1 15-211 Fundamental Data Structures and Algorithms Margaret Reid-Miller 24 February 2005 LZW Compression.

Slides:



Advertisements
Similar presentations
Data Compression CS 147 Minh Nguyen.
Advertisements

Lecture 4 (week 2) Source Coding and Compression
Binary Trees CSC 220. Your Observations (so far data structures) Array –Unordered Add, delete, search –Ordered Linked List –??
Arithmetic Coding. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a How we can do better than Huffman? - I As we have seen, the.
Simplifying CFGs There are several ways in which context-free grammars can be simplified. One natural way is to eliminate useless symbols those that cannot.
Huffman Encoding Dr. Bernard Chen Ph.D. University of Central Arkansas.
Greedy Algorithms (Huffman Coding)
Data Compressor---Huffman Encoding and Decoding. Huffman Encoding Compression Typically, in files and messages, Each character requires 1 byte or 8 bits.
Algorithms for Data Compression
Lecture 6 Source Coding and Compression Dr.-Ing. Khaled Shawky Hassan
15-853Page : Algorithms in the Real World Suffix Trees.
296.3: Algorithms in the Real World
Lossless Compression - II Hao Jiang Computer Science Department Sept. 18, 2007.
Algorithm Programming Some Topics in Compression Bar-Ilan University תשס"ח by Moshe Fresko.
1 Huffman Codes. 2 Introduction Huffman codes are a very effective technique for compressing data; savings of 20% to 90% are typical, depending on the.
Lempel-Ziv Compression Techniques Classification of Lossless Compression techniques Introduction to Lempel-Ziv Encoding: LZ77 & LZ78 LZ78 Encoding Algorithm.
Lecture 6: Huffman Code Thinh Nguyen Oregon State University.
Lempel-Ziv Compression Techniques
E.G.M. PetrakisTries1  Trees of order >= 2  Variable length keys  The decision on what path to follow is taken based on potion of the key  Static environment,
Lempel-Ziv-Welch (LZW) Compression Algorithm
Lempel-Ziv Compression Techniques
CSE 143 Lecture 18 Huffman slides created by Ethan Apter
Lecture 4 Source Coding and Compression Dr.-Ing. Khaled Shawky Hassan
Sequential circuit design
Lossless Compression Multimedia Systems (Module 2 Lesson 3)
Fundamental Data Structures and Algorithms Klaus Sutner February 12, 2004 More LZW / Practicum.
Data Compression Algorithms for Energy-Constrained Devices in Delay Tolerant Networks Christopher M. Sadler and Margaret Martonosi In: Proc. of the 4th.
8. Compression. 2 Video and Audio Compression Video and Audio files are very large. Unless we develop and maintain very high bandwidth networks (Gigabytes.
Noiseless Coding. Introduction Noiseless Coding Compression without distortion Basic Concept Symbols with lower probabilities are represented by the binary.
Text Compression Spring 2007 CSE, POSTECH. 2 2 Data Compression Deals with reducing the size of data – Reduce storage space and hence storage cost Compression.
Source Coding-Compression
Information and Coding Theory Heuristic data compression codes. Lempel- Ziv encoding. Burrows-Wheeler transform. Juris Viksna, 2015.
Fundamental Structures of Computer Science Feb. 24, 2005 Ananda Guna Lempel-Ziv Compression.
Fundamental Structures of Computer Science March 23, 2006 Ananda Guna Lempel-Ziv Compression.
Fundamental Data Structures and Algorithms Aleks Nanevski February 10, 2004 based on a lecture by Peter Lee LZW Compression.
1 Strings CopyWrite D.Bockus. 2 Strings Def: A string is a sequence (possibly empty) of symbols from some alphabet. What do we use strings for? 1) Text.
 The amount of data we deal with is getting larger  Not only do larger files require more disk space, they take longer to transmit  Many times files.
Multimedia Data Introduction to Lossless Data Compression Dr Sandra I. Woolley Electronic, Electrical.
Compression.  Compression ratio: how much is the size reduced?  Symmetric/asymmetric: time difference to compress, decompress?  Lossless; lossy: any.
1 Source Coding and Compression Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204, Lecture 5.
ICS 220 – Data Structures and Algorithms Lecture 11 Dr. Ken Cosh.
ALGORITHMS FOR ISNE DR. KENNETH COSH WEEK 13.
The LZ family LZ77 LZ78 LZR LZSS LZB LZH – used by zip and unzip
Lossless Compression CIS 465 Multimedia. Compression Compression: the process of coding that will effectively reduce the total number of bits needed to.
Introduction to Algorithms Chapter 16: Greedy Algorithms.
Adaptive Huffman Coding. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a Why Adaptive Huffman Coding? Huffman coding suffers.
Data Compression Meeting October 25, 2002 Arithmetic Coding.
Recent Results in Combined Coding for Word-Based PPM Radu Rădescu George Liculescu Polytechnic University of Bucharest Faculty of Electronics, Telecommunications.
Huffman Codes Juan A. Rodriguez CS 326 5/13/2003.
Lecture 7 Source Coding and Compression Dr.-Ing. Khaled Shawky Hassan
CSE 143 Lecture 22 Huffman slides created by Ethan Apter
Prof. Paolo Ferragina, Algoritmi per "Information Retrieval" Basics
Lampel ZIV (LZ) code The Lempel-Ziv algorithm is a variable-to-fixed length code Basically, there are two versions of the algorithm LZ77 and LZ78 are the.
LZW (Lempel-Ziv-welch) compression method The LZW method to compress data is an evolution of the method originally created by Abraham Lempel and Jacob.
15-853Page :Algorithms in the Real World Data Compression III Lempel-Ziv algorithms Burrows-Wheeler Introduction to Lossy Compression.
Lossless Compression-Statistical Model Lossless Compression One important to note about entropy is that, unlike the thermodynamic measure of entropy,
CSE 589 Applied Algorithms Spring 1999
15-853:Algorithms in the Real World
Data Coding Run Length Coding
Data Compression.
Information and Coding Theory
Data Compression.
Applied Algorithmics - week7
Huffman Coding Based on slides by Ethan Apter & Marty Stepp
Information of the LO Subject: Information Theory
Lempel-Ziv-Welch (LZW) Compression Algorithm
Data Compression Reduce the size of data.
Chapter 11 Data Compression
High-capacity Reversible Data-hiding for LZW Codes
Presentation transcript:

Fundamental Data Structures and Algorithms Margaret Reid-Miller 24 February 2005 LZW Compression

Last Time…

3 Huffman Trees

4 Huffman’s Algorithm  Huffman’s algorithm gives the optimal prefix code.  For a nice online demo, see 

5 Huffman Compression  Huffman trees provide a straightforward method for file compression. 1.Read the file and compute frequencies 2.Use frequencies to build Huffman codes 3.Encode file using the codes 4.Write the codes (or tree) and encoded file into the output file.

6 Huffman decompression Decompression reverses the process. § Read the header in the compressed file, and build the code tree § Read the rest of the file, decode using the tree § Write to output

7 Beating Huffman  How about doing better than Huffman!  Impossible!  Huffman’s algorithm gives the optimal prefix code!  Right.  But who says we have to use a prefix code?

8 Example  Suppose we have a file containing abcdabcdabcdabcdabcdabcd… abcdabcd  This could be expressed very compactly as abcd^1000

Dictionary-Based Compression

10 Dictionary-based methods  Here is a simple idea:  Remember of “words” that we have seen, and replace them with a code number when we see them again.  The code is presumably shorter than the word  If words repeat this should produce nice compression.  and make additions to the dictionary as we read the input file.

11 Dictionary-based Methods  As we read the input file we keep adding new words to the dictionary to get more and more abbreviations: ( word, code ) Since we will always use the longest applicable abbreviation, the set of current words is prefix (so it looks like tries might be useful).

12 Fred Hacker’s Algorithm…  Fred now knows what to do… (, 1 ) Transmit 1, done.

13 Right?  Fred’s algorithm provides excellent compression, but…  …the receiver does not know what is in the dictionary!  And sending the dictionary is the same as sending the entire uncompressed file  Thus, we can’t decompress the “1”.

14 Hence…  …we need to build our dictionary in such a way that the receiver can rebuild the dictionary easily.

15 Lempel & Ziv (1977/78)

LZW Compression: The Binary Version LZW=variant of Lempel-Ziv Compression, by Terry Welch (1984)

17 Maintaining a Dictionary  We need a way of incrementally building up a dictionary during compression in such a way that…  …someone who wants to uncompress can “rediscover” the very same dictionary  And we already know that a convenient way to build a dictionary incrementally is to use a trie.

18 Getting off the ground Suppose we want to compress a file containing only letters a, b, c and d. It seems reasonable to start with a dictionary a:0 b:1 c:2 d:3 At least we can then deal with the first letter. And the receiver knows how to start.

19 Growing pains Now suppose the file starts like so: a b b a b b … We scan the a, look it up and output a 0. After scanning the b, we have seen the word ab. So, we add it to the dictionary a:0 b:1 c:2 d:3 ab:4

20 Growing pains We already scanned the first b. a b b a b b … Then we get another b. bb is not in the dictionary. So we output a 1 for the first b, and add bb to the dictionary a:0 b:1 c:2 d:3 ab:4 bb:5

21 So? Right, so far zero compression. We already scanned the second b. a b b a b b … Next we get an a. As ba is not in the dictionary, we output 1 for the b and put ba in the dictionary … d:3 ab:4 bb:5 ba:6 Still zero compression.

22 But now… We already scanned a. a b b a b b … We scan the next b, and ab : 4 is in the dictionary. We scan the next b, and don’t find abb in the dictionary. We output 4, and put abb into the dictionary. … d:3 ab:4 bb:5 ba:6 abb:7 We got compression, because 4 is shorter than ab.

23 Suppose the input continues a b b a b b b b a … We scan the next b, and bb:5 is in the dictionary We scan the next b, and don’t find bbb in the dictionary. We output 5, and put bbb into the dictionary … ab:4 bb:5 ba:6 abb:7 bbb:8 And so on

24 More Hits As our dictionary grows, we are able to replace longer and longer blocks by short code numbers. a b b a b b b b a … And we increase the dictionary at each step by adding another word.

25 More importantly  Since we extend our dictionary in such a simple way, it can be easily reconstructed on the other end.  Start with the same initialization, then  Read one code number after the other, look up the each one in the dictionary, and extend the dictionary as you go along.

26 Again: Extending where each prefix is in the dictionary. We stop when we fall out of the dictionary: a 1 a 2 a 3 …. a k b We scan a sequence of symbols a 1 a 2 a 3 …. a k

27 Again: Extending We output the code for a 1 a 2 a 3 …. a k and put a 1 a 2 a 3 …. a k b into the dictionary. Then we set a 1 = b And start all over.

28 Decoding Let's take a closer look at an example. Assume alphabet {a,b,c}. The code for aabbaabb is The decoding starts with dictionary D: a:0, b:1, c:2

29 Moving along The first 4 code words are already in D and produce output a a b b. As we go along, we extend D: a:0, b:1, c:2, aa:3, ab:4, bb:5 For the rest we get a a b b

30 Done We have also added to D: ba:6, aab:7 But these entries are never used. Everything is easy, since there is already an entry in D for each code number when we encounter it.

31 One more detail… One detail remains: how to build the dictionary for compression (decompression is easy). We need to be able to scan through a sequence of symbols and check if they form a prefix of a word already in the dictionary. Could use a balanced tree, but then each new symbol would launch a new search.

32 Tries! a b 1032 cd 4 a 5 d 6 d a:0 b:1 c:2 d:3 ba:4 ad:4 dd:6 Corresponds to dictionary

33 Tries Even better: in the LZW situation, we can add the new word to the trie dictionary in O(1) steps after discovering that the string is no longer a prefix of a dictionary word. Just add a new leaf to the last node touched.

Pretty Pictures

35 LZW: 4 Letter Example  Suppose our entire character set consists only of the four letters:  {a, b, c, d}  Let’s consider the compression of the string  baddad

36 Byte LZW: Compress example baddad Input: ^ a b Dictionary: Output: 1032 cd

37 Byte LZW: Compress example baddad Input: ^ a b Dictionary: Output: 1032 cd 1 4 a

38 Byte LZW: Compress example baddad Input: ^ a b Dictionary: Output: 1032 cd 10 4 a 5 d

39 Byte LZW: Compress example baddad Input: ^ a b Dictionary: Output: 1032 cd a 5 d 6 d

40 Byte LZW: Compress example baddad Input: ^ a b Dictionary: Output: 1032 cd a 5 d 6 d 7 a

41 Byte LZW: Compress example baddad Input: ^ a b Dictionary: Output: 1032 cd a 5 d 6 d 7 a

42 Byte LZW output  So, the input  baddad  compresses to   or compressed again using Huffman

43 Byte LZW: Uncompress example  The uncompress step for LZW is the most complicated part of the entire process.

44 Byte LZW: Uncompress example Input: ^ a b Dictionary: Output: 1032 cd

45 Byte LZW: Uncompress example Input: ^ a b Dictionary: Output: 1032 cd b

46 Byte LZW: Uncompress example Input: ^ a b Dictionary: Output: 1032 cd ba 4 a

47 Byte LZW: Uncompress example Input: ^ a b Dictionary: Output: 1032 cd bad 4 a 5 d

48 Byte LZW: Uncompress example Input: ^ a b Dictionary: Output: 1032 cd badd 4 a 5 d 6 d

49 Byte LZW: Uncompress example Input: ^ a b Dictionary: Output: 1032 cd baddad 4 a 5 d 6 d 7 a

50 Decoding difficulty When we decode, is the code number always in the dictionary? Unfortunately, no. It may happen that we run into a code number without having an appropriate entry in D. But, it can only happen in very special circumstances, and we can manufacture the missing entry.

51 A Bad Run Consider input a a b b b a a ==> After reading 0 0 1, we output a a b and extend D with codes for aa and ab 0:a, 1:b, 2:c, 3:aa, 4:ab

52 Disaster We have read from the input The dictionary is 0:a, 1:b, 2:c, 3:aa, 4:ab The next code number to read is 5, but it’s not in D. How could this have happened? Can we recover?

53 … narrowly averted This problem only arises when on the compressor end: the input contains a substring …s  s  s … compressor read s , output code c for s , and added c+1: s  s to the dictionary. Here s is a single symbol, but  a (possibly empty) word.

54 … narrowly averted (pt. 2) On the decompressor end, D contains c: s  but does not contain c+1: s  s the decompressor has already output x = s  and is now looking at unknown code number c+1.

55 … narrowly averted (pt. 3) But then the fix is to output x + first(x) where x is the last decompressed word, and first(x) the first symbol of x. Because x=s  was already output, we get the required s  s  s We also update the dictionary to contain the new entry x+first(x) = s  s.

56 In our example we have read from the input The last decompressed word is b, and the next code number to read is 5. Thus s = b  = empty The next word to output and add to D is s  s = bb Example

57 Summary Let x be the last word output. Ordinarily, D contains a word y matching to the next input code number. We output y and extend D with x+ first (y) But sometimes the encoder immediately uses what was last added to the dictionary. Then it must be x = s  and we output x + first(x) = s  s

58 Example (extended)  aabbbaabbaaabaababb s  s  s  s Input Output add to D 0 a 0+a3:aa 1+b4:ab 5-bb5:bb 3+aa6:bba 6+bba7:aab 7+aab8:bbaa 9-aaba9:aaba 5+bb 10:aabab s = a  = ab

59 Pseudo Code: Compression Initialize dictionary D to all words of length 1. Read all input characters: output code words from D, extend D whenever a new word appears. New code words: just an integer counter.

60 Less Pseudo initialize D; c = nextchar; // next input character W = c; // a string while( c = nextchar ) { if( W+c is in D ) // dictionary W = W + c; else output code(W); add W+c to D; W = c; } output code(W)

61 Pseudo Code: Decompression Initialize dictionary D with all words of length 1. Read all code words and - output corresponding words from D, - extend D at each step. This time the dictionary is of the form ( integer, word ) Keys are integers, values words.

62 Less Pseudo initialize D; c = nextcode; // first code number x = word(c); // corresponding word output x; First code number is easy: codes only a single symbol. Remember x (previous word).

63 More Less Pseudo while ( c = nextcode ) { if ( c is in D ) { y = word(c); ww = x + first(y); insert ww in D; } else {

64 The hard case else { y = x + first(x); insert y in D; } output y; x = y; }

65 LZW details In reality, one usually restricts the code words to be 12 or 16 bit integers. Hence, one may have to flush the dictionary ever so often. Thus it is important to conserve code numbers (see below).

66 LZW details Lastly, LZW generates as output a stream of integers. It makes perfect sense to try to compress these further, e.g., by Huffman.

67 Summary of LZW LZW is an adaptive, dictionary based compression method. Encoding is easy in LZW, but uses a special data structure (trie). Decoding is slightly complicated, requires no special data structures.