Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.

Slides:



Advertisements
Similar presentations
EE 4780 Huffman Coding Example. Bahadir K. Gunturk2 Huffman Coding Example Suppose X is a source producing symbols; the symbols comes from the alphabet.
Advertisements

Fig. 4-1, p Fig. 4-2, p. 109 Fig. 4-3, p. 110.
Michael Alves, Patrick Dugan, Robert Daniels, Carlos Vicuna
INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, ICT '09. TAREK OUNI WALID AYEDI MOHAMED ABID NATIONAL ENGINEERING SCHOOL OF SFAX New Low Complexity.
P.464. Table 13-1, p.465 Fig. 13-1, p.466 Fig. 13-2, p.467.
Fig. 11-1, p p. 360 Fig. 11-2, p. 361 Fig. 11-3, p. 361.
Lecture 6: Huffman Code Thinh Nguyen Oregon State University.
Table 6-1, p Fig. 6-1, p. 162 p. 163 Fig. 6-2, p. 164.
JPEG.
Error Concealment For Fine Granularity Scalable Video Transmission Hua Cai; Guobin Shen; Feng Wu; Shipeng Li; Bing Zeng; Multimedia and Expo, Proceedings.
Video Streaming: An FEC-Based Novel Approach Jianfei Cai, Chang Wen Chen Electrical and Computer Engineering, Canadian Conference on.
CSE 326 Huffman coding Richard Anderson. Coding theory Conversion, Encryption, Compression Binary coding Variable length coding A B C D E F.
Lossless Compression - I Hao Jiang Computer Science Department Sept. 13, 2007.
Data Compression Basics & Huffman Coding
A Concealment Method for Shape Information in MPEG-4 Coded Video Sequences Shahram Shirani, Berna Erol, and Faouzi Kossentini IEEE TRANSACTIONS ON MULTIMEDIA,
Basics of Compression Goals: to understand how image/audio/video signals are compressed to save storage and increase transmission efficiency to understand.
1 Efficient packet classification using TCAMs Authors: Derek Pao, Yiu Keung Li and Peng Zhou Publisher: Computer Networks 2006 Present: Chen-Yu Lin Date:
Algorithm Design & Analysis – CS632 Group Project Group Members Bijay Nepal James Hansen-Quartey Winter
Entropy coding Present by 陳群元. outline constraints  Compression efficiency  Computational efficiency  Error robustness.
1 Analysis of Algorithms Chapter - 08 Data Compression.
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. J.Almeida, J.Barros Instituto de Telecomunicações Universidade do Porto Joint.
A Memory-efficient Huffman Decoding Algorithm
Low-Power H.264 Video Compression Architecture for Mobile Communication Student: Tai-Jung Huang Advisor: Jar-Ferr Yang Teacher: Jenn-Jier Lien.
CS654: Digital Image Analysis Lecture 34: Different Coding Techniques.
A Fast LBG Codebook Training Algorithm for Vector Quantization Presented by 蔡進義.
An Algorithm for Construction of Error-Correcting Symmetrical Reversible Variable Length Codes Chia-Wei Lin, Ja-Ling Wu, Jun-Cheng Chen Presented by Jun-Cheng.
An Effective Three-step Search Algorithm for Motion Estimation
Bahareh Sarrafzadeh 6111 Fall 2009
Semi-Parallel Reconfigurable Architecture for Real-time LDPC decoding Karkooti, M.; Cavallaro, J.R.; Information Technology: Coding and Computing, 2004.
Low Power Huffman Coding for High Performance Data Transmission Chiu-Yi Chen,Yu-Ting Pai, Shanq-Jang Ruan, International Conference on, ICHIT '06,
Lossless Decomposition and Huffman Codes Sophia Soohoo CS 157B.
1Computer Sciences Department. 2 Advanced Design and Analysis Techniques TUTORIAL 7.
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
بسم الله الرحمن الرحيم My Project Huffman Code. Introduction Introduction Encoding And Decoding Encoding And Decoding Applications Applications Advantages.
Huffman encoding.
New Efficient Image Encryption Scheme Based on Partial Encryption Karl Martin Multimedia Lab Dept. of Electrical and Computer Eng. University of Toronto.
SIMD Implementation of Discrete Wavelet Transform Jake Adriaens Diana Palsetia.
EE465: Introduction to Digital Image Processing
Assignment 6: Huffman Code Generation
A Secret Information Hiding Scheme Based on Switching Tree Coding
Why Compress? To reduce the volume of data to be transmitted (text, fax, images) To reduce the bandwidth required for transmission and to reduce storage.
Source :Journal of visual Communication and Image Representation
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Advanced Algorithms Analysis and Design
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Direct Sequence Spread Spectrum Modulation and Demodulation using Compressive Sensing Under the guidance of M.Venugopala Rao Submitted by K.Y.K.Kumari.
Improved Visual Secret Sharing Scheme for QR Code Applications
Distributed Compression For Binary Symetric Channels
A Restricted Region-based Data-hiding Scheme
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
CSE 326 Huffman coding Richard Anderson.
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Block Based MAP Segmentation for Image Compression
Hiding Information in VQ Index Tables with Reversibility
Digital Steganography Utilizing Features of JPEG Images
An Algorithm for Compression of Bilevel Images
Efficient Huffman Decoding
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Homework #2 Due May 29 , Consider a (2,1,4) convolutional code with g(1) = 1+ D2, g(2) = 1+ D + D2 + D3 a. Draw the.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Huffman Coding Greedy Algorithm
Source: IEEE Transactions on Circuits and Systems,
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Predictive Grayscale Image Coding Scheme Using VQ and BTC
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng Cheng

Outline Introduction The Decoding Algorithm Discussion and Conclusions

Introduction Huffman codes are being widely used in image and video compression. The paper has proposed a two-step algorithm to decode Huffman codes.

Outline Introduction The Decoding Algorithm Discussion and Conclusions

The Decoding Algorithm The first step, the subset or partition corresponding to the leading codeword is determined. The paper defines a function lmbc(), which takes a sequence of bits as input and returns the position of the first-bit-change starting from the leading bit.

The Decoding Algorithm Fig.1 The Huffman tree of codewords

The Decoding Algorithm Table 1. Huffman Table

The Decoding Algorithm Example, consider the bitstream B = which corresponds to gbpc.

The Decoding Algorithm The paper notes that the codewords in a particular partition of Table 1 need not have the same length. The paper creates a one-dimensional array actlen.

The Decoding Algorithm Table 2. Modified Huffman Table

The Decoding Algorithm Fig. 2. The decoding data structures

Outline Introduction The Decoding Algorithm Discussion and Conclusion

Discussion and Conclusions The proposed algorithm requires very few computations to decode a codeword, and the complexity is independent of the height h of the Huffman tree.