SlideShare uma empresa Scribd logo
1 de 30
Arithmetic Coding
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20062
How we can do better than
Huffman? - I
 As we have seen, the main drawback of
Huffman scheme is that it has problems when
there is a symbol with very high probability
 Remember static Huffman redundancy bound
where is the probability of the most likely
simbol
1redundancy 0.086p≤ +
1p
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20063
How we can do better than
Huffman? - II
 The only way to overcome this limitation is to
use, as symbols, “blocks” of several
characters.
In this way the per-symbol inefficiency is
spread over the whole block
 However, the use of blocks is difficult to
implement as there must be a block for every
possible combination of symbols, so block
number increases exponentially with their
length
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20064
How we can do better than
Huffman? - III
 Huffman Coding is optimal in its
framework
 static model
 one symbol, one word
adaptive Huffman
blocking
arithmetic
coding
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20065
The key idea
 Arithmetic coding completely bypasses the
idea of replacing an input symbol with a
specific code.
 Instead, it takes a stream of input symbols
and replaces it with a single floating point
number in
 The longer and more complex the message, the
more bits are needed to represents the output
number
[0,1)
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20066
The key idea - II
 The output of an arithmetic coding is, as usual,
a stream of bits
 However we can think that there is a prefix 0,
and the stream represents a fractional binary
number between 0 and 1
 In order to explain the algorithm, numbers will
be shown as decimal, but obviously they are
always binary
01101010 0110 00. 101→
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20067
An example - I
 String bccb from the alphabet {a,b,c}
 Zero-frequency problem solved initializing at 1
all character counters
 When the first b is to be coded all symbols
have a 33% probability (why?)
 The arithmetic coder maintains two numbers,
low and high, which represent a subinterval
[low,high) of the range [0,1)
 Initially low=0 and high=1
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20068
An example - II
 The range between low and high is divided
between the symbols of the alphabet,
according to their probabilities
low
high
0
1
0.333
3
0.666
7
a
b
c(P[c]=1/3)
(P[b]=1/3)
(P[a]=1/3)
9
An example - III
low
high
0
1
0.333
3
0.666
7
a
b
c
b
low = 0.3333
high = 0.6667
 P[a]=1/4
 P[b]=2/4
 P[c]=1/4
new probabilities
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200610
An example - IV
new probabilities
 P[a]=1/5
 P[b]=2/5
 P[c]=2/5
low
high
0.333
3
0.666
7
0.416
7
0.583
4
a
b
c
c
low = 0.5834
high = 0.6667
(P[c]=1/4)
(P[b]=2/4)
(P[a]=1/4)
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200611
An example - V
new probabilities
 P[a]=1/6
 P[b]=2/6
 P[c]=3/6
low
high
0.583
4
0.666
7
0.600
1
0.633
4
a
b
c
c
low = 0.6334
high = 0.6667
(P[c]=2/5)
(P[b]=2/5)
(P[a]=1/5)
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200612
An example - VI
 Final interval
[0.6390,0.6501)
 we can send 0.64
low
high
0.633
4
0.666
7
0.639
0
0.650
1
a
b
c
low = 0.6390
high = 0.6501
b
(P[c]=3/6)
(P[b]=2/6)
(P[a]=1/6)
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200613
An example - summary
 Starting from the range between 0 and 1 we
restrict ourself each time to the subinterval
that codify the given symbol
 At the end the whole sequence can be codified
by any of the numbers in the final range (but
mind the brackets...)
14
An example - summary
0
1
0.333
3
0.666
7
a
b
c
0.6667
0.3333
1/3
1/3
1/3
0.4167
0.5834
1/4
2/4
1/4
a
b
c
0. 5834
0. 6667
2/5
2/5
1/5
0.6001
0.6334
a
b
c
0. 6667
0.6334 a
b
c
0.6390
0.6501
3/6
2/6
1/6
[0.6390, 0.6501) 0.64
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200615
Another example - I
 Consider encoding the name BILL GATES
Again, we need the frequency of all the
characters in the text.
chr freq.
space 0.1
A 0.1
B 0.1
E 0.1
G 0.1
I 0.1
L 0.2
S 0.1
T 0.1
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200616
Another example - II
character probability range
space 0.1 [0.00, 0.10)
A 0.1 [0.10, 0.20)
B 0.1 [0.20, 0.30)
E 0.1 [0.30, 0.40)
G 0.1 [0.40, 0.50)
I 0.1 [0.50, 0.60)
L 0.2 [0.60, 0.80)
S 0.1 [0.80, 0.90)
T 0.1 [0.90, 1.00)
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200617
Another example - III
chr low high
0.0 1.0
B 0.2 0.3
I 0.25 0.26
L 0.256 0.258
L 0.2572 0.2576
Space 0.25720 0.25724
G 0.257216 0.257220
A 0.2572164 0.2572168
T 0.25721676 0.2572168
E 0.257216772 0.257216776
S 0.2572167752 0.2572167756
The final low value, 0.2572167752 will uniquely encode
the name BILL GATES
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200618
Decoding - I
 Suppose we have to decode 0.64
 The decoder needs symbol probabilities, as it
simulates what the encoder must have been
doing
 It starts with low=0 and high=1 and divides
the interval exactly in the same manner as the
encoder (a in [0, 1/3), b in [1/3, 2/3), c in
[2/3, 1)
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200619
Decoding - II
 The trasmitted number falls in the interval
corresponding to b, so b must have been the
first symbol encoded
 Then the decoder evaluates the new values for
low (0.3333) and for high (0.6667), updates
symbol probabilities and divides the range
from low to high according to these new
probabilities
 Decoding proceeds until the full string has
been reconstructed
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200620
Decoding - III
 0.64 in [0.3333, 0.6667) b
 0.64 in [0.5834, 0.6667) c...
and so on...
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200621
Why does it works?
 More bits are necessary to express a number
in a smaller interval
 High-probability events do not decrease very
much interval range, while low probability
events result a much smaller next interval
 The number of digits needed is proportional to
the negative logarithm of the size of the
interval
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200622
Why does it works?
 The size of the final interval is the product of
the probabilities of the symbols coded, so the
logarithm of this product is the sum of the
logarithm of each term
 So a symbol s with probability Pr[s]
contributes
bits to the output, that is equal to symbol
probability content (uncertainty)!!
log Pr[ ]s−
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200623
Why does it works?
 For this reason arithmetic coding is nearly
optimum as number of output bits, and it is
capable to code very high probability events in
just a fraction of bit
 In practice, the algorithm is not exactly
optimal because of the use of limited precision
arithmetic, and because trasmission requires
to send a whole number of bits
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200624
A trick - I
 As the algorithm was described until now, the
whole output is available only when encoding
are finished
 In practice, it is possible to output bits during
the encoding, which avoids the need for higher
and higher arithmetic precision in the encoding
 The trick is to observe that when low and high
are close they could share a common prefix
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200625
A trick - II
 This prefix will remain forever in the two
values, so we can transmit it and remove from
low and high
 For example, during the encoding of “bccb”, it
has happened that after the encoding of the
third character the range is low=0.6334,
high=0.6667
 We can remove the common prefix, sending 6
to the output and transforming low and high
into 0.334 and 0,667
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200626
The encoding step
 To code symbol s, where symbols are
numbered from 1 to n and symbol i has
probability Pr[i]
 low_bound =
 high_bound =
 range = high - low
 low = low + range * low_bound
 high = low + range * high_bound
1
1
Pr[ ]
s
i
i
−
=∑
1
Pr[ ]
s
i
i=∑
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200627
The decoding step
 The symbols are numbered from 1 to n and
value is the arithmetic code to be processed
 Find s such that
 Return symbol s
 Perform the same range-narrowing step of the encoding step
1
1 1
( )
Pr[ ] Pr[ ]
( )
s s
i i
value low
i i
high low
−
= =
−
≤ ≤
−
∑ ∑
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200628
Implementing arithmetic coding
 As mentioned early, arithmetic coding uses
binary fractional number with unlimited
arithmetic precision
 Working with finite precision (16 or 32 bits)
causes compression be a little worser than
entropy bound
 It is possible also to build coders based on
integer arithmetic, with another little
degradation of compression
29
Arithmetic coding vs. Huffman coding
 In tipical English text, the space character is
the most common, with a probability of about
18%, so Huffman redundancy is quite small.
Moreover this is an upper bound
 On the contrary, in black and white images,
arithmetic coding is much better than Huffman
coding, unless a blocking technique is used
A A. coding requires less memory, as symbol
representation is calculated on the fly
A A. coding is more suitable for high
performance models, where there are
confident predictions
Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200630
Arithmetic coding vs. Huffman coding
H H. decoding is generally faster than a.
decoding
H In a. coding it is not easy to start decoding in
the middle of the stream, while in H. coding
we can use “starting points”
 In large collections of text and images,
Huffman coding is likely to be used for the
text, and arithmeting coding for the images

Mais conteúdo relacionado

Mais procurados

Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image CompressionMathankumar S
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processingkiruthiammu
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filteringGautam Saxena
 
Predictive coding
Predictive codingPredictive coding
Predictive codingp_ayal
 
Wavelet transform in image compression
Wavelet transform in image compressionWavelet transform in image compression
Wavelet transform in image compressionjeevithaelangovan
 
Edge linking in image processing
Edge linking in image processingEdge linking in image processing
Edge linking in image processingVARUN KUMAR
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processingAhmed Daoud
 
Histogram Processing
Histogram ProcessingHistogram Processing
Histogram ProcessingAmnaakhaan
 
5. gray level transformation
5. gray level transformation5. gray level transformation
5. gray level transformationMdFazleRabbi18
 
Interpixel redundancy
Interpixel redundancyInterpixel redundancy
Interpixel redundancyNaveen Kumar
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression modelslavanya marichamy
 

Mais procurados (20)

Noise Models
Noise ModelsNoise Models
Noise Models
 
Huffman coding
Huffman coding Huffman coding
Huffman coding
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
Image compression
Image compressionImage compression
Image compression
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processing
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
Bit plane coding
Bit plane codingBit plane coding
Bit plane coding
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Hit and-miss transform
Hit and-miss transformHit and-miss transform
Hit and-miss transform
 
Data Redundacy
Data RedundacyData Redundacy
Data Redundacy
 
Predictive coding
Predictive codingPredictive coding
Predictive coding
 
Wavelet transform in image compression
Wavelet transform in image compressionWavelet transform in image compression
Wavelet transform in image compression
 
Edge linking in image processing
Edge linking in image processingEdge linking in image processing
Edge linking in image processing
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
Histogram Processing
Histogram ProcessingHistogram Processing
Histogram Processing
 
Run length encoding
Run length encodingRun length encoding
Run length encoding
 
5. gray level transformation
5. gray level transformation5. gray level transformation
5. gray level transformation
 
JPEG Image Compression
JPEG Image CompressionJPEG Image Compression
JPEG Image Compression
 
Interpixel redundancy
Interpixel redundancyInterpixel redundancy
Interpixel redundancy
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
 

Destaque

Ch 04 Arithmetic Coding (Ppt)
Ch 04 Arithmetic Coding (Ppt)Ch 04 Arithmetic Coding (Ppt)
Ch 04 Arithmetic Coding (Ppt)anithabalaprabhu
 
Module 4 Arithmetic Coding
Module 4 Arithmetic CodingModule 4 Arithmetic Coding
Module 4 Arithmetic Codinganithabalaprabhu
 
Data compression huffman coding algoritham
Data compression huffman coding algorithamData compression huffman coding algoritham
Data compression huffman coding algorithamRahul Khanwani
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisRamakant Soni
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compressionanithabalaprabhu
 
Text Localizaion Output
Text Localizaion OutputText Localizaion Output
Text Localizaion OutputVikas Goyal
 
IRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman codingIRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman codingIRJET Journal
 
Walkie talkie ppt
Walkie talkie pptWalkie talkie ppt
Walkie talkie ppttbs123
 
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingGray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingCSCJournals
 
Presen_Segmentation
Presen_SegmentationPresen_Segmentation
Presen_SegmentationVikas Goyal
 

Destaque (20)

Arithmetic Coding
Arithmetic CodingArithmetic Coding
Arithmetic Coding
 
Ch 04 Arithmetic Coding (Ppt)
Ch 04 Arithmetic Coding (Ppt)Ch 04 Arithmetic Coding (Ppt)
Ch 04 Arithmetic Coding (Ppt)
 
Module 4 Arithmetic Coding
Module 4 Arithmetic CodingModule 4 Arithmetic Coding
Module 4 Arithmetic Coding
 
Data compression huffman coding algoritham
Data compression huffman coding algorithamData compression huffman coding algoritham
Data compression huffman coding algoritham
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysis
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
06 Arithmetic 1
06 Arithmetic 106 Arithmetic 1
06 Arithmetic 1
 
Adaptive Huffman Coding
Adaptive Huffman CodingAdaptive Huffman Coding
Adaptive Huffman Coding
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compression
 
Data compression
Data compressionData compression
Data compression
 
Compression
CompressionCompression
Compression
 
Output
OutputOutput
Output
 
Text Localizaion Output
Text Localizaion OutputText Localizaion Output
Text Localizaion Output
 
Lec-03 Entropy Coding I: Hoffmann & Golomb Codes
Lec-03 Entropy Coding I: Hoffmann & Golomb CodesLec-03 Entropy Coding I: Hoffmann & Golomb Codes
Lec-03 Entropy Coding I: Hoffmann & Golomb Codes
 
IRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman codingIRJET-Lossless Image compression and decompression using Huffman coding
IRJET-Lossless Image compression and decompression using Huffman coding
 
Walkie talkie ppt
Walkie talkie pptWalkie talkie ppt
Walkie talkie ppt
 
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingGray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
 
Presen_Segmentation
Presen_SegmentationPresen_Segmentation
Presen_Segmentation
 
Huffman coding
Huffman codingHuffman coding
Huffman coding
 
Grouping
GroupingGrouping
Grouping
 

Semelhante a Arithmetic coding

Digital image processing- Compression- Different Coding techniques
Digital image processing- Compression- Different Coding techniques Digital image processing- Compression- Different Coding techniques
Digital image processing- Compression- Different Coding techniques sudarmani rajagopal
 
Huffman coding.ppt
Huffman coding.pptHuffman coding.ppt
Huffman coding.pptvace1
 
Chapter 4 Lossless Compression Algorithims.pptx
Chapter 4 Lossless Compression Algorithims.pptxChapter 4 Lossless Compression Algorithims.pptx
Chapter 4 Lossless Compression Algorithims.pptxMedinaBedru
 
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...Helan4
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesDom Mike
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correctioninventionjournals
 
2,Combinational Logic Circuits.pdf
2,Combinational Logic Circuits.pdf2,Combinational Logic Circuits.pdf
2,Combinational Logic Circuits.pdfDamotTesfaye
 
A Lossless FBAR Compressor
A Lossless FBAR CompressorA Lossless FBAR Compressor
A Lossless FBAR CompressorPhilip Alipour
 
Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications Surya Chandra
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
review of number systems and codes
review of number systems and codesreview of number systems and codes
review of number systems and codessrinu247
 
Bt0064 logic design
Bt0064 logic designBt0064 logic design
Bt0064 logic designsmumbahelp
 

Semelhante a Arithmetic coding (20)

Digital image processing- Compression- Different Coding techniques
Digital image processing- Compression- Different Coding techniques Digital image processing- Compression- Different Coding techniques
Digital image processing- Compression- Different Coding techniques
 
Compression ii
Compression iiCompression ii
Compression ii
 
Huffman coding.ppt
Huffman coding.pptHuffman coding.ppt
Huffman coding.ppt
 
Compression Ii
Compression IiCompression Ii
Compression Ii
 
Compression Ii
Compression IiCompression Ii
Compression Ii
 
Chapter 4 Lossless Compression Algorithims.pptx
Chapter 4 Lossless Compression Algorithims.pptxChapter 4 Lossless Compression Algorithims.pptx
Chapter 4 Lossless Compression Algorithims.pptx
 
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniques
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
 
2,Combinational Logic Circuits.pdf
2,Combinational Logic Circuits.pdf2,Combinational Logic Circuits.pdf
2,Combinational Logic Circuits.pdf
 
A Lossless FBAR Compressor
A Lossless FBAR CompressorA Lossless FBAR Compressor
A Lossless FBAR Compressor
 
Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications
 
Y03301460154
Y03301460154Y03301460154
Y03301460154
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
review of number systems and codes
review of number systems and codesreview of number systems and codes
review of number systems and codes
 
Source coding
Source codingSource coding
Source coding
 
PS3
PS3PS3
PS3
 
Mpeg 2
Mpeg 2Mpeg 2
Mpeg 2
 
Digi qestions
Digi qestionsDigi qestions
Digi qestions
 
Bt0064 logic design
Bt0064 logic designBt0064 logic design
Bt0064 logic design
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Arithmetic coding

  • 2. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20062 How we can do better than Huffman? - I  As we have seen, the main drawback of Huffman scheme is that it has problems when there is a symbol with very high probability  Remember static Huffman redundancy bound where is the probability of the most likely simbol 1redundancy 0.086p≤ + 1p
  • 3. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20063 How we can do better than Huffman? - II  The only way to overcome this limitation is to use, as symbols, “blocks” of several characters. In this way the per-symbol inefficiency is spread over the whole block  However, the use of blocks is difficult to implement as there must be a block for every possible combination of symbols, so block number increases exponentially with their length
  • 4. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20064 How we can do better than Huffman? - III  Huffman Coding is optimal in its framework  static model  one symbol, one word adaptive Huffman blocking arithmetic coding
  • 5. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20065 The key idea  Arithmetic coding completely bypasses the idea of replacing an input symbol with a specific code.  Instead, it takes a stream of input symbols and replaces it with a single floating point number in  The longer and more complex the message, the more bits are needed to represents the output number [0,1)
  • 6. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20066 The key idea - II  The output of an arithmetic coding is, as usual, a stream of bits  However we can think that there is a prefix 0, and the stream represents a fractional binary number between 0 and 1  In order to explain the algorithm, numbers will be shown as decimal, but obviously they are always binary 01101010 0110 00. 101→
  • 7. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20067 An example - I  String bccb from the alphabet {a,b,c}  Zero-frequency problem solved initializing at 1 all character counters  When the first b is to be coded all symbols have a 33% probability (why?)  The arithmetic coder maintains two numbers, low and high, which represent a subinterval [low,high) of the range [0,1)  Initially low=0 and high=1
  • 8. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-20068 An example - II  The range between low and high is divided between the symbols of the alphabet, according to their probabilities low high 0 1 0.333 3 0.666 7 a b c(P[c]=1/3) (P[b]=1/3) (P[a]=1/3)
  • 9. 9 An example - III low high 0 1 0.333 3 0.666 7 a b c b low = 0.3333 high = 0.6667  P[a]=1/4  P[b]=2/4  P[c]=1/4 new probabilities
  • 10. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200610 An example - IV new probabilities  P[a]=1/5  P[b]=2/5  P[c]=2/5 low high 0.333 3 0.666 7 0.416 7 0.583 4 a b c c low = 0.5834 high = 0.6667 (P[c]=1/4) (P[b]=2/4) (P[a]=1/4)
  • 11. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200611 An example - V new probabilities  P[a]=1/6  P[b]=2/6  P[c]=3/6 low high 0.583 4 0.666 7 0.600 1 0.633 4 a b c c low = 0.6334 high = 0.6667 (P[c]=2/5) (P[b]=2/5) (P[a]=1/5)
  • 12. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200612 An example - VI  Final interval [0.6390,0.6501)  we can send 0.64 low high 0.633 4 0.666 7 0.639 0 0.650 1 a b c low = 0.6390 high = 0.6501 b (P[c]=3/6) (P[b]=2/6) (P[a]=1/6)
  • 13. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200613 An example - summary  Starting from the range between 0 and 1 we restrict ourself each time to the subinterval that codify the given symbol  At the end the whole sequence can be codified by any of the numbers in the final range (but mind the brackets...)
  • 14. 14 An example - summary 0 1 0.333 3 0.666 7 a b c 0.6667 0.3333 1/3 1/3 1/3 0.4167 0.5834 1/4 2/4 1/4 a b c 0. 5834 0. 6667 2/5 2/5 1/5 0.6001 0.6334 a b c 0. 6667 0.6334 a b c 0.6390 0.6501 3/6 2/6 1/6 [0.6390, 0.6501) 0.64
  • 15. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200615 Another example - I  Consider encoding the name BILL GATES Again, we need the frequency of all the characters in the text. chr freq. space 0.1 A 0.1 B 0.1 E 0.1 G 0.1 I 0.1 L 0.2 S 0.1 T 0.1
  • 16. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200616 Another example - II character probability range space 0.1 [0.00, 0.10) A 0.1 [0.10, 0.20) B 0.1 [0.20, 0.30) E 0.1 [0.30, 0.40) G 0.1 [0.40, 0.50) I 0.1 [0.50, 0.60) L 0.2 [0.60, 0.80) S 0.1 [0.80, 0.90) T 0.1 [0.90, 1.00)
  • 17. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200617 Another example - III chr low high 0.0 1.0 B 0.2 0.3 I 0.25 0.26 L 0.256 0.258 L 0.2572 0.2576 Space 0.25720 0.25724 G 0.257216 0.257220 A 0.2572164 0.2572168 T 0.25721676 0.2572168 E 0.257216772 0.257216776 S 0.2572167752 0.2572167756 The final low value, 0.2572167752 will uniquely encode the name BILL GATES
  • 18. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200618 Decoding - I  Suppose we have to decode 0.64  The decoder needs symbol probabilities, as it simulates what the encoder must have been doing  It starts with low=0 and high=1 and divides the interval exactly in the same manner as the encoder (a in [0, 1/3), b in [1/3, 2/3), c in [2/3, 1)
  • 19. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200619 Decoding - II  The trasmitted number falls in the interval corresponding to b, so b must have been the first symbol encoded  Then the decoder evaluates the new values for low (0.3333) and for high (0.6667), updates symbol probabilities and divides the range from low to high according to these new probabilities  Decoding proceeds until the full string has been reconstructed
  • 20. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200620 Decoding - III  0.64 in [0.3333, 0.6667) b  0.64 in [0.5834, 0.6667) c... and so on...
  • 21. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200621 Why does it works?  More bits are necessary to express a number in a smaller interval  High-probability events do not decrease very much interval range, while low probability events result a much smaller next interval  The number of digits needed is proportional to the negative logarithm of the size of the interval
  • 22. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200622 Why does it works?  The size of the final interval is the product of the probabilities of the symbols coded, so the logarithm of this product is the sum of the logarithm of each term  So a symbol s with probability Pr[s] contributes bits to the output, that is equal to symbol probability content (uncertainty)!! log Pr[ ]s−
  • 23. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200623 Why does it works?  For this reason arithmetic coding is nearly optimum as number of output bits, and it is capable to code very high probability events in just a fraction of bit  In practice, the algorithm is not exactly optimal because of the use of limited precision arithmetic, and because trasmission requires to send a whole number of bits
  • 24. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200624 A trick - I  As the algorithm was described until now, the whole output is available only when encoding are finished  In practice, it is possible to output bits during the encoding, which avoids the need for higher and higher arithmetic precision in the encoding  The trick is to observe that when low and high are close they could share a common prefix
  • 25. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200625 A trick - II  This prefix will remain forever in the two values, so we can transmit it and remove from low and high  For example, during the encoding of “bccb”, it has happened that after the encoding of the third character the range is low=0.6334, high=0.6667  We can remove the common prefix, sending 6 to the output and transforming low and high into 0.334 and 0,667
  • 26. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200626 The encoding step  To code symbol s, where symbols are numbered from 1 to n and symbol i has probability Pr[i]  low_bound =  high_bound =  range = high - low  low = low + range * low_bound  high = low + range * high_bound 1 1 Pr[ ] s i i − =∑ 1 Pr[ ] s i i=∑
  • 27. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200627 The decoding step  The symbols are numbered from 1 to n and value is the arithmetic code to be processed  Find s such that  Return symbol s  Perform the same range-narrowing step of the encoding step 1 1 1 ( ) Pr[ ] Pr[ ] ( ) s s i i value low i i high low − = = − ≤ ≤ − ∑ ∑
  • 28. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200628 Implementing arithmetic coding  As mentioned early, arithmetic coding uses binary fractional number with unlimited arithmetic precision  Working with finite precision (16 or 32 bits) causes compression be a little worser than entropy bound  It is possible also to build coders based on integer arithmetic, with another little degradation of compression
  • 29. 29 Arithmetic coding vs. Huffman coding  In tipical English text, the space character is the most common, with a probability of about 18%, so Huffman redundancy is quite small. Moreover this is an upper bound  On the contrary, in black and white images, arithmetic coding is much better than Huffman coding, unless a blocking technique is used A A. coding requires less memory, as symbol representation is calculated on the fly A A. coding is more suitable for high performance models, where there are confident predictions
  • 30. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a. 2005-200630 Arithmetic coding vs. Huffman coding H H. decoding is generally faster than a. decoding H In a. coding it is not easy to start decoding in the middle of the stream, while in H. coding we can use “starting points”  In large collections of text and images, Huffman coding is likely to be used for the text, and arithmeting coding for the images