Region Based Huffman (RBH) Compression Technique with code interchange
نویسندگان
چکیده
منابع مشابه
Size Adaptive Region Based Huffman Compression Technique
A loss-less compression technique is proposed which uses a variable length Region formation technique to divide the input file into a number of variable length regions. Huffman codes are obtained for entire file after formation of regions. Symbols of each region are compressed one by one. Comparisons are made among proposed technique, Region Based Huffman compression technique and classical Huf...
متن کاملHuffman-based code compression techniques for embedded systems
Increasing embedded systems functionality causes a steep increase in code size. For instance, more than 60MB of software is installed in current state-of-the-art cars [9]. It is often challenging and cumbersome to host vast amount of software in an efficient way within a given hardware resource budget of an embedded system. This may be done by using code compression techniques, which compress t...
متن کاملWeb Page Compression using Huffman Coding Technique
Compression helps in reducing the redundancy in the data representation so as to reduce the storage requirement of it. Compression is an important technique used to improve web retrieval latency Compression is an important technique used to improve web retrieval latency. Plethora of algorithms is available for compressing the data. Some of the algorithms helps in achieving lossless compression ...
متن کاملImage Compression Based on Wavelet and Quantization with Optimal Huffman Code
This paper proposes a method for the compression of color images by Haar transform, quantization and construction of minimum redundancy code using conventional Huffman coding. Wavelet compression is accomplished by decomposing the row and column of the image matrix using the Harr transform. And the reconstruction of the image is feasible just from 1/4 of the decomposed image and even 1/16 of th...
متن کاملText Encryption with Huffman Compression
Communication between a sender and receiver needs security. It can be done in any form, like plain text or binary data. Changing the information to some unidentifiable form, can save it from assailants. For example, plain text can be coded using schemes so that a stranger cannot apprehend it. Cryptography is a subject or field which deals with the secret transmission of messages/ data between t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Malaysian Journal of Computer Science
سال: 2010
ISSN: 0127-9084
DOI: 10.22452/mjcs.vol23no2.4