SlideShare a Scribd company logo
• Data compression implies sending or storing a smaller number of bits.
Lossless Compression
In lossless data compression, the integrity of the data is preserved.
The original data and the data after compression and decompression are exactly the same because,
in these methods, the compression and decompression algorithms are exact inverses of each other:
no part of the data is lost in the process.
Redundant data is removed in compression and added during decompression. Lossless
compression methods are normally used when we cannot afford to lose any data.
Lossless Compression: Examples
• Text Compression
• It is very important that the reconstruction is identical to the text
original, as very small differences can result in statements with very
different meanings.
Consider the sentences “Do not send money” and
“Do now send money.”
Lossless Compression: Examples
 suppose we compressed a radiological image in a lossy fashion, and the
difference between the reconstruction and the original was visually
undetectable.
 If this image was later enhanced, the previously undetectable differences
may cause the appearance of artifacts that could seriously mislead the
radiologist
Lossless Compression: Examples
• Data obtained from satellites often are processed later to obtain
different numerical indicators of vegetation, deforestation, and so on.
• If the reconstructed data are not identical to the original data,
processing may result in “enhancement” of the differences.
• It may not be possible to go back and obtain the same data over
again
Lossy Compression
• Lossy compression techniques involve some loss of information, and data
that have been compressed using lossy techniques generally cannot be
recovered or reconstructed exactly.
• In many applications, this lack of exact reconstruction is not a problem.
• For example, when storing or transmitting speech, the exact value of each
sample of speech is not necessary.
• Similarly, when viewing a reconstruction of a video sequence, the fact that
the reconstruction is different from the original is generally not important
as long as the differences do not result in annoying artifacts.
• Thus, video is generally compressed using lossy compression.
Performance of data compression technique
• (i) Compression ratio
• (ii) Distortion
• (iii) Compression rate
• (iv) Fidelity and Quality
• (v) Self Information
Compression ratio:
• The ratio of the number of bits required to represent the data before
compression to the number of bits required to represent the data
after compression.
• Ex. Suppose storing n image requires 65536 bytes, this image is
compressed and the compressed version requires 16384 bytes.
• Compression Ratio=Bits required before compression / Bits required after compression
= 65536/16384 = 4
• So the compression ratio is 4:1.
• It can be also represented in terms of reduction in the amount of data
required as a percentage i.e 75%
• ie =( (4-1)/4)*100= 75
Distortion
• The difference between the original and the
reconstruction is called as ‘Distortion’.
• Lossy techniques are generally used for the compression
of data that originate as analog signals, such as speech
and video.
• Absolute difference measure
d(x,y)= | x-y |
Squared error measure
d(x,y)=(x-y)2
Compression rate
•
• It is the average number of bits required to represent a
single sample
• Ex. In the case of the compressed image if we assume 8
bits per byte (or pixel) the average number of bits per
pixel in the compressed representation is 2.
• Thus we would say that the compression rate is 2 bits/
pixel
Fidelity and Quality:
• The difference between the reconstruction and the
are fidelity and quality.
• When we say that the fidelity or quality of a
is high, we mean that the difference between the
reconstruction and the original is small.
• Whether the difference is a mathematical or a perceptual
difference should be evident from the context
Ex. The barking of a dog during a burglary is a high probability event and therefore does
not contain too much information theory. However if the dog did not bark furring a
burglary, this is a low-probability event and contains a lot of information.
Phases of Compression
• Modeling
• Coding
• Modelling suppose we need to compress a file
111222233
132432
• Coding
132432
10 1110 110 11110 1110 110
If we were to transmit or store the binary representations of these numbers, we would need to use 5 bits per
sample. The structure in the data can be characterized by an equation
CASE 1
• The difference between the data and the model. The difference (or residual) is given by
the
• 010 −1 1 −101 −1 −111
• The residual sequence consists of only three numbers −1 0 1.
• Assign a code of 00 to −1,
• a code of 01 to 0,
• and a code of 10 to 1,
• 01 10 01 00 10 00 01 10 00 00 10 10
• so need to use 2 bits to represent each element of the residual sequence.
• Therefore, compression can be obtained by transmitting or storing the parameters of the
model and the residual sequence
• The sequence does not seem to follow a simple law as in the previous case.
• Each value is close to the previous value.
• Suppose we send the first value, then in place of subsequent values we send
the difference between it and the previous value.
CASE 2
The sequence of transmitted values would be
• The number of distinct values has been reduced.
• Fewer bits are required to represent each number and compression is achieved.
• The decoder adds each received value to the previous decoded value to obtain the
reconstruction corresponding to the received value.
• Techniques that use the past values of a sequence to predict the current value and then encode
the error in prediction, or residual, are called predictive coding schemes

More Related Content

Similar to dc module1 part 1.pptx

Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and videosangusajjan
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
Pradip Kumar
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and stegano
Kavya P K
 
ImageCompression.ppt
ImageCompression.pptImageCompression.ppt
ImageCompression.ppt
dudoo1
 
ImageCompression.ppt
ImageCompression.pptImageCompression.ppt
ImageCompression.ppt
ssuser6d1fca
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
Hossain Md Shakhawat
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
Saurabh Nambiar
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introductionsangusajjan
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
theem college of engineering
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Image Security
Image SecurityImage Security
Image Security
Satyendra Rajput
 
notes_Image Compression_edited.ppt
notes_Image Compression_edited.pptnotes_Image Compression_edited.ppt
notes_Image Compression_edited.ppt
HarisMasood20
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
HarisMasood20
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
HarisMasood20
 
WT in IP.ppt
WT in IP.pptWT in IP.ppt
WT in IP.ppt
viveksingh19210115
 
image compression in data compression
image compression in data compressionimage compression in data compression
image compression in data compression
Zaabir Ali
 
Source coding
Source codingSource coding
Source coding
MOHIT KUMAR
 

Similar to dc module1 part 1.pptx (20)

Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and stegano
 
ImageCompression.ppt
ImageCompression.pptImageCompression.ppt
ImageCompression.ppt
 
ImageCompression.ppt
ImageCompression.pptImageCompression.ppt
ImageCompression.ppt
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introduction
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Image Security
Image SecurityImage Security
Image Security
 
notes_Image Compression_edited.ppt
notes_Image Compression_edited.pptnotes_Image Compression_edited.ppt
notes_Image Compression_edited.ppt
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
 
Compressionbasics
CompressionbasicsCompressionbasics
Compressionbasics
 
Image compression
Image compressionImage compression
Image compression
 
WT in IP.ppt
WT in IP.pptWT in IP.ppt
WT in IP.ppt
 
image compression in data compression
image compression in data compressionimage compression in data compression
image compression in data compression
 
Source coding
Source codingSource coding
Source coding
 

More from AzmiNizar1

myofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptxmyofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptx
AzmiNizar1
 
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdfBiochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
AzmiNizar1
 
Vaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunologyVaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunology
AzmiNizar1
 
Vaginal Bleeding .pptx
Vaginal Bleeding .pptxVaginal Bleeding .pptx
Vaginal Bleeding .pptx
AzmiNizar1
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptx
AzmiNizar1
 
1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf
AzmiNizar1
 
Checkpointing.pptx
Checkpointing.pptxCheckpointing.pptx
Checkpointing.pptx
AzmiNizar1
 
Genetic Algorithm (1).pdf
Genetic Algorithm (1).pdfGenetic Algorithm (1).pdf
Genetic Algorithm (1).pdf
AzmiNizar1
 
Chapter9.pdf
Chapter9.pdfChapter9.pdf
Chapter9.pdf
AzmiNizar1
 
L20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.pptL20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.ppt
AzmiNizar1
 

More from AzmiNizar1 (10)

myofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptxmyofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptx
 
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdfBiochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
 
Vaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunologyVaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunology
 
Vaginal Bleeding .pptx
Vaginal Bleeding .pptxVaginal Bleeding .pptx
Vaginal Bleeding .pptx
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptx
 
1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf
 
Checkpointing.pptx
Checkpointing.pptxCheckpointing.pptx
Checkpointing.pptx
 
Genetic Algorithm (1).pdf
Genetic Algorithm (1).pdfGenetic Algorithm (1).pdf
Genetic Algorithm (1).pdf
 
Chapter9.pdf
Chapter9.pdfChapter9.pdf
Chapter9.pdf
 
L20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.pptL20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.ppt
 

Recently uploaded

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 

Recently uploaded (20)

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 

dc module1 part 1.pptx

  • 1.
  • 2.
  • 3.
  • 4. • Data compression implies sending or storing a smaller number of bits.
  • 5. Lossless Compression In lossless data compression, the integrity of the data is preserved. The original data and the data after compression and decompression are exactly the same because, in these methods, the compression and decompression algorithms are exact inverses of each other: no part of the data is lost in the process. Redundant data is removed in compression and added during decompression. Lossless compression methods are normally used when we cannot afford to lose any data.
  • 6. Lossless Compression: Examples • Text Compression • It is very important that the reconstruction is identical to the text original, as very small differences can result in statements with very different meanings. Consider the sentences “Do not send money” and “Do now send money.”
  • 7. Lossless Compression: Examples  suppose we compressed a radiological image in a lossy fashion, and the difference between the reconstruction and the original was visually undetectable.  If this image was later enhanced, the previously undetectable differences may cause the appearance of artifacts that could seriously mislead the radiologist
  • 8. Lossless Compression: Examples • Data obtained from satellites often are processed later to obtain different numerical indicators of vegetation, deforestation, and so on. • If the reconstructed data are not identical to the original data, processing may result in “enhancement” of the differences. • It may not be possible to go back and obtain the same data over again
  • 9. Lossy Compression • Lossy compression techniques involve some loss of information, and data that have been compressed using lossy techniques generally cannot be recovered or reconstructed exactly. • In many applications, this lack of exact reconstruction is not a problem. • For example, when storing or transmitting speech, the exact value of each sample of speech is not necessary. • Similarly, when viewing a reconstruction of a video sequence, the fact that the reconstruction is different from the original is generally not important as long as the differences do not result in annoying artifacts. • Thus, video is generally compressed using lossy compression.
  • 10.
  • 11. Performance of data compression technique • (i) Compression ratio • (ii) Distortion • (iii) Compression rate • (iv) Fidelity and Quality • (v) Self Information
  • 12. Compression ratio: • The ratio of the number of bits required to represent the data before compression to the number of bits required to represent the data after compression. • Ex. Suppose storing n image requires 65536 bytes, this image is compressed and the compressed version requires 16384 bytes. • Compression Ratio=Bits required before compression / Bits required after compression = 65536/16384 = 4 • So the compression ratio is 4:1. • It can be also represented in terms of reduction in the amount of data required as a percentage i.e 75% • ie =( (4-1)/4)*100= 75
  • 13. Distortion • The difference between the original and the reconstruction is called as ‘Distortion’. • Lossy techniques are generally used for the compression of data that originate as analog signals, such as speech and video. • Absolute difference measure d(x,y)= | x-y | Squared error measure d(x,y)=(x-y)2
  • 14.
  • 15. Compression rate • • It is the average number of bits required to represent a single sample • Ex. In the case of the compressed image if we assume 8 bits per byte (or pixel) the average number of bits per pixel in the compressed representation is 2. • Thus we would say that the compression rate is 2 bits/ pixel
  • 16.
  • 17. Fidelity and Quality: • The difference between the reconstruction and the are fidelity and quality. • When we say that the fidelity or quality of a is high, we mean that the difference between the reconstruction and the original is small. • Whether the difference is a mathematical or a perceptual difference should be evident from the context
  • 18.
  • 19. Ex. The barking of a dog during a burglary is a high probability event and therefore does not contain too much information theory. However if the dog did not bark furring a burglary, this is a low-probability event and contains a lot of information.
  • 20.
  • 21. Phases of Compression • Modeling • Coding
  • 22.
  • 23. • Modelling suppose we need to compress a file 111222233 132432
  • 24.
  • 25. • Coding 132432 10 1110 110 11110 1110 110
  • 26. If we were to transmit or store the binary representations of these numbers, we would need to use 5 bits per sample. The structure in the data can be characterized by an equation CASE 1
  • 27. • The difference between the data and the model. The difference (or residual) is given by the • 010 −1 1 −101 −1 −111 • The residual sequence consists of only three numbers −1 0 1. • Assign a code of 00 to −1, • a code of 01 to 0, • and a code of 10 to 1, • 01 10 01 00 10 00 01 10 00 00 10 10 • so need to use 2 bits to represent each element of the residual sequence. • Therefore, compression can be obtained by transmitting or storing the parameters of the model and the residual sequence
  • 28.
  • 29. • The sequence does not seem to follow a simple law as in the previous case. • Each value is close to the previous value. • Suppose we send the first value, then in place of subsequent values we send the difference between it and the previous value. CASE 2
  • 30. The sequence of transmitted values would be • The number of distinct values has been reduced. • Fewer bits are required to represent each number and compression is achieved. • The decoder adds each received value to the previous decoded value to obtain the reconstruction corresponding to the received value. • Techniques that use the past values of a sequence to predict the current value and then encode the error in prediction, or residual, are called predictive coding schemes