SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal For Research & Development in Technology
Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585
8 Copyright 2014- IJRDT www.ijrdt.org
Efficiency of Entropy Coding as well as
Dictionary based Technique for Lossless Data
Compression
Pradeep S R 1
,Prathibha S R 2
, Monikashree T S 3
1,2,3
PG Student
pradeepsr09@gmail.com 1
, prathi52@gmail.com 2
, monikashree.ts@gmail.com
1
Department of PG Studies, V T U, Gulbarga, Karnataka, India.
2
Sri Siddartha Institute of Technology, Tumkur, Karnataka, India.
3
Dr. Ambedkar Institute of Technology, Bangalore, Karnataka, India.
Abstract: Communication is exchange of information
between the devices, which very important in today's life.
Communication is wide utilized in all fields, such as
telephone, television, weather forecasting and etc. There
are different kinds of communication techniques. All the
data which have to be transmitted has to be compressed in
order to send more and more data. Communication is one
of the main processes in many domains, but to send the
information, the data has to be compressed, so that more
and more data can be transmitted. In this paper presented
the concept of data compression technique has been
explained, which also includes efficiency of entropy and
dictionary based techniques of lossless data type. And also
include the merits and demerits, coding complexity,
decoding capability and compression ratio of both entropy
and dictionary based compression technique. Even it
includes Huffman coding has been explained clearly using
flowchart and implemented for a bit map image and
encrypted and decrypted the image.
Keywords— Entropy, Huffman coding, Encryption,
Decryption
I.INTRODUCTION
Data Compression is one of most important technique used
in multimedia technology for transferring the video, audio
or any text information from one place to another. Data
compression algorithms are mainly used to reduce the
number of bits required to represent the image or video or
audio information. There is two parts in data compression
i.e. compression and reconstruction. Based on
reconstruction there are two algorithms i.e. lossless
compression and lossy compression.
Lossless data compression allows exact data to be
reconstructed from compressed data. Whereas the lossy data
compression allows similar data to be reconstructed from
compressed data but not identical as original.
This chapter involves the debate on the efficiency of
entropy as well as dictionary based technique for lossless
data compression, efficient usage of data types, merits and
demerits of the both techniques, coding complexity,
decoding capability, compression ratio.
1.1Efficient usage of the data types (text, images, etc.)
Entropy and Dictionary based techniques are two types
under the lossless data compression. Huffman coding is an
entropy type data compression technique. Huffman coding
is based on the frequency of occurrence of a data item i.e.
pixel in images. The technique is to use a lower number of
bits to encode the data in to binary codes that occur more
frequently. It works better for JPEG image format. LZW is a
dictionary based type data compression technique. LZW
replaces strings of characters with single code. LZW
algorithm works best for files containing lots of repetitive
data. This is suited for text and monochrome images like
Tagged Image File Format (TIFF) and Graphic Interface
Format (GIF). It is not suited for an image that doesn‟t have
repetitive data [1].
1.2 Merits and Demerits of two techniques.
1.2.1 Merits and Demerits of Entropy coding.
Huffman coding is one of the most popular compression
methods of entropy coding, which translate fixed-size pieces
of input data into variable-length symbols. Huffman coding
is widely used of its simplicity, high speed and lack of
difficulty. Produces lossless compressions of images [1].
All the codes of encoded data are of different size, therefore
it is difficult to for decoder to know whether last of bit of
code has reached or not. Thus encoded output mat be
corrupted and final image may not be same as original,
hence need to send Huffman table at beginning of
compressed file hence it is slow in compression [1].
International Journal For Research & Development in Technology
Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585
9 Copyright 2014- IJRDT www.ijrdt.org
1.2.2 Merits and Demerits of Dictionary based coding
LZW is one type of Dictionary based algorithm which
replaces the strings of characters with single codes. LZW
compression is the best technique for reducing the size of
files containing more repetitive data. LZW compression is
fast and simple to apply. Since this is a lossless compression
technique, none of the contents in the file are lost during or
after compression. And it need not pass the dictionary table
to decompression code [1].
LZW is suitable of the image having the repetitive data, but
if the image contains different data, then size of compressed
file by the LZW will be larger. Hence the LZW is not
suitable for the images of different data. It is very expensive
to use [1].
1.3 Coding complexity
The term coding complexity refers to the ability of each
lossless data compression techniques, the coding complexity
for the entropy method is less as compared to the dictionary
algorithm, however the technique which has more
complexity is the arithmetic coding than the Huffman
coding in entropy method. The one major disadvantage in
lossless data compression is that by increasing the sizes of
the search buffer and the look-ahead buffer will resolve the
problems. A close look, reveals that it also leads to increases
in the number of bits required to encode the offset and
matched the corresponding string as well as increasing the
length and increasing the processing complexity. Hence the
there is less coding complexity in the entropy type
compared to the dictionary algorithms. Therefore the
complexity of a string is the length of the string's shortest
description is fixed [2].
1.4 Decoding capability
Decoding mainly refers to reduction of the probability of
errors by repetition of messages in transmission by using
redundancy. Decoding capability holds good for the
dictionary type of algorithm as they offer good compression
and decompression for the data [2]. When compared with
the encoding algorithm the decoding becomes difficult as
the code length present in entropy methods is different.
Since the decoder knows the rule applied in the encoding, it
can reconstruct the dictionary and decode the input text
stream from the received string. Whereas there is no look
ahead possible in entropy method making the method less
capable for decoding. Decoding makes the job simpler as
there is no need for string comparison required in dictionary
type of algorithms [3].
1.5 Compression Ratio
Data compression techniques are specifically dependent on
the type of data that has to be compressed and on the desired
performance. Typical measures of performances are time
and space complexity, compression ratio is used to quantify
the reduction in data-representation size produced by a data
compression algorithms. Compression ratio is the main
constraint being involved during comparison of each
technique‟s efficiency. The compression ratio is basically
given as the ratio of compressed size versus the
uncompressed size of data may be for an image or data it is
represented the same [4]. As discussed before about the
decoding capacity the efficiency of the dictionary type
technique increases as there is good compression and
decompression possible utilizing less
memory space. While considering the entropy type of
algorithms like Huffman coding and arithmetic coding the
RAM space is more hence this in turn implies that the
compression ratio is also high for these techniques. The
dictionary based algorithms have less compression ratio and
are used in image compression like Graphic Interface
Format (GIF) [4].
II.PROPOSED WORK
Data compression is a technique which reduces the number
of bits to transmit and represent the required information i.e.
video, audio, data signal and etc. There are two techniques
in data compression i.e. lossless and lossy data compression.
Huffman coding is type of lossless data compression
technique. This compresses the required information and
reconstructs information exactly as original. Using this
technique the codes are generated which is known as
Huffman codes and these codes are prefix codes which is
best for the particular image or model. Huffman technique is
based on the two observations.
 The symbols that occur more frequently have less
codeword rather than the symbols that occur less
frequently.
 The same symbol that occurs less frequently has
the same length of codeword.
These code words of particular probability of color are
replaced in image, in place of pixels of a particular color.
Initially the bits require to represent the color will be more,
but by using this technique less number of bits will be
required to represent the color and transmit.
A) Flow Chart to describe the logic of Huffman coding
The figure 1 shows the flow chart of encryption part of the
Huffman coding for a bit map image. Here initially image is
either can be created or directly read the created image, then
the probability of each colour is calculated by ratio of total
number of pixels of particular color to the total number of
pixels of whole image. Then the probabilities of all color are
assigned to the variable i.e. „p‟. Then while condition is
considered to check and repeat the while loop until the
length of „p‟ is greater than 1. Firstly the length of „p‟ is
usually greater than one, hence it satisfies the condition and
enters the loop. Then the probabilities in „p‟ is arranged in
descending order and sums the least two probabilities. Then
International Journal For Research & Development in Technology
Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585
10 Copyright 2014- IJRDT www.ijrdt.org
the length of „p‟ is reduced by 1 and assigns the sum value
to least place in „p‟. Again the loop repeats until the length
of „p‟ becomes equal to 2. The code words for each
probability is generated, logic for the code word generation
is mentioned in code, which is in appendix. Then these
generated code words of particular color probability are
replaced in the each pixel value of that particular color.
Then the both encrypted image and code word table is
transmitted to the receiver part.
start
create/read
image
calculate the probabilities
of an colors & assign to 'p'
while(length(p)>1)
arrange p in descending
order & add least 2
probabilities
reduce the length of p by 1
and assign sum value to
least place
generate the code words
for each probability
replace code word of
particular color probability
in particular pixel of color
A
Fig.1: Flow chart of encrypted part
The figure 2 illustrates the flowchart of the decryption on
image in Huffman coding. The code word table and
encrypted image sent by the transmitter is received and
replaces the original color intensity value with respect to the
particular code word of color probability.
Fig.2: Flow chart of decryption of the image
III.RESULT ANALYSIS
Fig.3: Output of Original Image
red_prob = 0.2400
grn_prob = 0.1600
blu_prob = 0.3600
blk_prob = 0.2400
The figure 3 illustrates the original image, which has four
colors i.e. red, green, blue and black. Huffman coding
procedure is applied for above image. Initially the total
probability of each color is calculated, which is calculated
International Journal For Research & Development in Technology
Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585
11 Copyright 2014- IJRDT www.ijrdt.org
by dividing the total number of pixels of each color by the
total number of pixels in a whole image. The probability
values of colors of above image are shown above.
pp1 = 0.3600 0.2400 0.2400 0.1600
pp2 = 0.4000 0.3600 0.2400
pp3 = 0.6000 0.4000
All the probabilities are assigned to a variable and arranged
in descending order. And least two probabilities of variable
are added and length of variable is reduced by 1 and assigns
the all probabilities to new variable, then assigns the sum
value in last place of new variable. And this is repeated until
the length of new variable is equal to two, as shown above.
s1 = 11 = blue
s2 = 10 = red
s3 = 01 = black
s4 = 00 = green
Fig.4: Output of Encrypted Image
The symbol for each probability is generated which is
shown above i.e. s1, s2, s3, s4. These symbols are known as
code words which are replaced in the each pixel value of
that particular color. Then a resultant image is known as the
encrypted image which is shown in figure 4.
� 𝑒� 𝑔𝑡 ℎ(� 𝑟� 𝑏 )
Entropy = − prob k log2 .∗ prob(k)� =1
= 5.8099
Efficiency = 100-redundancy= 94 %
The figure 5 illustrates the decryption of the
encrypted image. The code words which have been replaced
in the image have been replaced by the original intensity
value and reconstruct the original image as shown image in
figure 5.
Fig.5: Output of Decrypted Image
IV.APPLICATIONS
1. Suppression of zero's in a file (Zero Length Suppression).
2. Silence in audio data, or pauses in conversation etc.
3. Bitmaps
4. Blanks in text or program source files
5. Backgrounds in images
6. Other regular image or data tokens
V.ADVANTAGES & DISADVANTAGES
ADVANTAGES
 Algorithm is easy to implement
 Produce a lossless compression of images
DISADVANTAGES
 Efficiency depends on the accuracy of the
statistical model used and a type of image.
 Algorithm varies with different formats,
but few get any better than 8:1
compression.
VI.CONCLUSION
Lossless data compression technique is better than the lossy
data, since it allows reconstructing the image or information
similar to the original information. Entropy technique is
= 1.9419
Average length = Prob. of symbol x No. of bits to
represent symbol
= 2
Redundancy = (Entropy-Average length)*100
slow compare to the dictionary based technique since it has
to send the symbol table to receiver part.
Huffman coding is type of lossless data compression
technique which generates the code words and replaces
those code words in the original image in order to compress
International Journal For Research & Development in Technology
Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585
12 Copyright 2014- IJRDT www.ijrdt.org
the image and reduce the size of the image to transmit. It is
used in JPEG compression. It produces optimal and
compact code but relatively slow since it has to send code
table also.
REFERENCE
[1] 'Compression Using Huffman Coding',Mamta Sharma,
S.L. Bawa D.A.V. college.
[2] Pu, I.M., 2006, Fundamental Data Compression,
Elsevier, Britain.
[3] T.C.Bell, J.G. Cleary, and I.H. Written., Text
Compression, Advanced Reference Series. Prentice Hall,
Englewood Cliffs, NJ, 1990.
[4] Lossless Data Compression. Recommendation for Space
Data Systems Standards, CCSDS 121.0-B-1. Blue
Book. Issue 1. Washington, D.C.: CCSDS, May 1997.
[5] S.R. KODITUWAKKU, U. S.AMARASINGHE,
“Comparison Of Lossless Data Compression Algorithms
For Text Data” Indian Journal of Computer Science and
Engineering, Vol 1 No 4 416-425.pp 416 -425

More Related Content

What's hot

IRJET-Market Basket Analysis based on Frequent Itemset Mining
IRJET-Market Basket Analysis based on Frequent Itemset MiningIRJET-Market Basket Analysis based on Frequent Itemset Mining
IRJET-Market Basket Analysis based on Frequent Itemset MiningIRJET Journal
 
Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...ijitjournal
 
Text Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsEditor IJCATR
 
Introduction for Data Compression
Introduction for Data Compression Introduction for Data Compression
Introduction for Data Compression MANISH T I
 
IRJET- On-Screen Translator using NLP and Text Detection
IRJET- On-Screen Translator using NLP and Text DetectionIRJET- On-Screen Translator using NLP and Text Detection
IRJET- On-Screen Translator using NLP and Text DetectionIRJET Journal
 
4 data compression
4 data compression4 data compression
4 data compressionRejin Thomas
 
Develop and design hybrid genetic algorithms with multiple objectives in data...
Develop and design hybrid genetic algorithms with multiple objectives in data...Develop and design hybrid genetic algorithms with multiple objectives in data...
Develop and design hybrid genetic algorithms with multiple objectives in data...khalil IBRAHIM
 
Data compression & Classification
Data compression & ClassificationData compression & Classification
Data compression & ClassificationKhulna University
 
Sentiment analysis by deep learning approaches
Sentiment analysis by deep learning approachesSentiment analysis by deep learning approaches
Sentiment analysis by deep learning approachesTELKOMNIKA JOURNAL
 
EFFECT OF MFCC BASED FEATURES FOR SPEECH SIGNAL ALIGNMENTS
EFFECT OF MFCC BASED FEATURES FOR SPEECH SIGNAL ALIGNMENTSEFFECT OF MFCC BASED FEATURES FOR SPEECH SIGNAL ALIGNMENTS
EFFECT OF MFCC BASED FEATURES FOR SPEECH SIGNAL ALIGNMENTSijnlc
 
Performance Calculation of Speech Synthesis Methods for Hindi language
Performance Calculation of Speech Synthesis Methods for Hindi languagePerformance Calculation of Speech Synthesis Methods for Hindi language
Performance Calculation of Speech Synthesis Methods for Hindi languageiosrjce
 
Hybrid zero watermarking and markov model of word mechanism and order-2-3
Hybrid zero watermarking and markov model of word mechanism and order-2-3Hybrid zero watermarking and markov model of word mechanism and order-2-3
Hybrid zero watermarking and markov model of word mechanism and order-2-3IAEME Publication
 
Ieee transactions on 2018 TOPICS with Abstract in audio, speech, and language...
Ieee transactions on 2018 TOPICS with Abstract in audio, speech, and language...Ieee transactions on 2018 TOPICS with Abstract in audio, speech, and language...
Ieee transactions on 2018 TOPICS with Abstract in audio, speech, and language...tsysglobalsolutions
 
Colour Based Cryptography
Colour Based CryptographyColour Based Cryptography
Colour Based CryptographyIRJET Journal
 
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and H...
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and H...A Combined Approach to Part-of-Speech Tagging Using Features Extraction and H...
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and H...Editor IJARCET
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcsandit
 

What's hot (20)

IRJET-Market Basket Analysis based on Frequent Itemset Mining
IRJET-Market Basket Analysis based on Frequent Itemset MiningIRJET-Market Basket Analysis based on Frequent Itemset Mining
IRJET-Market Basket Analysis based on Frequent Itemset Mining
 
Kc3517481754
Kc3517481754Kc3517481754
Kc3517481754
 
Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...
 
Text Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators
 
Introduction for Data Compression
Introduction for Data Compression Introduction for Data Compression
Introduction for Data Compression
 
IRJET- On-Screen Translator using NLP and Text Detection
IRJET- On-Screen Translator using NLP and Text DetectionIRJET- On-Screen Translator using NLP and Text Detection
IRJET- On-Screen Translator using NLP and Text Detection
 
4 data compression
4 data compression4 data compression
4 data compression
 
Develop and design hybrid genetic algorithms with multiple objectives in data...
Develop and design hybrid genetic algorithms with multiple objectives in data...Develop and design hybrid genetic algorithms with multiple objectives in data...
Develop and design hybrid genetic algorithms with multiple objectives in data...
 
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
Audio steganography using r prime rsa and ga based lsb algorithm to enhance s...
 
Data compression & Classification
Data compression & ClassificationData compression & Classification
Data compression & Classification
 
Sentiment analysis by deep learning approaches
Sentiment analysis by deep learning approachesSentiment analysis by deep learning approaches
Sentiment analysis by deep learning approaches
 
EFFECT OF MFCC BASED FEATURES FOR SPEECH SIGNAL ALIGNMENTS
EFFECT OF MFCC BASED FEATURES FOR SPEECH SIGNAL ALIGNMENTSEFFECT OF MFCC BASED FEATURES FOR SPEECH SIGNAL ALIGNMENTS
EFFECT OF MFCC BASED FEATURES FOR SPEECH SIGNAL ALIGNMENTS
 
histogram-based-emotion
histogram-based-emotionhistogram-based-emotion
histogram-based-emotion
 
Performance Calculation of Speech Synthesis Methods for Hindi language
Performance Calculation of Speech Synthesis Methods for Hindi languagePerformance Calculation of Speech Synthesis Methods for Hindi language
Performance Calculation of Speech Synthesis Methods for Hindi language
 
Y24168171
Y24168171Y24168171
Y24168171
 
Hybrid zero watermarking and markov model of word mechanism and order-2-3
Hybrid zero watermarking and markov model of word mechanism and order-2-3Hybrid zero watermarking and markov model of word mechanism and order-2-3
Hybrid zero watermarking and markov model of word mechanism and order-2-3
 
Ieee transactions on 2018 TOPICS with Abstract in audio, speech, and language...
Ieee transactions on 2018 TOPICS with Abstract in audio, speech, and language...Ieee transactions on 2018 TOPICS with Abstract in audio, speech, and language...
Ieee transactions on 2018 TOPICS with Abstract in audio, speech, and language...
 
Colour Based Cryptography
Colour Based CryptographyColour Based Cryptography
Colour Based Cryptography
 
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and H...
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and H...A Combined Approach to Part-of-Speech Tagging Using Features Extraction and H...
A Combined Approach to Part-of-Speech Tagging Using Features Extraction and H...
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 

Viewers also liked

Segmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachSegmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachIjrdt Journal
 
Instant elelectrocardiogram monitoring in android smart phones
Instant elelectrocardiogram monitoring in android smart phonesInstant elelectrocardiogram monitoring in android smart phones
Instant elelectrocardiogram monitoring in android smart phonesIjrdt Journal
 
Numerical modeling and analysis of slabs
Numerical modeling and analysis of slabsNumerical modeling and analysis of slabs
Numerical modeling and analysis of slabsIjrdt Journal
 
Performance analysis of adaptive beamforming at receiver side by using lms an...
Performance analysis of adaptive beamforming at receiver side by using lms an...Performance analysis of adaptive beamforming at receiver side by using lms an...
Performance analysis of adaptive beamforming at receiver side by using lms an...Ijrdt Journal
 
Large scale grid amalgamation of renewable energy sources in indian power system
Large scale grid amalgamation of renewable energy sources in indian power systemLarge scale grid amalgamation of renewable energy sources in indian power system
Large scale grid amalgamation of renewable energy sources in indian power systemIjrdt Journal
 
History and development of permanent magnets
History and development of permanent magnetsHistory and development of permanent magnets
History and development of permanent magnetsIjrdt Journal
 
An approach to parallel parking and zero turning radius in automobiles
An approach to parallel parking and zero turning radius in automobilesAn approach to parallel parking and zero turning radius in automobiles
An approach to parallel parking and zero turning radius in automobilesIjrdt Journal
 
Waste management drum sieve segregator
Waste management drum sieve segregatorWaste management drum sieve segregator
Waste management drum sieve segregatorIjrdt Journal
 
Lan based intelligent traffic light system with emergency service identification
Lan based intelligent traffic light system with emergency service identificationLan based intelligent traffic light system with emergency service identification
Lan based intelligent traffic light system with emergency service identificationIjrdt Journal
 
Enhancement of heat transfer in tube in-tube heat exchangers using twisted in...
Enhancement of heat transfer in tube in-tube heat exchangers using twisted in...Enhancement of heat transfer in tube in-tube heat exchangers using twisted in...
Enhancement of heat transfer in tube in-tube heat exchangers using twisted in...Ijrdt Journal
 

Viewers also liked (18)

Ijrdt11 140004
Ijrdt11 140004Ijrdt11 140004
Ijrdt11 140004
 
Segmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachSegmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approach
 
Ijrdtvlis31 1501
Ijrdtvlis31 1501Ijrdtvlis31 1501
Ijrdtvlis31 1501
 
Ijrdt12 140002
Ijrdt12 140002Ijrdt12 140002
Ijrdt12 140002
 
Instant elelectrocardiogram monitoring in android smart phones
Instant elelectrocardiogram monitoring in android smart phonesInstant elelectrocardiogram monitoring in android smart phones
Instant elelectrocardiogram monitoring in android smart phones
 
Ijrdtvlis26 1426106
Ijrdtvlis26 1426106Ijrdtvlis26 1426106
Ijrdtvlis26 1426106
 
Ijrdt11 140003
Ijrdt11 140003Ijrdt11 140003
Ijrdt11 140003
 
Ijrdt11 140002
Ijrdt11 140002Ijrdt11 140002
Ijrdt11 140002
 
Numerical modeling and analysis of slabs
Numerical modeling and analysis of slabsNumerical modeling and analysis of slabs
Numerical modeling and analysis of slabs
 
Ijrdtvlis26 1426102
Ijrdtvlis26 1426102Ijrdtvlis26 1426102
Ijrdtvlis26 1426102
 
Performance analysis of adaptive beamforming at receiver side by using lms an...
Performance analysis of adaptive beamforming at receiver side by using lms an...Performance analysis of adaptive beamforming at receiver side by using lms an...
Performance analysis of adaptive beamforming at receiver side by using lms an...
 
Ijrdtvlis26 1426106
Ijrdtvlis26 1426106Ijrdtvlis26 1426106
Ijrdtvlis26 1426106
 
Large scale grid amalgamation of renewable energy sources in indian power system
Large scale grid amalgamation of renewable energy sources in indian power systemLarge scale grid amalgamation of renewable energy sources in indian power system
Large scale grid amalgamation of renewable energy sources in indian power system
 
History and development of permanent magnets
History and development of permanent magnetsHistory and development of permanent magnets
History and development of permanent magnets
 
An approach to parallel parking and zero turning radius in automobiles
An approach to parallel parking and zero turning radius in automobilesAn approach to parallel parking and zero turning radius in automobiles
An approach to parallel parking and zero turning radius in automobiles
 
Waste management drum sieve segregator
Waste management drum sieve segregatorWaste management drum sieve segregator
Waste management drum sieve segregator
 
Lan based intelligent traffic light system with emergency service identification
Lan based intelligent traffic light system with emergency service identificationLan based intelligent traffic light system with emergency service identification
Lan based intelligent traffic light system with emergency service identification
 
Enhancement of heat transfer in tube in-tube heat exchangers using twisted in...
Enhancement of heat transfer in tube in-tube heat exchangers using twisted in...Enhancement of heat transfer in tube in-tube heat exchangers using twisted in...
Enhancement of heat transfer in tube in-tube heat exchangers using twisted in...
 

Similar to Ijrdtvlis11 140006

A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreLuisa Francisco
 
111111111111111111111111111111111789.ppt
111111111111111111111111111111111789.ppt111111111111111111111111111111111789.ppt
111111111111111111111111111111111789.pptAllamJayaPrakash
 
111111111111111111111111111111111789.ppt
111111111111111111111111111111111789.ppt111111111111111111111111111111111789.ppt
111111111111111111111111111111111789.pptAllamJayaPrakash
 
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionA Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionEditor IJMTER
 
data compression technique
data compression techniquedata compression technique
data compression techniqueCHINMOY PAUL
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)nes
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABIJEEE
 
Lossless image compression.(1)
Lossless image compression.(1)Lossless image compression.(1)
Lossless image compression.(1)MohnishSatidasani
 
Comparision Of Various Lossless Image Compression Techniques
Comparision Of Various Lossless Image Compression TechniquesComparision Of Various Lossless Image Compression Techniques
Comparision Of Various Lossless Image Compression TechniquesIJERA Editor
 
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...INFOGAIN PUBLICATION
 
Affable Compression through Lossless Column-Oriented Huffman Coding Technique
Affable Compression through Lossless Column-Oriented Huffman Coding TechniqueAffable Compression through Lossless Column-Oriented Huffman Coding Technique
Affable Compression through Lossless Column-Oriented Huffman Coding TechniqueIOSR Journals
 
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSHIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSIJCNCJournal
 
Teknik Pengkodean (2).pptx
Teknik Pengkodean (2).pptxTeknik Pengkodean (2).pptx
Teknik Pengkodean (2).pptxzulhelmanz
 
Comparison of Compression Algorithms in text data for Data Mining
Comparison of Compression Algorithms in text data for Data MiningComparison of Compression Algorithms in text data for Data Mining
Comparison of Compression Algorithms in text data for Data MiningIJAEMSJORNAL
 
Image Compression Through Combination Advantages From Existing Techniques
Image Compression Through Combination Advantages From Existing TechniquesImage Compression Through Combination Advantages From Existing Techniques
Image Compression Through Combination Advantages From Existing TechniquesCSCJournals
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlabeSAT Journals
 

Similar to Ijrdtvlis11 140006 (20)

A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
111111111111111111111111111111111789.ppt
111111111111111111111111111111111789.ppt111111111111111111111111111111111789.ppt
111111111111111111111111111111111789.ppt
 
111111111111111111111111111111111789.ppt
111111111111111111111111111111111789.ppt111111111111111111111111111111111789.ppt
111111111111111111111111111111111789.ppt
 
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionA Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image Compression
 
Image compression
Image compressionImage compression
Image compression
 
data compression technique
data compression techniquedata compression technique
data compression technique
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLAB
 
Lossless image compression.(1)
Lossless image compression.(1)Lossless image compression.(1)
Lossless image compression.(1)
 
Comparision Of Various Lossless Image Compression Techniques
Comparision Of Various Lossless Image Compression TechniquesComparision Of Various Lossless Image Compression Techniques
Comparision Of Various Lossless Image Compression Techniques
 
Data compression
Data compression Data compression
Data compression
 
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...
 
Affable Compression through Lossless Column-Oriented Huffman Coding Technique
Affable Compression through Lossless Column-Oriented Huffman Coding TechniqueAffable Compression through Lossless Column-Oriented Huffman Coding Technique
Affable Compression through Lossless Column-Oriented Huffman Coding Technique
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSHIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITS
 
Teknik Pengkodean (2).pptx
Teknik Pengkodean (2).pptxTeknik Pengkodean (2).pptx
Teknik Pengkodean (2).pptx
 
M.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit vM.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit v
 
Comparison of Compression Algorithms in text data for Data Mining
Comparison of Compression Algorithms in text data for Data MiningComparison of Compression Algorithms in text data for Data Mining
Comparison of Compression Algorithms in text data for Data Mining
 
Image Compression Through Combination Advantages From Existing Techniques
Image Compression Through Combination Advantages From Existing TechniquesImage Compression Through Combination Advantages From Existing Techniques
Image Compression Through Combination Advantages From Existing Techniques
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 

More from Ijrdt Journal

SEASONAL VARIATION IN PHYSICO-CHEMICAL PARAMETERS OF SURFACE WATER AND GROUND...
SEASONAL VARIATION IN PHYSICO-CHEMICAL PARAMETERS OF SURFACE WATER AND GROUND...SEASONAL VARIATION IN PHYSICO-CHEMICAL PARAMETERS OF SURFACE WATER AND GROUND...
SEASONAL VARIATION IN PHYSICO-CHEMICAL PARAMETERS OF SURFACE WATER AND GROUND...Ijrdt Journal
 
Literature review on need of composite additives for s.i engine
Literature review on need of composite additives for s.i engineLiterature review on need of composite additives for s.i engine
Literature review on need of composite additives for s.i engineIjrdt Journal
 
A mobile agent based approach for data management to support 3 d emergency pr...
A mobile agent based approach for data management to support 3 d emergency pr...A mobile agent based approach for data management to support 3 d emergency pr...
A mobile agent based approach for data management to support 3 d emergency pr...Ijrdt Journal
 
Thickener waste management in mineral processing to prevent environmental pol...
Thickener waste management in mineral processing to prevent environmental pol...Thickener waste management in mineral processing to prevent environmental pol...
Thickener waste management in mineral processing to prevent environmental pol...Ijrdt Journal
 
Multi turbine micro hydro power generation
Multi turbine micro hydro power generationMulti turbine micro hydro power generation
Multi turbine micro hydro power generationIjrdt Journal
 
Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsIjrdt Journal
 
Improved performance through carbon aware green cloud policy
Improved performance through carbon aware green cloud policyImproved performance through carbon aware green cloud policy
Improved performance through carbon aware green cloud policyIjrdt Journal
 
Heat Recovery System in Domestic Refrigerator
Heat Recovery System in Domestic RefrigeratorHeat Recovery System in Domestic Refrigerator
Heat Recovery System in Domestic RefrigeratorIjrdt Journal
 
Design and implementation of uart on soc
Design and implementation of uart on socDesign and implementation of uart on soc
Design and implementation of uart on socIjrdt Journal
 
Cam actuated rotary pump
Cam actuated rotary pumpCam actuated rotary pump
Cam actuated rotary pumpIjrdt Journal
 
Basic ingredients selector
Basic ingredients selectorBasic ingredients selector
Basic ingredients selectorIjrdt Journal
 

More from Ijrdt Journal (17)

Ijrdtvlis31 1502
Ijrdtvlis31 1502Ijrdtvlis31 1502
Ijrdtvlis31 1502
 
Ijrdtvlis26 1426108
Ijrdtvlis26 1426108Ijrdtvlis26 1426108
Ijrdtvlis26 1426108
 
Ijrdtvlis26 1426105
Ijrdtvlis26 1426105Ijrdtvlis26 1426105
Ijrdtvlis26 1426105
 
Ijrdtvlis26 1426104
Ijrdtvlis26 1426104Ijrdtvlis26 1426104
Ijrdtvlis26 1426104
 
Ijrdtvlis26 1426104
Ijrdtvlis26 1426104Ijrdtvlis26 1426104
Ijrdtvlis26 1426104
 
Ijrdtvlis26 1426101
Ijrdtvlis26 1426101Ijrdtvlis26 1426101
Ijrdtvlis26 1426101
 
SEASONAL VARIATION IN PHYSICO-CHEMICAL PARAMETERS OF SURFACE WATER AND GROUND...
SEASONAL VARIATION IN PHYSICO-CHEMICAL PARAMETERS OF SURFACE WATER AND GROUND...SEASONAL VARIATION IN PHYSICO-CHEMICAL PARAMETERS OF SURFACE WATER AND GROUND...
SEASONAL VARIATION IN PHYSICO-CHEMICAL PARAMETERS OF SURFACE WATER AND GROUND...
 
Literature review on need of composite additives for s.i engine
Literature review on need of composite additives for s.i engineLiterature review on need of composite additives for s.i engine
Literature review on need of composite additives for s.i engine
 
A mobile agent based approach for data management to support 3 d emergency pr...
A mobile agent based approach for data management to support 3 d emergency pr...A mobile agent based approach for data management to support 3 d emergency pr...
A mobile agent based approach for data management to support 3 d emergency pr...
 
Thickener waste management in mineral processing to prevent environmental pol...
Thickener waste management in mineral processing to prevent environmental pol...Thickener waste management in mineral processing to prevent environmental pol...
Thickener waste management in mineral processing to prevent environmental pol...
 
Multi turbine micro hydro power generation
Multi turbine micro hydro power generationMulti turbine micro hydro power generation
Multi turbine micro hydro power generation
 
Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systems
 
Improved performance through carbon aware green cloud policy
Improved performance through carbon aware green cloud policyImproved performance through carbon aware green cloud policy
Improved performance through carbon aware green cloud policy
 
Heat Recovery System in Domestic Refrigerator
Heat Recovery System in Domestic RefrigeratorHeat Recovery System in Domestic Refrigerator
Heat Recovery System in Domestic Refrigerator
 
Design and implementation of uart on soc
Design and implementation of uart on socDesign and implementation of uart on soc
Design and implementation of uart on soc
 
Cam actuated rotary pump
Cam actuated rotary pumpCam actuated rotary pump
Cam actuated rotary pump
 
Basic ingredients selector
Basic ingredients selectorBasic ingredients selector
Basic ingredients selector
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Ijrdtvlis11 140006

  • 1. International Journal For Research & Development in Technology Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585 8 Copyright 2014- IJRDT www.ijrdt.org Efficiency of Entropy Coding as well as Dictionary based Technique for Lossless Data Compression Pradeep S R 1 ,Prathibha S R 2 , Monikashree T S 3 1,2,3 PG Student pradeepsr09@gmail.com 1 , prathi52@gmail.com 2 , monikashree.ts@gmail.com 1 Department of PG Studies, V T U, Gulbarga, Karnataka, India. 2 Sri Siddartha Institute of Technology, Tumkur, Karnataka, India. 3 Dr. Ambedkar Institute of Technology, Bangalore, Karnataka, India. Abstract: Communication is exchange of information between the devices, which very important in today's life. Communication is wide utilized in all fields, such as telephone, television, weather forecasting and etc. There are different kinds of communication techniques. All the data which have to be transmitted has to be compressed in order to send more and more data. Communication is one of the main processes in many domains, but to send the information, the data has to be compressed, so that more and more data can be transmitted. In this paper presented the concept of data compression technique has been explained, which also includes efficiency of entropy and dictionary based techniques of lossless data type. And also include the merits and demerits, coding complexity, decoding capability and compression ratio of both entropy and dictionary based compression technique. Even it includes Huffman coding has been explained clearly using flowchart and implemented for a bit map image and encrypted and decrypted the image. Keywords— Entropy, Huffman coding, Encryption, Decryption I.INTRODUCTION Data Compression is one of most important technique used in multimedia technology for transferring the video, audio or any text information from one place to another. Data compression algorithms are mainly used to reduce the number of bits required to represent the image or video or audio information. There is two parts in data compression i.e. compression and reconstruction. Based on reconstruction there are two algorithms i.e. lossless compression and lossy compression. Lossless data compression allows exact data to be reconstructed from compressed data. Whereas the lossy data compression allows similar data to be reconstructed from compressed data but not identical as original. This chapter involves the debate on the efficiency of entropy as well as dictionary based technique for lossless data compression, efficient usage of data types, merits and demerits of the both techniques, coding complexity, decoding capability, compression ratio. 1.1Efficient usage of the data types (text, images, etc.) Entropy and Dictionary based techniques are two types under the lossless data compression. Huffman coding is an entropy type data compression technique. Huffman coding is based on the frequency of occurrence of a data item i.e. pixel in images. The technique is to use a lower number of bits to encode the data in to binary codes that occur more frequently. It works better for JPEG image format. LZW is a dictionary based type data compression technique. LZW replaces strings of characters with single code. LZW algorithm works best for files containing lots of repetitive data. This is suited for text and monochrome images like Tagged Image File Format (TIFF) and Graphic Interface Format (GIF). It is not suited for an image that doesn‟t have repetitive data [1]. 1.2 Merits and Demerits of two techniques. 1.2.1 Merits and Demerits of Entropy coding. Huffman coding is one of the most popular compression methods of entropy coding, which translate fixed-size pieces of input data into variable-length symbols. Huffman coding is widely used of its simplicity, high speed and lack of difficulty. Produces lossless compressions of images [1]. All the codes of encoded data are of different size, therefore it is difficult to for decoder to know whether last of bit of code has reached or not. Thus encoded output mat be corrupted and final image may not be same as original, hence need to send Huffman table at beginning of compressed file hence it is slow in compression [1].
  • 2. International Journal For Research & Development in Technology Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585 9 Copyright 2014- IJRDT www.ijrdt.org 1.2.2 Merits and Demerits of Dictionary based coding LZW is one type of Dictionary based algorithm which replaces the strings of characters with single codes. LZW compression is the best technique for reducing the size of files containing more repetitive data. LZW compression is fast and simple to apply. Since this is a lossless compression technique, none of the contents in the file are lost during or after compression. And it need not pass the dictionary table to decompression code [1]. LZW is suitable of the image having the repetitive data, but if the image contains different data, then size of compressed file by the LZW will be larger. Hence the LZW is not suitable for the images of different data. It is very expensive to use [1]. 1.3 Coding complexity The term coding complexity refers to the ability of each lossless data compression techniques, the coding complexity for the entropy method is less as compared to the dictionary algorithm, however the technique which has more complexity is the arithmetic coding than the Huffman coding in entropy method. The one major disadvantage in lossless data compression is that by increasing the sizes of the search buffer and the look-ahead buffer will resolve the problems. A close look, reveals that it also leads to increases in the number of bits required to encode the offset and matched the corresponding string as well as increasing the length and increasing the processing complexity. Hence the there is less coding complexity in the entropy type compared to the dictionary algorithms. Therefore the complexity of a string is the length of the string's shortest description is fixed [2]. 1.4 Decoding capability Decoding mainly refers to reduction of the probability of errors by repetition of messages in transmission by using redundancy. Decoding capability holds good for the dictionary type of algorithm as they offer good compression and decompression for the data [2]. When compared with the encoding algorithm the decoding becomes difficult as the code length present in entropy methods is different. Since the decoder knows the rule applied in the encoding, it can reconstruct the dictionary and decode the input text stream from the received string. Whereas there is no look ahead possible in entropy method making the method less capable for decoding. Decoding makes the job simpler as there is no need for string comparison required in dictionary type of algorithms [3]. 1.5 Compression Ratio Data compression techniques are specifically dependent on the type of data that has to be compressed and on the desired performance. Typical measures of performances are time and space complexity, compression ratio is used to quantify the reduction in data-representation size produced by a data compression algorithms. Compression ratio is the main constraint being involved during comparison of each technique‟s efficiency. The compression ratio is basically given as the ratio of compressed size versus the uncompressed size of data may be for an image or data it is represented the same [4]. As discussed before about the decoding capacity the efficiency of the dictionary type technique increases as there is good compression and decompression possible utilizing less memory space. While considering the entropy type of algorithms like Huffman coding and arithmetic coding the RAM space is more hence this in turn implies that the compression ratio is also high for these techniques. The dictionary based algorithms have less compression ratio and are used in image compression like Graphic Interface Format (GIF) [4]. II.PROPOSED WORK Data compression is a technique which reduces the number of bits to transmit and represent the required information i.e. video, audio, data signal and etc. There are two techniques in data compression i.e. lossless and lossy data compression. Huffman coding is type of lossless data compression technique. This compresses the required information and reconstructs information exactly as original. Using this technique the codes are generated which is known as Huffman codes and these codes are prefix codes which is best for the particular image or model. Huffman technique is based on the two observations.  The symbols that occur more frequently have less codeword rather than the symbols that occur less frequently.  The same symbol that occurs less frequently has the same length of codeword. These code words of particular probability of color are replaced in image, in place of pixels of a particular color. Initially the bits require to represent the color will be more, but by using this technique less number of bits will be required to represent the color and transmit. A) Flow Chart to describe the logic of Huffman coding The figure 1 shows the flow chart of encryption part of the Huffman coding for a bit map image. Here initially image is either can be created or directly read the created image, then the probability of each colour is calculated by ratio of total number of pixels of particular color to the total number of pixels of whole image. Then the probabilities of all color are assigned to the variable i.e. „p‟. Then while condition is considered to check and repeat the while loop until the length of „p‟ is greater than 1. Firstly the length of „p‟ is usually greater than one, hence it satisfies the condition and enters the loop. Then the probabilities in „p‟ is arranged in descending order and sums the least two probabilities. Then
  • 3. International Journal For Research & Development in Technology Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585 10 Copyright 2014- IJRDT www.ijrdt.org the length of „p‟ is reduced by 1 and assigns the sum value to least place in „p‟. Again the loop repeats until the length of „p‟ becomes equal to 2. The code words for each probability is generated, logic for the code word generation is mentioned in code, which is in appendix. Then these generated code words of particular color probability are replaced in the each pixel value of that particular color. Then the both encrypted image and code word table is transmitted to the receiver part. start create/read image calculate the probabilities of an colors & assign to 'p' while(length(p)>1) arrange p in descending order & add least 2 probabilities reduce the length of p by 1 and assign sum value to least place generate the code words for each probability replace code word of particular color probability in particular pixel of color A Fig.1: Flow chart of encrypted part The figure 2 illustrates the flowchart of the decryption on image in Huffman coding. The code word table and encrypted image sent by the transmitter is received and replaces the original color intensity value with respect to the particular code word of color probability. Fig.2: Flow chart of decryption of the image III.RESULT ANALYSIS Fig.3: Output of Original Image red_prob = 0.2400 grn_prob = 0.1600 blu_prob = 0.3600 blk_prob = 0.2400 The figure 3 illustrates the original image, which has four colors i.e. red, green, blue and black. Huffman coding procedure is applied for above image. Initially the total probability of each color is calculated, which is calculated
  • 4. International Journal For Research & Development in Technology Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585 11 Copyright 2014- IJRDT www.ijrdt.org by dividing the total number of pixels of each color by the total number of pixels in a whole image. The probability values of colors of above image are shown above. pp1 = 0.3600 0.2400 0.2400 0.1600 pp2 = 0.4000 0.3600 0.2400 pp3 = 0.6000 0.4000 All the probabilities are assigned to a variable and arranged in descending order. And least two probabilities of variable are added and length of variable is reduced by 1 and assigns the all probabilities to new variable, then assigns the sum value in last place of new variable. And this is repeated until the length of new variable is equal to two, as shown above. s1 = 11 = blue s2 = 10 = red s3 = 01 = black s4 = 00 = green Fig.4: Output of Encrypted Image The symbol for each probability is generated which is shown above i.e. s1, s2, s3, s4. These symbols are known as code words which are replaced in the each pixel value of that particular color. Then a resultant image is known as the encrypted image which is shown in figure 4. � 𝑒� 𝑔𝑡 ℎ(� 𝑟� 𝑏 ) Entropy = − prob k log2 .∗ prob(k)� =1 = 5.8099 Efficiency = 100-redundancy= 94 % The figure 5 illustrates the decryption of the encrypted image. The code words which have been replaced in the image have been replaced by the original intensity value and reconstruct the original image as shown image in figure 5. Fig.5: Output of Decrypted Image IV.APPLICATIONS 1. Suppression of zero's in a file (Zero Length Suppression). 2. Silence in audio data, or pauses in conversation etc. 3. Bitmaps 4. Blanks in text or program source files 5. Backgrounds in images 6. Other regular image or data tokens V.ADVANTAGES & DISADVANTAGES ADVANTAGES  Algorithm is easy to implement  Produce a lossless compression of images DISADVANTAGES  Efficiency depends on the accuracy of the statistical model used and a type of image.  Algorithm varies with different formats, but few get any better than 8:1 compression. VI.CONCLUSION Lossless data compression technique is better than the lossy data, since it allows reconstructing the image or information similar to the original information. Entropy technique is = 1.9419 Average length = Prob. of symbol x No. of bits to represent symbol = 2 Redundancy = (Entropy-Average length)*100 slow compare to the dictionary based technique since it has to send the symbol table to receiver part. Huffman coding is type of lossless data compression technique which generates the code words and replaces those code words in the original image in order to compress
  • 5. International Journal For Research & Development in Technology Volume: 1, Issue: 1 May 2014 ISSN (Online):- 2349-3585 12 Copyright 2014- IJRDT www.ijrdt.org the image and reduce the size of the image to transmit. It is used in JPEG compression. It produces optimal and compact code but relatively slow since it has to send code table also. REFERENCE [1] 'Compression Using Huffman Coding',Mamta Sharma, S.L. Bawa D.A.V. college. [2] Pu, I.M., 2006, Fundamental Data Compression, Elsevier, Britain. [3] T.C.Bell, J.G. Cleary, and I.H. Written., Text Compression, Advanced Reference Series. Prentice Hall, Englewood Cliffs, NJ, 1990. [4] Lossless Data Compression. Recommendation for Space Data Systems Standards, CCSDS 121.0-B-1. Blue Book. Issue 1. Washington, D.C.: CCSDS, May 1997. [5] S.R. KODITUWAKKU, U. S.AMARASINGHE, “Comparison Of Lossless Data Compression Algorithms For Text Data” Indian Journal of Computer Science and Engineering, Vol 1 No 4 416-425.pp 416 -425