The document discusses scalar quantization and the Lloyd-Max algorithm. It provides examples of using the Lloyd-Max algorithm to design scalar quantizers for Gaussian and Laplacian distributed signals. The algorithm works by iteratively calculating decision thresholds and representative levels to minimize mean squared error. At high rates, the distortion-rate function of a Lloyd-Max quantizer is approximated. The document also discusses entropy-constrained scalar quantization and an iterative algorithm to design those quantizers.
Digital Signal Processing[ECEG-3171]-Ch1_L06Rediet Moges
This Digital Signal Processing Lecture material is the property of the author (Rediet M.) . It is not for publication,nor is it to be sold or reproduced.
#Africa#Ethiopia
An antenna array (or array antenna) is a set of multiple connected antennas which work together as a single antenna, to transmit or receive radio waves. The individual antenna elements are connected to a single receiver or transmitter by feedlines that feed the power to the elements in a specific phase relationship. The radio waves radiated by each individual antenna combine and superpose, adding together (interfering constructively) to enhance the power radiated in desired directions, and cancelling (interfering destructively) to reduce the power radiated in other directions. Similarly, when used for receiving, the separate radio frequency currents from the individual antennas combine in the receiver with the correct phase relationship to enhance signals received from the desired directions and cancel signals from undesired directions.
Digital Signal Processing[ECEG-3171]-Ch1_L06Rediet Moges
This Digital Signal Processing Lecture material is the property of the author (Rediet M.) . It is not for publication,nor is it to be sold or reproduced.
#Africa#Ethiopia
An antenna array (or array antenna) is a set of multiple connected antennas which work together as a single antenna, to transmit or receive radio waves. The individual antenna elements are connected to a single receiver or transmitter by feedlines that feed the power to the elements in a specific phase relationship. The radio waves radiated by each individual antenna combine and superpose, adding together (interfering constructively) to enhance the power radiated in desired directions, and cancelling (interfering destructively) to reduce the power radiated in other directions. Similarly, when used for receiving, the separate radio frequency currents from the individual antennas combine in the receiver with the correct phase relationship to enhance signals received from the desired directions and cancel signals from undesired directions.
Nyquist criterion for distortion less baseband binary channelPriyangaKR1
binary transmission system
From design point of view – frequency response of the channel and transmitted pulse shape are specified; the frequency response of the transmit and receive filters has to be determined so as to reconstruct [bk]
Deep learning takes on Signal ProcessingVivek Kumar
This talk describes the journey of leading domain experts in audio & speech signal processing and computer vision from using signal processing as their primary tool to using deep learning as their first option. This change was not just about using new technology, but also about changing the mindset and reframed the way R&D is done. Some of the reasons behind the shift are discussed along with, what worked and what didn't. Lessons learned are summarized in hopes to guide and inform other teams planning to go through a similar transition.
Error control codes are necessary for transmission and storage of large volumes of date sensitive to errors. BCH codes and Reed Solomon codes are the most important class of multiple error correcting codes for binary and non-binary channels respectively. Peterson and later Berlekamp and Massey discovered powerful algorithms which became viable with the help of new digital technology. Use of Galois fields gave a structured approach to designing of these codes. This presentation deals with above in a very structured and systematic manner.
Sampling is a Simple method to convert analog signal into discrete Signal by using any one of its three methods
if the sampling frequency is twice or greater than twice then sampled signal can be convert back into analog signal easily......
Image segmentation is based on three principal concepts
Detection of discontinuities.
Thresholding
Region Processing
Morphological Watershed Image Segmentation embodies many of the concepts of above three approaches
Fourier Transform : Its power and Limitations – Short Time Fourier Transform – The Gabor Transform - Discrete Time Fourier Transform and filter banks – Continuous Wavelet Transform – Wavelet Transform Ideal Case – Perfect Reconstruction Filter Banks and wavelets – Recursive multi-resolution decomposition – Haar Wavelet – Daubechies Wavelet.
Nyquist criterion for distortion less baseband binary channelPriyangaKR1
binary transmission system
From design point of view – frequency response of the channel and transmitted pulse shape are specified; the frequency response of the transmit and receive filters has to be determined so as to reconstruct [bk]
Deep learning takes on Signal ProcessingVivek Kumar
This talk describes the journey of leading domain experts in audio & speech signal processing and computer vision from using signal processing as their primary tool to using deep learning as their first option. This change was not just about using new technology, but also about changing the mindset and reframed the way R&D is done. Some of the reasons behind the shift are discussed along with, what worked and what didn't. Lessons learned are summarized in hopes to guide and inform other teams planning to go through a similar transition.
Error control codes are necessary for transmission and storage of large volumes of date sensitive to errors. BCH codes and Reed Solomon codes are the most important class of multiple error correcting codes for binary and non-binary channels respectively. Peterson and later Berlekamp and Massey discovered powerful algorithms which became viable with the help of new digital technology. Use of Galois fields gave a structured approach to designing of these codes. This presentation deals with above in a very structured and systematic manner.
Sampling is a Simple method to convert analog signal into discrete Signal by using any one of its three methods
if the sampling frequency is twice or greater than twice then sampled signal can be convert back into analog signal easily......
Image segmentation is based on three principal concepts
Detection of discontinuities.
Thresholding
Region Processing
Morphological Watershed Image Segmentation embodies many of the concepts of above three approaches
Fourier Transform : Its power and Limitations – Short Time Fourier Transform – The Gabor Transform - Discrete Time Fourier Transform and filter banks – Continuous Wavelet Transform – Wavelet Transform Ideal Case – Perfect Reconstruction Filter Banks and wavelets – Recursive multi-resolution decomposition – Haar Wavelet – Daubechies Wavelet.
Nonlinear Stochastic Programming by the Monte-Carlo methodSSA KPI
AACIMP 2010 Summer School lecture by Leonidas Sakalauskas. "Applied Mathematics" stream. "Stochastic Programming and Applications" course. Part 4.
More info at http://summerschool.ssa.org.ua
AACIMP 2010 Summer School lecture by Leonidas Sakalauskas. "Applied Mathematics" stream. "Stochastic Programming and Applications" course. Part 5.
More info at http://summerschool.ssa.org.ua
A crash coarse in stochastic Lyapunov theory for Markov processes (emphasis is on continuous time)
See also the survey for models in discrete time,
https://netfiles.uiuc.edu/meyn/www/spm_files/MarkovTutorial/MarkovTutorialUCSB2010.html
Solvability of Fractionl q -Difference Equations of Order 2 3 Involving ...journal ijrtem
In this paper, we study the existence of solutions for non-linear fractional q-difference
equations of order
2 3
involving the p-Laplacian operator with various boundary value conditions. By
using the Banach contraction mapping principle, we prove that, under certain conditions, the suggested
non-linear fractional boundary value problem involving the p-Laplacian operator has a unique solution. Finally,
we illustrate our results with some examples.
Solvability of Fractionl q -Difference Equations of Order 2 3 Involving ...IJRTEMJOURNAL
In this paper, we study the existence of solutions for non-linear fractional q-difference
equations of order
2 3
involving the p-Laplacian operator with various boundary value conditions. By
using the Banach contraction mapping principle, we prove that, under certain conditions, the suggested
non-linear fractional boundary value problem involving the p-Laplacian operator has a unique solution. Finally,
we illustrate our results with some examples.
Parameter Estimation in Stochastic Differential Equations by Continuous Optim...SSA KPI
AACIMP 2010 Summer School lecture by Gerhard Wilhelm Weber. "Applied Mathematics" stream. "Modern Operational Research and Its Mathematical Methods with a Focus on Financial Mathematics" course. Part 8.
More info at http://summerschool.ssa.org.ua
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Quantization
1. Quantization
Input-output characteristic of a scalar quantizer
x ˆ
x
Q Sometimes, this
Output ˆ
x convention is used:
ˆ
xq 2
M represen-
tative levels
x Q q
ˆ
xq 1
ˆ
xq -1
t q+2 q Q x
ˆ
tq t q+1
input signal x
M-1 decision
thresholds
Bernd Girod: EE398A Image and Video Compression Quantization no. 1
2. Example of a quantized waveform
Original and Quantized Signal
Quantization Error
Bernd Girod: EE398A Image and Video Compression Quantization no. 2
3. Lloyd-Max scalar quantizer
Problem : For a signal x with given PDF f X ( x) find a quantizer with
M representative levels such that
d MSE E X X min.
2
ˆ
Solution : Lloyd-Max quantizer
[Lloyd,1957] [Max,1960]
tq xq 1 xq q 1, 2,, M -1
1
M-1 decision thresholds exactly ˆ ˆ
2
half-way between representative tq1
levels.
M representative levels in the x f X ( x)dx
centroid of the PDF between two xq q 0,1, , M -1
tq
ˆ tq 1
successive decision thresholds.
f X ( x)dx
Necessary (but not sufficient) tq
conditions
Bernd Girod: EE398A Image and Video Compression Quantization no. 3
4. Iterative Lloyd-Max quantizer design
1. Guess initial set of representative levels xq q 0,1, 2,, M -1
ˆ
2. Calculate decision thresholds
tq xq 1 xq q 1, 2,, M -1
1
ˆ ˆ
2
3. Calculate new representative levels
tq1
x f X ( x)dx
xq q 0,1,, M -1
tq
ˆ tq1
tq
f X ( x)dx
4. Repeat 2. and 3. until no further distortion reduction
Bernd Girod: EE398A Image and Video Compression Quantization no. 4
5. Example of use of the Lloyd algorithm (I)
X zero-mean, unit-variance Gaussian r.v.
Design scalar quantizer with 4 quantization indices with
minimum expected distortion D*
Optimum quantizer, obtained with the Lloyd algorithm
Decision thresholds -0.98, 0, 0.98
Representative levels –1.51, -0.45, 0.45, 1.51
D*=0.12=9.30 dB
Boundary
Reconstruction
Bernd Girod: EE398A Image and Video Compression Quantization no. 5
6. Example of use of the Lloyd algorithm (II)
Convergence
Initial quantizer A: Initial quantizer B:
decision thresholds –3, 0 3 decision thresholds –½, 0, ½
Quantization Function
Quantization Function
6
6
4
4
2 2
0 0
-2 -2
-4 -4
-6
5 10 15 -6
5 10 15
Iteration Number Iteration Number
0.4 0.2
0.2
D
0.15
D
0 0.1
0 5 10 15 0 5
SNROUT final = 9.2978 SNROUT10 = 9.298 15
SNROUT [dB]
SNROUT [dB]
10 10 final
5 8
0 6
0 5 10 15 0 5 10 15
Iteration Number Iteration Number
After 6 iterations, in both cases, (D-D*)/D*<1%
Bernd Girod: EE398A Image and Video Compression Quantization no. 6
7. Example of use of the Lloyd algorithm (III)
X zero-mean, unit-variance Laplacian r.v.
Design scalar quantizer with 4 quantization indices with
minimum expected distortion D*
Optimum quantizer, obtained with the Lloyd algorithm
Decision thresholds -1.13, 0, 1.13
Representative levels -1.83, -0.42, 0.42, 1.83
D*=0.18=7.54 dB
Threshold
Representative
Bernd Girod: EE398A Image and Video Compression Quantization no. 7
8. Example of use of the Lloyd algorithm (IV)
Convergence
Initial quantizer A, Initial quantizer B,
decision thresholds –3, 0 3 decision thresholds –½, 0, ½
Quantization Function
Quantization Function
10 10
5 5
0 0
-5 -5
-10 -10
2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16
Iteration Number Iteration Number
0.4 0.4
0.2
D
0.2
D
0 0
0 5 10 15 0 5 10 15
8
8
SNR [dB]
SNR [dB]
6 6
SNRfinal = 7.5415 SNRfinal = 7.5415
4 4
0 5 10 15 0 5
Iteration Number Iteration Number10 15
After 6 iterations, in both cases, (D-D*)/D*<1%
Bernd Girod: EE398A Image and Video Compression Quantization no. 8
9. Lloyd algorithm with training data
1. Guess initial set of representative levels xq ; q 0,1, 2,, M -1
ˆ
2. ˆ
Assign each sample xi in training set T to closest representative xq
Bq x T : Q x q q 0,1,2,, M -1
3. Calculate new representative levels
1
xq
ˆ
Bq
x
xBq
q 0,1,, M -1
4. Repeat 2. and 3. until no further distortion reduction
Bernd Girod: EE398A Image and Video Compression Quantization no. 9
10. Lloyd-Max quantizer properties
Zero-mean quantization error
ˆ
E X X 0
Quantization error and reconstruction decorrelated
ˆ ˆ
E X X X 0
Variance subtraction property
E
2
ˆ
X
X X 2
2
X
ˆ
Bernd Girod: EE398A Image and Video Compression Quantization no. 10
11. High rate approximation
Approximate solution of the "Max quantization problem,"
assuming high rate and smooth PDF [Panter, Dite, 1951]
1
x( x) const
3 f X ( x)
Distance between two
Probability density
successive quantizer
function of x
representative levels
Approximation for the quantization error variance:
3
1 3 f ( x)dx
d E X X
2
ˆ
12M 2 X
x
Number of representative levels
Bernd Girod: EE398A Image and Video Compression Quantization no. 11
12. High rate approximation (cont.)
High-rate distortion-rate function for scalar Lloyd-Max quantizer
d R 2 X 22 R
2
3
1 3
with f X ( x)dx
2 2
X
12 x
Some example values for
2
uniform 1
Laplacian 9
2 4.5
3
Gaussian 2.721
2
Bernd Girod: EE398A Image and Video Compression Quantization no. 12
13. High rate approximation (cont.)
Partial distortion theorem: each interval makes an (approximately)
equal contribution to overall mean-squared error
Pr ti X ti 1 E
X X 2 t X t
ˆ
i i 1
Pr t j X t j 1 E
X X 2 t X t
ˆ
j j 1
for all i, j
[Panter, Dite, 1951], [Fejes Toth, 1959], [Gersho, 1979]
Bernd Girod: EE398A Image and Video Compression Quantization no. 13
14. Entropy-constrained scalar quantizer
Lloyd-Max quantizer optimum for fixed-rate encoding, how can we
do better for variable-length encoding of quantizer index?
Problem : For a signal x with given pdf f X ( x) find a quantizer with
rate M 1
ˆ
R H X pq log 2 pq
q 0
such that
d MSE E X X min.
2
ˆ
Solution: Lagrangian cost function
J d R E X X H X min.
2
ˆ ˆ
Bernd Girod: EE398A Image and Video Compression Quantization no. 14
15. Iterative entropy-constrained scalar quantizer design
1. Guess initial set of representative levels xq ; q 0,1, 2,, M -1
ˆ
and corresponding probabilities pq
2. Calculate M-1 decision thresholds
xq -1 xq
ˆ ˆ log 2 pq 1 log 2 pq
tq = q 1, 2,, M -1
2 2 xq -1 xq
ˆ ˆ
3. Calculate M new representative levels and probabilities pq
tq1
xf X ( x)dx
xq q 0,1,, M -1
tq
ˆ tq1
tq
f X ( x)dx
4. Repeat 2. and 3. until no further reduction in Lagrangian cost
Bernd Girod: EE398A Image and Video Compression Quantization no. 15
16. Lloyd algorithm for entropy-constrained
quantizer design based on training set
1. Guess initial set of representative levels xq ; q 0,1, 2,, M -1
ˆ
and corresponding probabilities pq
2. Assign each sample xi in training set T to representative ˆ
xq
J x q xi xq log 2 pq
2
minimizing Lagrangian cost i
ˆ
Bq x T : Q x q q 0,1, 2,, M -1
3. Calculate new representative levels and probabilities pq
1
xq
ˆ
Bq
x
xBq
q 0,1,, M -1
4. Repeat 2. and 3. until no further reduction in overall Lagrangian
cost
i
2
J J xi x Q x i log p 2 q xi
xi xi
Bernd Girod: EE398A Image and Video Compression Quantization no. 16
17. Example of the EC Lloyd algorithm (I)
X zero-mean, unit-variance Gaussian r.v.
Design entropy-constrained scalar quantizer with rate R≈2 bits, and
minimum distortion D*
Optimum quantizer, obtained with the entropy-constrained Lloyd
algorithm
11 intervals (in [-6,6]), almost uniform
D*=0.09=10.53 dB, R=2.0035 bits (compare to fixed-length example)
Threshold
Representative level
Bernd Girod: EE398A Image and Video Compression Quantization no. 17
18. Example of the EC Lloyd algorithm (II)
Same Lagrangian multiplier λ used in all experiments
Initial quantizer A, 15 intervals Initial quantizer B, only 4 intervals
(>11) in [-6,6], with the same length (<11) in [-6,6], with the same length
Quantization Function
6 6
Quantization Function
4 4
2 2
0 0
-2 -2
-4 -4
-6 -6
5 10 15 20 25 30 35 40 5 10 15 20
Iteration Number Iteration Number
12 12
R [bit/symbol] SNR [dB]
R [bit/symbol] SNR [dB]
SNRfinal = 8.9452
10 10
SNRfinal = 10.5363 8
8
6 6
0 5 10 15 20 25 30 35 40 0 5 10 15 20
2.5 2.5
Rfinal = 1.7723
2 2
Rfinal = 2.0044 1.5
1.5
1 1
0 5 10 15 20 25 30 35 40 0 5 10 15 20
Iteration Number Iteration Number
Bernd Girod: EE398A Image and Video Compression Quantization no. 18
19. Example of the EC Lloyd algorithm (III)
X zero-mean, unit-variance Laplacian r.v.
Design entropy-constrained scalar quantizer with rate R≈2 bits
and minimum distortion D*
Optimum quantizer, obtained with the entropy-constrained Lloyd
algorithm
21 intervals (in [-10,10]), almost uniform
D*= 0.07=11.38 dB, R= 2.0023 bits (compare to fixed-length example)
Decision threshold
Representative level
Bernd Girod: EE398A Image and Video Compression Quantization no. 19
20. Example of the EC Lloyd algorithm (IV)
Same Lagrangian multiplier λ used in all experiments
Initial quantizer A, 25 intervals Initial quantizer B, only 4 intervals
(>21 & odd) in [-10,10], with the (<21) in [-10,10], with the same length
same length
Quantization Function
Quantization Function
10 10
5 5
0 0
-5 -5
-10 -10
5 10 15 20 25 30 35 40 5 10 15 20
Iteration Number Iteration Number
15 15
R [bit/symbol] SNR [dB]
R [bit/symbol] SNR [dB]
10 10
SNRfinal = 11.407
5 5 SNRfinal = 7.4111
0 5 10 15 20 25 30 35 40 0 5 10 15 20
3 3
Rfinal = 2.0063
2 2 Rfinal = 1.6186
1 1
0 5 10 15 20 25 30 35 40 0 5 10 15 20
Iteration Number Iteration Number
Convergence in cost faster than convergence of decision thresholds
Bernd Girod: EE398A Image and Video Compression Quantization no. 20
21. High-rate results for EC scalar quantizers
For MSE distortion and high rates, uniform quantizers (followed by
entropy coding) are optimum [Gish, Pierce, 1968]
Distortion and entropy for smooth PDF and fine quantizer interval
2
H X h X log 2
ˆ
2
d d
2
12
2
Distortion-rate function
1 2 h X 2 R
d R 2 2
12
e
is factor or 1.53 dB from Shannon Lower Bound
6
1 2 h X 2 R
D R 2 2
2 e
Bernd Girod: EE398A Image and Video Compression Quantization no. 21
22. Comparison of high-rate performance of
scalar quantizers
High-rate distortion-rate function
d R 2 X 22 R
2
Scaling factor 2
Shannon LowBd Lloyd-Max Entropy-coded
6
Uniform 0.703 1 1
e
e 9 e2
Laplacian 0.865 4.5 1.232
2 6
3 e
Gaussian 1 2.721 1.423
2 6
Bernd Girod: EE398A Image and Video Compression Quantization no. 22
23. Deadzone uniform quantizer
Quantizer
ˆ
output x
Quantizer
input x
Bernd Girod: EE398A Image and Video Compression Quantization no. 23
24. Embedded quantizers
Motivation: “scalability” – decoding of compressed
bitstreams at different rates (with different qualities)
Nested quantization intervals
Q0 x
Q1
Q2
In general, only one quantizer can be optimum
(exception: uniform quantizers)
Bernd Girod: EE398A Image and Video Compression Quantization no. 24
25. Example: Lloyd-Max quantizers for Gaussian PDF
0 1
0 0 1 1
0 1 0 1
2-bit and 3-bit optimal -.98 .98
quantizers not embeddable
0 0 0 01 1 1 1
Performance loss for 0 0 1 10 0 1 1
embedded quantizers 0 1 0 10 1 0 1
-1.75 -1.05 -.50 .50 1.05 1.75
Bernd Girod: EE398A Image and Video Compression Quantization no. 25
26. Information theoretic analysis
“Successive refinement” – Embedded coding at multiple
rates w/o loss relative to R-D function
ˆ
E d ( X , X 1 ) D1 ˆ
I ( X ; X 1 ) R( D1 )
ˆ
E d ( X , X 2 ) D2 ˆ
I ( X ; X ) R( D )
2 2
“Successive refinement” with distortions D1 and D2 D1
can be achieved iff there exists a conditional distribution
fX ,X
ˆ ˆ X
( x1 , x2 , x) f X
ˆ ˆ ˆ X
ˆ
( x2 , x) f X
ˆ ˆ
X2
ˆ ˆ
( x1 , x2 )
1 2 2 1
Markov chain condition
ˆ ˆ
X X 2 X1
[Equitz,Cover, 1991]
Bernd Girod: EE398A Image and Video Compression Quantization no. 26
27. Embedded deadzone uniform quantizers
x=0
8 4
Q0 x
4 2
Q1
Q2
2
Supported in JPEG-2000 with general for
quantization of wavelet coefficients.
Bernd Girod: EE398A Image and Video Compression Quantization no. 27
29. LBG algorithm
Lloyd algorithm generalized for VQ [Linde, Buzo, Gray, 1980]
Best representative Best partitioning
vectors of training set
for given partitioning for given
of training set representative
vectors
Assumption: fixed code word length
Code book unstructured: full search
Bernd Girod: EE398A Image and Video Compression Quantization no. 29
30. Design of entropy-coded vector quantizers
Extended LBG algorithm for entropy-coded VQ
[Chou, Lookabaugh, Gray, 1989]
Lagrangian cost function: solve unconstrained problem rather than
constrained problem
J d R E
ˆ
ˆ
X X 2 H X min.
Unstructured code book: full search for
J xi q xi xq log 2 pq
2
ˆ
The most general coder structure:
Any source coder can be interpreted as VQ with VLC!
Bernd Girod: EE398A Image and Video Compression Quantization no. 30
34. Reading
Taubman, Marcellin, Sections 3.2, 3.4
J. Max, “Quantizing for Minimum Distortion,” IEEE Trans.
Information Theory, vol. 6, no. 1, pp. 7-12, March 1960.
S. P. Lloyd, “Least Squares Quantization in PCM,” IEEE
Trans. Information Theory, vol. 28, no. 2, pp. 129-137,
March 1982.
P. A. Chou, T. Lookabaugh, R. M. Gray, “Entropy-
constrained vector quantization,” IEEE Trans. Signal
Processing, vol. 37, no. 1, pp. 31-42, January 1989.
Bernd Girod: EE398A Image and Video Compression Quantization no. 34