphabet
S={s1,s2,...,sn}, if k symbols are grouped
together, then the extended alphabet is:
• Problem: If k is relatively large (e.g., k≥3), then
for most practical applications where n>1, k
implies a huge symbol table that is impractical.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive(Dynamic) Huffman Coding
• In adaptive Huffman Coding statistics are gathered and up-
dated dynamically as the data stream arrives.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive(Dynamic) Huffman Coding
1. Initial code : assigns symbols with some initially
agreed upon codes, without any prior knowledge
of the frequency counts.
2. Update tree : constructs an Adaptive Huffman tree.
It basically does two things:
1. increments the frequency counts for the symbols (includ-
ing any new ones).
2. updates the configuration of the tree.
3. The encoder and decoder must use exactly the
same initial code and update tree routines.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Notes on Adaptive Huffman Tree
Updating
• Nodes are numbered in order from left to
right, bottom to top. The numbers in
parentheses indicates the count.
• The tree must always maintain its sibling
property.
• When a swap is necessary, the farthest node
with count N is swapped with the node
whose count has just been increased to N+
1.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive Huffman Coding
Example: ABCDPAA
9.(9)
7.(4)
5.(2)
1.A: (1) 2.B: (1)
6.(2)
3.C: (1) 4.D: (1)
8.P.(5)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive Huffman Coding
Example: ABCDPAA
9.(9)
7.(4)
5.(2)
4.D: (1) 2.B: (1)
6.(2)
3.C: (1) 1.A: (2)
8.P.(5)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive Huffman Coding
Example: ABCDPAA
9.(9)
7.(4)
5.(2)
4.D: (1) 2.B: (1)
6.(2)
3.C: (1)
1.A:
(2+1)
8.P.(5)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive Huffman Coding
Example: ABCDPPPPPAA
9.(10)
7.(5+1)
6. (3)
4(2)
4.D: (1) 2.B: (1)
3.C: (1)
5.A: (3)
8.P(5)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Adaptive Huffman Coding
Example: ABCDPPPPPAA
9.(11)
7:p(5) 8.(6)
5.A(3) 6(3)
3.C(1) 4.(2)
1.D(1) 2.B(1)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Another Example: Adaptive Huffman
Coding
• This is to clearly illustrate more implementation
details. We show exactly what bits are sent, as
opposed to simply stating how the tree is
updated.
• An additional rule: if any character/symbol is to
be sent the first time, it must be preceded by a
special symbol, NEW.
• The initial code for NEW is 0. The count for NEW
is always kept as 0 (the count is never
increased);
• hence it is always denoted as NEW:(0)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(1)
NEW:0 A: (1)
(2)
NEW:0 A: (2)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(3)
A : (2)(1)
NEW:0 D: (1)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(4)
A: (2)(2)
(1)
NEW:0 C: (1)
D: (1)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(4)
A: (2)(2)
(1)
NEW:0 C: (1+1)
D: (1)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(4)
A: (2)(2+1)
(1)
NEW:0 D: (1)
C: (2)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(5)
A: (2) (3)
C : (2)(1)
NEW:0 D: (1)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(6)
A: (2) (4)
C : (2)(2)
NEW:0 D: (2)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(6)
A: (2) (4)
C : (2)(2)
NEW:0 D: (2+1)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Initial code assignment for AADCCDD
using adaptive Huffman coding.
(7)
D: (3) (4)
C : (2)(2)
NEW:0 A: (2)
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
Sequence of symbols and codes sent
to the decoder
Symb
ol
NEW A A NEW D NEW C C D D
Code 0000
0000
0000
0001
0000
0001
0000
0000
0000
0100
0000
0000
0000
0011
0000
0011
0000
0100
0000
0100
It is important to emphasize that the code for a
particular symbol changes during the adaptive
Huffman coding process.
Rahul Khanvani For More Visit Binarybuzz.wordpress.com
THANK YOU 
Rahul Khanvani For More Visit Binarybuzz.wordpress.com

More Related Content

What's hot

Computer architecture data representation
Computer architecture  data representationComputer architecture  data representation
Computer architecture data representationAnil Pokhrel
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipeliningMazin Alwaaly
 
Shannon-Fano algorithm
Shannon-Fano algorithmShannon-Fano algorithm
Shannon-Fano algorithmMANISH T I
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy checkSaleh Alrkiyan
 
Manchester & Differential Manchester encoding scheme
Manchester & Differential Manchester encoding schemeManchester & Differential Manchester encoding scheme
Manchester & Differential Manchester encoding schemeArunabha Saha
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image CompressionMathankumar S
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filteringGautam Saxena
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compressionasodariyabhavesh
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processingkiruthiammu
 
digital image processing
digital image processingdigital image processing
digital image processingAbinaya B
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication ServiceSwathy T
 
Intermediate code generator
Intermediate code generatorIntermediate code generator
Intermediate code generatorsanchi29
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform Rashmi Karkra
 

What's hot (20)

Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Computer architecture data representation
Computer architecture  data representationComputer architecture  data representation
Computer architecture data representation
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Lzw coding technique for image compression
Lzw coding technique for image compressionLzw coding technique for image compression
Lzw coding technique for image compression
 
Shannon-Fano algorithm
Shannon-Fano algorithmShannon-Fano algorithm
Shannon-Fano algorithm
 
Chapter 5 Syntax Directed Translation
Chapter 5   Syntax Directed TranslationChapter 5   Syntax Directed Translation
Chapter 5 Syntax Directed Translation
 
Graph coloring using backtracking
Graph coloring using backtrackingGraph coloring using backtracking
Graph coloring using backtracking
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
 
Manchester & Differential Manchester encoding scheme
Manchester & Differential Manchester encoding schemeManchester & Differential Manchester encoding scheme
Manchester & Differential Manchester encoding scheme
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
JPEG Image Compression
JPEG Image CompressionJPEG Image Compression
JPEG Image Compression
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Run length encoding
Run length encodingRun length encoding
Run length encoding
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processing
 
digital image processing
digital image processingdigital image processing
digital image processing
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
 
Intermediate code generator
Intermediate code generatorIntermediate code generator
Intermediate code generator
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform
 

Viewers also liked

Viewers also liked (20)

Adaptive Huffman Coding
Adaptive Huffman CodingAdaptive Huffman Coding
Adaptive Huffman Coding
 
Huffman codes
Huffman codesHuffman codes
Huffman codes
 
Huffman coding
Huffman codingHuffman coding
Huffman coding
 
Arithmetic Coding
Arithmetic CodingArithmetic Coding
Arithmetic Coding
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding
 
Huffman Student
Huffman StudentHuffman Student
Huffman Student
 
Huffman Encoding Pr
Huffman Encoding PrHuffman Encoding Pr
Huffman Encoding Pr
 
Shannon Fano
Shannon FanoShannon Fano
Shannon Fano
 
Data compression
Data compressionData compression
Data compression
 
Huffman data compression-decompression
Huffman data compression-decompressionHuffman data compression-decompression
Huffman data compression-decompression
 
Ch 04 Arithmetic Coding (Ppt)
Ch 04 Arithmetic Coding (Ppt)Ch 04 Arithmetic Coding (Ppt)
Ch 04 Arithmetic Coding (Ppt)
 
Text compression in LZW and Flate
Text compression in LZW and FlateText compression in LZW and Flate
Text compression in LZW and Flate
 
Image compression
Image compressionImage compression
Image compression
 
Image Compression
Image CompressionImage Compression
Image Compression
 
Image compression
Image compressionImage compression
Image compression
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
 
Hufman coding basic
Hufman coding basicHufman coding basic
Hufman coding basic
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Image processing and compression techniques
Image processing and compression techniquesImage processing and compression techniques
Image processing and compression techniques
 
Compression techniques
Compression techniquesCompression techniques
Compression techniques
 

Similar to Data compression huffman coding algoritham

Data compression introduction
Data compression introductionData compression introduction
Data compression introductionRahul Khanwani
 
ShaREing Is Caring
ShaREing Is CaringShaREing Is Caring
ShaREing Is Caringsporst
 
j001adcpresentation-2112170415 23.pdf
j001adcpresentation-2112170415      23.pdfj001adcpresentation-2112170415      23.pdf
j001adcpresentation-2112170415 23.pdfHarshSharma71048
 
Huffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh AgarwalHuffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh AgarwalEkansh Agarwal
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
 
The inner workings of Dynamo DB
The inner workings of Dynamo DBThe inner workings of Dynamo DB
The inner workings of Dynamo DBJonathan Lau
 
Compiler Construction
Compiler ConstructionCompiler Construction
Compiler ConstructionSarmad Ali
 
Compiler Design
Compiler DesignCompiler Design
Compiler DesignMir Majid
 
Introduction to compiler
Introduction to compilerIntroduction to compiler
Introduction to compilerAbha Damani
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compressionanithabalaprabhu
 
Huffman's Alforithm
Huffman's AlforithmHuffman's Alforithm
Huffman's AlforithmRoohaali
 

Similar to Data compression huffman coding algoritham (20)

Data compression introduction
Data compression introductionData compression introduction
Data compression introduction
 
ShaREing Is Caring
ShaREing Is CaringShaREing Is Caring
ShaREing Is Caring
 
j001adcpresentation-2112170415 23.pdf
j001adcpresentation-2112170415      23.pdfj001adcpresentation-2112170415      23.pdf
j001adcpresentation-2112170415 23.pdf
 
Huffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh AgarwalHuffman Algorithm and its Application by Ekansh Agarwal
Huffman Algorithm and its Application by Ekansh Agarwal
 
Huffman ppt
Huffman ppt Huffman ppt
Huffman ppt
 
Hash Coding
Hash CodingHash Coding
Hash Coding
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
Lossless
LosslessLossless
Lossless
 
Lossless
LosslessLossless
Lossless
 
Compiler1
Compiler1Compiler1
Compiler1
 
The inner workings of Dynamo DB
The inner workings of Dynamo DBThe inner workings of Dynamo DB
The inner workings of Dynamo DB
 
Compiler Construction
Compiler ConstructionCompiler Construction
Compiler Construction
 
Compiler Design
Compiler DesignCompiler Design
Compiler Design
 
Introduction to compiler
Introduction to compilerIntroduction to compiler
Introduction to compiler
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compression
 
Introduction
IntroductionIntroduction
Introduction
 
Introduction
IntroductionIntroduction
Introduction
 
Huffman's Alforithm
Huffman's AlforithmHuffman's Alforithm
Huffman's Alforithm
 
php.pptx
php.pptxphp.pptx
php.pptx
 
Introduction to php
Introduction to phpIntroduction to php
Introduction to php
 

More from Rahul Khanwani

Online examination system
Online examination systemOnline examination system
Online examination systemRahul Khanwani
 
Power goggling - To Search Easier On Google
Power goggling - To Search Easier On GooglePower goggling - To Search Easier On Google
Power goggling - To Search Easier On GoogleRahul Khanwani
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examplesRahul Khanwani
 
Entity relationship(er) model
Entity relationship(er) modelEntity relationship(er) model
Entity relationship(er) modelRahul Khanwani
 

More from Rahul Khanwani (7)

Online examination system
Online examination systemOnline examination system
Online examination system
 
Power goggling - To Search Easier On Google
Power goggling - To Search Easier On GooglePower goggling - To Search Easier On Google
Power goggling - To Search Easier On Google
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examples
 
Entity relationship(er) model
Entity relationship(er) modelEntity relationship(er) model
Entity relationship(er) model
 
Cryptography
CryptographyCryptography
Cryptography
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Google glass
Google glassGoogle glass
Google glass
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Data compression huffman coding algoritham

  • 1. DATA COMPRESSION USING HUFFMAN CODING Rahul V. Khanwani Roll No. 47 Department Of Computer Science
  • 2. HUFFMAN CODING • Huffman Coding Algorithm— a bottom-up approach. • The Huffman coding is a procedure to generate a binary code tree. The algorithm invented by David Huffman in 1952 ensures that the probability for the occurrence of every symbol results in its code length. • Huffman coding could perform effective data compression by reducing the amount of redundancy in the coding of symbols.Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 3. Huffman Coding Algorithm 1. Initialization: Put all symbols on a list sorted according to their frequency counts. 2. Repeat until the list has only one symbol left: 1. From the list pick two symbols with the lowest frequency counts 2. Form a Huffman sub-tree that has these two symbols as child nodes and create a parent node. 3. Assign the sum of the children’s frequency counts to the parent and insert it into the list such that the order is maintained. 4. Delete the children from the list. 3. Assign a codeword for each leaf based on the path from the root. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 4. Example: Symbol Count A 15 B 7 C 6 D 6 E 5 Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 5. Constructing A Tree of Nodes Who Has Minimum Occurance (11) D(6) E(5) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 6. Constructing A Tree of Nodes Who Has Minimum Occurance 17 C(6) (11) D(6) E(5) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 7. Re-Constructing A Tree of Nodes Who Has Minimum Occurance 17 (13) B(7) C(6) (11) D(6) E(5) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 8. Re-Constructing A Tree of Nodes Who Has Minimum Occurance (39) A(15) (24) (13) B(7) C(6) (11) D(6) E(5) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 9. Huffman Coding Result Symbol Count Bits A 15 0 B 7 100 C 6 101 D 6 110 E 5 111 Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 10. Comparison Of Huffman And Shanon- Fano Coding Algorithm Symbol Count Shanon- Fano Bit Size Huffman Bit Size Shanon Fano Total Bits Huffman Total Bits A 15 2 1 30 15 B 7 2 3 14 21 C 6 2 3 12 18 D 6 3 3 18 18 E 5 3 3 15 15 Total 89 87 Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 11. Comparison Conclusion • Shannon-Fano and Huffman coding are close in performance. • But Huffman coding will always at least equal the efficiency of Shannon-Fano coding, so it has become the predominant coding method of its type. • both algorithms take a similar amount of processing power. • it seems sensible to take the one that gives slightly better performance. • Huffman was able to prove that this coding method cannot be improved on with any other integral bit- width coding stream. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 12. Huffman Coding Types: • The construction of a code tree for the Huffman coding is based on a certain probability distribution. • Varies In Three Types: – static probability distribution – dynamic probability distribution – adaptive probability distribution Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 13. Static probability distribution • Coding procedures with static Huffman codes operate with a predefined code tree. • Provided that the source data correspond to the adopted frequency distribution, an acceptable efficiency of the coding can be achieved. • It is not necessary to store the Huffman tree or the frequencies within the encoded data. • It is sufficient to keep them available within the encoder or decoder software. • Additionally the coding tables do not need to be generated at run-time. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 14. Dynamic probability distribution • Instead of a static tree being identical for any type of data, a dynamic analysis of the probability distribution could take place. • Codes generated from these code trees match the real conditions clearly better than standard distributions. • The major disadvantage of this procedure is, that the information about the Huffman tree has to be embedded into the compressed files or data transmissions. • A code table or the symbol's frequencies must be part of the header data. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 15. Adaptive probability distribution • The adaptive coding procedure uses a code tree that is permanently adapted to the previously encoded or decoded data. Starting with an empty tree or a standard distribution. • each encoded symbol will be used to refine the code tree. This way a continuous adaption will be achieved and local variations will be compensated at run-time. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 16. Adaptive probability distribution • Adaptive Huffman codes initially using empty trees operate with a special control character identifying new symbols currently not being part of the tree. • This variant is characterized by its minimum requirements for header data, but the attainable compression rate is unfavourable at the beginning of the coding or for small files. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 17. Extended Huffman Coding • Extended Alphabet : For alphabet S={s1,s2,...,sn}, if k symbols are grouped together, then the extended alphabet is: • Problem: If k is relatively large (e.g., k≥3), then for most practical applications where n>1, k implies a huge symbol table that is impractical. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 18. Adaptive(Dynamic) Huffman Coding • In adaptive Huffman Coding statistics are gathered and up- dated dynamically as the data stream arrives. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 19. Adaptive(Dynamic) Huffman Coding 1. Initial code : assigns symbols with some initially agreed upon codes, without any prior knowledge of the frequency counts. 2. Update tree : constructs an Adaptive Huffman tree. It basically does two things: 1. increments the frequency counts for the symbols (includ- ing any new ones). 2. updates the configuration of the tree. 3. The encoder and decoder must use exactly the same initial code and update tree routines. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 20. Notes on Adaptive Huffman Tree Updating • Nodes are numbered in order from left to right, bottom to top. The numbers in parentheses indicates the count. • The tree must always maintain its sibling property. • When a swap is necessary, the farthest node with count N is swapped with the node whose count has just been increased to N+ 1. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 21. Adaptive Huffman Coding Example: ABCDPAA 9.(9) 7.(4) 5.(2) 1.A: (1) 2.B: (1) 6.(2) 3.C: (1) 4.D: (1) 8.P.(5) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 22. Adaptive Huffman Coding Example: ABCDPAA 9.(9) 7.(4) 5.(2) 4.D: (1) 2.B: (1) 6.(2) 3.C: (1) 1.A: (2) 8.P.(5) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 23. Adaptive Huffman Coding Example: ABCDPAA 9.(9) 7.(4) 5.(2) 4.D: (1) 2.B: (1) 6.(2) 3.C: (1) 1.A: (2+1) 8.P.(5) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 24. Adaptive Huffman Coding Example: ABCDPPPPPAA 9.(10) 7.(5+1) 6. (3) 4(2) 4.D: (1) 2.B: (1) 3.C: (1) 5.A: (3) 8.P(5) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 25. Adaptive Huffman Coding Example: ABCDPPPPPAA 9.(11) 7:p(5) 8.(6) 5.A(3) 6(3) 3.C(1) 4.(2) 1.D(1) 2.B(1) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 26. Another Example: Adaptive Huffman Coding • This is to clearly illustrate more implementation details. We show exactly what bits are sent, as opposed to simply stating how the tree is updated. • An additional rule: if any character/symbol is to be sent the first time, it must be preceded by a special symbol, NEW. • The initial code for NEW is 0. The count for NEW is always kept as 0 (the count is never increased); • hence it is always denoted as NEW:(0) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 27. Initial code assignment for AADCCDD using adaptive Huffman coding. (1) NEW:0 A: (1) (2) NEW:0 A: (2) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 28. Initial code assignment for AADCCDD using adaptive Huffman coding. (3) A : (2)(1) NEW:0 D: (1) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 29. Initial code assignment for AADCCDD using adaptive Huffman coding. (4) A: (2)(2) (1) NEW:0 C: (1) D: (1) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 30. Initial code assignment for AADCCDD using adaptive Huffman coding. (4) A: (2)(2) (1) NEW:0 C: (1+1) D: (1) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 31. Initial code assignment for AADCCDD using adaptive Huffman coding. (4) A: (2)(2+1) (1) NEW:0 D: (1) C: (2) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 32. Initial code assignment for AADCCDD using adaptive Huffman coding. (5) A: (2) (3) C : (2)(1) NEW:0 D: (1) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 33. Initial code assignment for AADCCDD using adaptive Huffman coding. (6) A: (2) (4) C : (2)(2) NEW:0 D: (2) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 34. Initial code assignment for AADCCDD using adaptive Huffman coding. (6) A: (2) (4) C : (2)(2) NEW:0 D: (2+1) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 35. Initial code assignment for AADCCDD using adaptive Huffman coding. (7) D: (3) (4) C : (2)(2) NEW:0 A: (2) Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 36. Sequence of symbols and codes sent to the decoder Symb ol NEW A A NEW D NEW C C D D Code 0000 0000 0000 0001 0000 0001 0000 0000 0000 0100 0000 0000 0000 0011 0000 0011 0000 0100 0000 0100 It is important to emphasize that the code for a particular symbol changes during the adaptive Huffman coding process. Rahul Khanvani For More Visit Binarybuzz.wordpress.com
  • 37. THANK YOU  Rahul Khanvani For More Visit Binarybuzz.wordpress.com