SlideShare a Scribd company logo
Standard
and
Methodology
JPEG
JPEG Standards
• Baseline system
• Extended system
• Special lossless system
JPEG Standards
• Every codec must implement this.
Base line system must reasonably decompress colour image
maintain, a high compression ratio, and handle from 4 bit/pixel to
16 bits/pixel.
• Extended system covers the various encoding aspects such as
variable length encoding, progressive encoding and the
hierarchical mode of encoding.
• The special lossless function ensures that at resolution at which
the image is compressed, decompressed results in no loss of any
details that was there in the original source image.
JPEG Components
• Baseline Sequential Codec:
– Consists of 3 steps:
• Formation of DCT coefficient
• Quantisation
• Entropy
• DCT Progressive Mode:
– The key steps of formation of DCT coefficient and quantization are the same as for the
baseline sequential codec. The key difference is that each image component is coded
in multiple scans instead of single scan.
• Predictive Lossless Encoding:
– A predictor combines sample area and predict neighbouring area on the basis of
sample area. The predicted area are checked against the fully lossless sample for each
area and difference is encoded.
• Hierarchical Mode:
– It provides a means of carrying multiple resolution. Each successive encoding of the
image is reduced by the factor of two, in either the horizontal or vertical dimension.
JPEG Methodology
• JPEG Compression is lossy.
• Compression uses
• DCT (Discrete Cosine Transform)
• Quantisation
• Entropy
• DCT: removes redundancy by transforming data from spatial domain to
a frequency domain.
• Quantizer: Quantises the DCT coefficient with weighting function to
generate quantized DCT coefficient optimized for human eye.
• Entropy: Minimizes the entropy of the quantized DCT coefficient.
DCT (Discrete Cosine Transform)
• In time domain the signal requires lots of data points to
represents the time in x-axis and amplitude in y-axis. Once the
signal is converted in to a frequency domain, only few points
are required to represent the same signal.
• The technique can be applied to a colour image. To compress a
gray scale image in JPEG, each pixel is translated into luminance
or gray values.
• To compress an RGB colour image, the work is three times as
much, because JPEG treats each colour component separately.
• Red compressed first, then Green lastly Blue.
DCT (Discrete Cosine Transform)
• Benefits
– Proven to be optimal transform for large classes of image.
– DCT is orthogonal transform.
• Spatial->frequency (where only few points required)
– DCT generates coefficient that are easily quantized to achieve good
compression of block.
– DCT algorithms are well behaved and can be computed efficiently.
– DCT algorithms are symmetrical
• So inverse is also possible.
DCT Calculation
• C(i)C(j)= Normalization Factors.
• Pixel(x,y)=2D image.
• Cos factor and summation is added two times because one for row and
another one for column.
DCT Calculation
• The output matrix represents the frequency domain DCT components.
Row 0 column 0 has the coefficient 0f 172. This coefficient is much
larger than other 63. so it is called as DC coefficient and other are
called AC coefficient.
Quantization
• Quantization is process of reducing the precession of an integer
there by reducing the number of bits required to store the inte
ger.
• DCT matrix is quantized to increase the compression.
Quantized Coefficient (i,j)=DCT(i,j)/Quantum(i,j)
• As the quantum value gets larger the quantisation coefficient
gets smaller.
12
13
Zigzag Sequence
• The zigzag sequence starts at DC coefficient value.
• Zigzag ordering is designed to facilitate entropy coding .
Entropy Encoding
• Uncertainty in a substance.
• When the energy possessed to do the work decreases the
entropy increases.
• In Information theory a system that has a high degree of
unpredictability has high entropy.
• In data compression it is measure of the information content of
a message in number of bits.
• Entropy in number of bits=log 2(probability of object)
Entropy Encoding
• Example: Represent ‘T’
• Probability of T’s presence in a text string =
1/8
• Number of bits of entropy=3 bits.
• If 7 T’s in text then=21 bits
• In ASCII 8bit=56 bits
Entropy Encoding
• 2 types
– Huffman coding
– Arithmetic coding
• Huffman coding requires that one or more coding
sets of code table be specified by the application for
coding and decoding. Table may be predefined or
computed specifically for a given image.
• Arithmetic coding does not require tables. It is able
to adapt to the image statistic as it encode the
image
DC Coefficient Coding
• DC components are differentially coded as
(SIZE, Value)
– Size: Encoded with a variable length code from
Huffman table
– Value: Encoded with a variable length integer.
– D=DCx-DCx-1
• The code for a Value is derived from the
following table
Example: If a DC component is 40 and the previous DC component is 48.
The difference is -8. Therefore it is coded as: 1010111
0111: The value for representing -8
101: The size from the same table reads 4. The corresponding code from
the table at left is 101.
19
AC Coefficient Coding
• AC components are differentially coded as
(Run length, size)
• Run length: Number of consecutive zero-valued AC
coefficient in the zigzag sequence matrix preceding a
non zero AC coefficient.
• Size: Number of bits used to encode the amplitude
of the AC coefficient.

More Related Content

What's hot

Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
IJCSEA Journal
 
Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...
VLSICS Design
 
MICROPROCESSOR
MICROPROCESSORMICROPROCESSOR
MICROPROCESSOR
fakirmalamgir
 
A Robust Object Recognition using LBP, LTP and RLBP
A Robust Object Recognition using LBP, LTP and RLBPA Robust Object Recognition using LBP, LTP and RLBP
A Robust Object Recognition using LBP, LTP and RLBP
Editor IJMTER
 
Digital image processing lab 1
Digital image processing lab 1Digital image processing lab 1
Digital image processing lab 1
Moe Moe Myint
 
CA2
CA2CA2
Dsp Datapath
Dsp DatapathDsp Datapath
Dsp Datapath
Abhishek Tiwari
 
Coa swetappt copy
Coa swetappt   copyCoa swetappt   copy
Coa swetappt copy
sweta_pari
 
vedic mathematics based MAC unit
vedic mathematics based MAC unitvedic mathematics based MAC unit
vedic mathematics based MAC unit
Navya Shree
 
Image Compression Techniques: A Survey
Image Compression Techniques: A SurveyImage Compression Techniques: A Survey
An Optimized Implementation Of 64-Bit MAC Unit For DSP Applications Using SPST
An Optimized Implementation Of 64-Bit MAC Unit For DSP Applications Using SPSTAn Optimized Implementation Of 64-Bit MAC Unit For DSP Applications Using SPST
An Optimized Implementation Of 64-Bit MAC Unit For DSP Applications Using SPST
Patnam Shruthi
 
Graph Matching
Graph MatchingGraph Matching
Graph Matching
graphitech
 
Cs6303 unit2
Cs6303 unit2 Cs6303 unit2
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
IGEEKS TECHNOLOGIES
 
Medical image computing - BMVA summer school 2014
Medical image computing - BMVA summer school 2014Medical image computing - BMVA summer school 2014
Medical image computing - BMVA summer school 2014
potaters
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
An 8 bit_multiplier
An 8 bit_multiplierAn 8 bit_multiplier
An 8 bit_multiplier
Robi Parvez
 
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMGEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
IJCNCJournal
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
IRJET Journal
 
Texture descriptor based on local combination adaptive ternary pattern
Texture descriptor based on local combination adaptive ternary patternTexture descriptor based on local combination adaptive ternary pattern
Texture descriptor based on local combination adaptive ternary pattern
Projectsatbangalore
 

What's hot (20)

Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
 
Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...
 
MICROPROCESSOR
MICROPROCESSORMICROPROCESSOR
MICROPROCESSOR
 
A Robust Object Recognition using LBP, LTP and RLBP
A Robust Object Recognition using LBP, LTP and RLBPA Robust Object Recognition using LBP, LTP and RLBP
A Robust Object Recognition using LBP, LTP and RLBP
 
Digital image processing lab 1
Digital image processing lab 1Digital image processing lab 1
Digital image processing lab 1
 
CA2
CA2CA2
CA2
 
Dsp Datapath
Dsp DatapathDsp Datapath
Dsp Datapath
 
Coa swetappt copy
Coa swetappt   copyCoa swetappt   copy
Coa swetappt copy
 
vedic mathematics based MAC unit
vedic mathematics based MAC unitvedic mathematics based MAC unit
vedic mathematics based MAC unit
 
Image Compression Techniques: A Survey
Image Compression Techniques: A SurveyImage Compression Techniques: A Survey
Image Compression Techniques: A Survey
 
An Optimized Implementation Of 64-Bit MAC Unit For DSP Applications Using SPST
An Optimized Implementation Of 64-Bit MAC Unit For DSP Applications Using SPSTAn Optimized Implementation Of 64-Bit MAC Unit For DSP Applications Using SPST
An Optimized Implementation Of 64-Bit MAC Unit For DSP Applications Using SPST
 
Graph Matching
Graph MatchingGraph Matching
Graph Matching
 
Cs6303 unit2
Cs6303 unit2 Cs6303 unit2
Cs6303 unit2
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Medical image computing - BMVA summer school 2014
Medical image computing - BMVA summer school 2014Medical image computing - BMVA summer school 2014
Medical image computing - BMVA summer school 2014
 
F011123134
F011123134F011123134
F011123134
 
An 8 bit_multiplier
An 8 bit_multiplierAn 8 bit_multiplier
An 8 bit_multiplier
 
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMGEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
Texture descriptor based on local combination adaptive ternary pattern
Texture descriptor based on local combination adaptive ternary patternTexture descriptor based on local combination adaptive ternary pattern
Texture descriptor based on local combination adaptive ternary pattern
 

Similar to Jpeg

Jpeg standards
Jpeg   standardsJpeg   standards
Jpeg standards
NikhilBanerjee7
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
Dr. Kapil Gupta
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
M.k. Praveen
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
Hossain Md Shakhawat
 
image basics and image compression
image basics and image compressionimage basics and image compression
image basics and image compression
murugan hari
 
Image compression
Image compressionImage compression
Image compression
Shiva Krishna Chandra Shekar
 
image processing for jpeg presentati.ppt
image processing for jpeg presentati.pptimage processing for jpeg presentati.ppt
image processing for jpeg presentati.ppt
naghamallella
 
Data compression
Data compressionData compression
Data compression
Sherif Abdelfattah
 
JPEG Image Compression
JPEG Image CompressionJPEG Image Compression
JPEG Image Compression
Aishwarya K. M.
 
notes_Image Compression_edited.ppt
notes_Image Compression_edited.pptnotes_Image Compression_edited.ppt
notes_Image Compression_edited.ppt
HarisMasood20
 
JPEG
JPEGJPEG
Jpeg
JpegJpeg
SOC Application Studies: Image Compression
SOC Application Studies: Image CompressionSOC Application Studies: Image Compression
SOC Application Studies: Image Compression
A B Shinde
 
Image compression Algorithms
Image compression AlgorithmsImage compression Algorithms
Image compression Algorithms
Shivam Shrivastava
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
theem college of engineering
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
sangusajjan
 
MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video Encoding
Christian Kehl
 
Why Image compression is Necessary?
Why Image compression is Necessary?Why Image compression is Necessary?
Why Image compression is Necessary?
Prabhat Kumar
 
B070306010
B070306010B070306010
B070306010
IJERD Editor
 
Mmclass4
Mmclass4Mmclass4
Mmclass4
Hassan Dar
 

Similar to Jpeg (20)

Jpeg standards
Jpeg   standardsJpeg   standards
Jpeg standards
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
 
image basics and image compression
image basics and image compressionimage basics and image compression
image basics and image compression
 
Image compression
Image compressionImage compression
Image compression
 
image processing for jpeg presentati.ppt
image processing for jpeg presentati.pptimage processing for jpeg presentati.ppt
image processing for jpeg presentati.ppt
 
Data compression
Data compressionData compression
Data compression
 
JPEG Image Compression
JPEG Image CompressionJPEG Image Compression
JPEG Image Compression
 
notes_Image Compression_edited.ppt
notes_Image Compression_edited.pptnotes_Image Compression_edited.ppt
notes_Image Compression_edited.ppt
 
JPEG
JPEGJPEG
JPEG
 
Jpeg
JpegJpeg
Jpeg
 
SOC Application Studies: Image Compression
SOC Application Studies: Image CompressionSOC Application Studies: Image Compression
SOC Application Studies: Image Compression
 
Image compression Algorithms
Image compression AlgorithmsImage compression Algorithms
Image compression Algorithms
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
 
MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video Encoding
 
Why Image compression is Necessary?
Why Image compression is Necessary?Why Image compression is Necessary?
Why Image compression is Necessary?
 
B070306010
B070306010B070306010
B070306010
 
Mmclass4
Mmclass4Mmclass4
Mmclass4
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Jpeg

  • 2. JPEG Standards • Baseline system • Extended system • Special lossless system
  • 3. JPEG Standards • Every codec must implement this. Base line system must reasonably decompress colour image maintain, a high compression ratio, and handle from 4 bit/pixel to 16 bits/pixel. • Extended system covers the various encoding aspects such as variable length encoding, progressive encoding and the hierarchical mode of encoding. • The special lossless function ensures that at resolution at which the image is compressed, decompressed results in no loss of any details that was there in the original source image.
  • 4. JPEG Components • Baseline Sequential Codec: – Consists of 3 steps: • Formation of DCT coefficient • Quantisation • Entropy • DCT Progressive Mode: – The key steps of formation of DCT coefficient and quantization are the same as for the baseline sequential codec. The key difference is that each image component is coded in multiple scans instead of single scan. • Predictive Lossless Encoding: – A predictor combines sample area and predict neighbouring area on the basis of sample area. The predicted area are checked against the fully lossless sample for each area and difference is encoded. • Hierarchical Mode: – It provides a means of carrying multiple resolution. Each successive encoding of the image is reduced by the factor of two, in either the horizontal or vertical dimension.
  • 5. JPEG Methodology • JPEG Compression is lossy. • Compression uses • DCT (Discrete Cosine Transform) • Quantisation • Entropy • DCT: removes redundancy by transforming data from spatial domain to a frequency domain. • Quantizer: Quantises the DCT coefficient with weighting function to generate quantized DCT coefficient optimized for human eye. • Entropy: Minimizes the entropy of the quantized DCT coefficient.
  • 6.
  • 7. DCT (Discrete Cosine Transform) • In time domain the signal requires lots of data points to represents the time in x-axis and amplitude in y-axis. Once the signal is converted in to a frequency domain, only few points are required to represent the same signal. • The technique can be applied to a colour image. To compress a gray scale image in JPEG, each pixel is translated into luminance or gray values. • To compress an RGB colour image, the work is three times as much, because JPEG treats each colour component separately. • Red compressed first, then Green lastly Blue.
  • 8.
  • 9. DCT (Discrete Cosine Transform) • Benefits – Proven to be optimal transform for large classes of image. – DCT is orthogonal transform. • Spatial->frequency (where only few points required) – DCT generates coefficient that are easily quantized to achieve good compression of block. – DCT algorithms are well behaved and can be computed efficiently. – DCT algorithms are symmetrical • So inverse is also possible.
  • 10. DCT Calculation • C(i)C(j)= Normalization Factors. • Pixel(x,y)=2D image. • Cos factor and summation is added two times because one for row and another one for column.
  • 11. DCT Calculation • The output matrix represents the frequency domain DCT components. Row 0 column 0 has the coefficient 0f 172. This coefficient is much larger than other 63. so it is called as DC coefficient and other are called AC coefficient.
  • 12. Quantization • Quantization is process of reducing the precession of an integer there by reducing the number of bits required to store the inte ger. • DCT matrix is quantized to increase the compression. Quantized Coefficient (i,j)=DCT(i,j)/Quantum(i,j) • As the quantum value gets larger the quantisation coefficient gets smaller. 12
  • 13. 13
  • 14. Zigzag Sequence • The zigzag sequence starts at DC coefficient value. • Zigzag ordering is designed to facilitate entropy coding .
  • 15. Entropy Encoding • Uncertainty in a substance. • When the energy possessed to do the work decreases the entropy increases. • In Information theory a system that has a high degree of unpredictability has high entropy. • In data compression it is measure of the information content of a message in number of bits. • Entropy in number of bits=log 2(probability of object)
  • 16. Entropy Encoding • Example: Represent ‘T’ • Probability of T’s presence in a text string = 1/8 • Number of bits of entropy=3 bits. • If 7 T’s in text then=21 bits • In ASCII 8bit=56 bits
  • 17. Entropy Encoding • 2 types – Huffman coding – Arithmetic coding • Huffman coding requires that one or more coding sets of code table be specified by the application for coding and decoding. Table may be predefined or computed specifically for a given image. • Arithmetic coding does not require tables. It is able to adapt to the image statistic as it encode the image
  • 18. DC Coefficient Coding • DC components are differentially coded as (SIZE, Value) – Size: Encoded with a variable length code from Huffman table – Value: Encoded with a variable length integer. – D=DCx-DCx-1 • The code for a Value is derived from the following table
  • 19. Example: If a DC component is 40 and the previous DC component is 48. The difference is -8. Therefore it is coded as: 1010111 0111: The value for representing -8 101: The size from the same table reads 4. The corresponding code from the table at left is 101. 19
  • 20. AC Coefficient Coding • AC components are differentially coded as (Run length, size) • Run length: Number of consecutive zero-valued AC coefficient in the zigzag sequence matrix preceding a non zero AC coefficient. • Size: Number of bits used to encode the amplitude of the AC coefficient.