SlideShare a Scribd company logo
1 of 18
Application of Delta
Encoding In Data
compression
Nisha Menon K
Mtech Communication Engg
Roll No: 16
12/6/2013

1
Contents
•
•
•
•
•
•
•
•

Delta encoding
Delta compression
Features of Delta coding
Tools for delta compression
Applications
Extension of delta coding
Disadvantages
Conclusion

12/6/2013

2
Delta Encoding
• The term delta encoding, (from the Greek letter Δ, which
in mathematics, denotes a difference) refers to several
techniques that store data as the difference between
successive samples (or characters), rather than directly
storing the samples themselves.

•

The first value in the delta encoded file is the same as
the first value in the original data.

• All the following values in the encoded file are equal to
the difference (delta) between the corresponding value
in the input file, and the previous value in the input file.
12/6/2013

3
Example

12/6/2013

4
Delta compression
• Delta encoding used for data compression is known as
delta compression

• It is a lossless compression technique – restored data is
identical to original
• Delta encoding can be used for data compression when
the values in the original data are smooth, that is, there
is typically only a small change between adjacent
values.
12/6/2013

5
• Delta compression is the process of encoding a target
le with respect to one or several similar source les.
• If a delta’s target version is newer than its reference
version in the history, then it is referred to as a forward
delta. A reverse delta has the opposite orientation: an
older target version and a newer reference version.
•

Reverse
delta

Forward
delta
12/6/2013

6
.

The key feature is that the delta encoded signal
has a lower amplitude than the original signal. In
other words, delta encoding has increased the
probability that each sample's value will be near
zero, and decreased the probability that it will be
far from zero.
12/6/2013

7
Features of Delta coding
• Delta compression algorithms take advantage of the
statistical correlations between different files or packets
so that common sequences between two files can be
encoded using a copy reference.

• From a logical point of view the difference between two
data values is the information required to obtain one
value from the other i.e. relative entropy.
• Delta encoding followed by Huffman and/or run-length
encoding is a common strategy for compressing signals.
12/6/2013

8
Tools for delta compression
• Unix diff
Classic tool for generating deltas.
Limited to text files

• Vcdiff
Delta encoding in HTTP and is employed in Google's Shared
Dictionary Compression over HTTP technology used in Chrome
browser.

• Xdelta
This is similar to diff, but it is targeted for binary files and does
not generate human readable output.

• Zdelta
modification of the vcdiff
12/6/2013

9
Applications
• Delta compression forms the core of fast and efficient content
download

• Software Revision Control Systems:
For maintaining the revision history of software projects and other
documents . In these systems, multiple, often almost identical, versions of
each object have to be stored in order to allow the users to retrieve past
versions.

• Delta Compression at the File System Level:
The Xdelta File System (XDFS) aims to provide efficient support for delta
compression at the file system level using a delta compressor called xdelta.
This allows the efficient implementation of revision control systems of files.

• Software Distribution:
To generate software patches that can be efficiently transmitted over a
network in order to update installed software packages.
12/6/2013

10
Improving HTTP performance:
To improve the latency for web accesses, by exploiting the
similarity between current and outdated versions of a web page.
This can significantly decrease the amount of data sent to the
client, and is thus more appropriate for clients connected via
low-bandwidth links such as cellular modems.
It has also been observed that web pages on the same server
often have a high degree of similarity (due to common layout
and menu structure) that could be exploited with delta
compression techniques.
Client already has an
old version of a page in
his cache

He send a tag
identifying this version
to server

The server then sends
the delta between old
and current version

12/6/2013

11
• Application in wireless sensor
In a wireless sensor network, sensor readings and other streamed
values can be expressed as the change in the value from some
expected value.
In many data sets, with well chosen expected values, these changes
tend to be small relative to the range of possible values and lead to a
high frequency of values within a small range.

• Efficient Web Page Storage:
The similarities between different versions of the same page or
different pages on the same web site could also be used for increased
storage.

12/6/2013

12
• ECG compression
The successive samples of ecg have high correlation and
small difference between them so it can be effectively
quantised by Delta compression
• IFF 8SVX sound format applies delta compression to raw
sound data before transmission.

12/6/2013

13
Extension of Delta coding
• The idea used in delta encoding can be expanded into a
more complicated technique called Linear Predictive
Coding, or LPC.
• The algorithms used by LPC are similar to recursive
filters, making use of the z-transform and other
intensively mathematical techniques.
99 samples
are encoded

Work on
sample
number 100

Most likely
value for
sample
100??

Predict the
most
probable
value by
looking last
several
samples

12/6/2013

14
• Linear Predictive Coding (LPC) is one of the methods of
compression that models the process of speech production.
• Linear prediction filters attempt to predict future values of the
input signal based on past signals.
•

LPC models speech as an autoregressive process, and sends
the parameters of the process as opposed to sending the
speech itself.

• A variation of delta encoding which encodes differences
between the prefixes or suffixes of strings is called
incremental encoding. It is particularly effective for sorted
lists with small differences between strings, such as a list of
words from a dictionary.
12/6/2013

15
Disadvantages
• To know the value of the signal at any point in time one
has the read (know) all the previous values.
• Data appearing in the target that has no similar data in
the source is still compressed. In some cases, where the
source and target have nothing in common, the delta is
equivalent to a compressed form of the target
• If the original signal is not changing, or is changing in a
straight line, delta encoding will result in runs of
samples having the same value.
12/6/2013

16
Conclusion
• Delta coding is beneficial only for values which are
changing smoothly
•

For higher compression efficiency delta coding can be
used along with other compression techniques

12/6/2013

17
THANKYOU
12/6/2013

18

More Related Content

What's hot

Hci lecture03
Hci lecture03Hci lecture03
Hci lecture03WaqasAbbas14
 
3rd sem ppt for wavelet
3rd sem ppt for wavelet3rd sem ppt for wavelet
3rd sem ppt for waveletgandimare
 
video compression techique
video compression techiquevideo compression techique
video compression techiqueAshish Kumar
 
Quality of service
Quality of serviceQuality of service
Quality of serviceIsmail Mukiibi
 
8. introduction to small scale fading
8. introduction to small scale fading8. introduction to small scale fading
8. introduction to small scale fadingJAIGANESH SEKAR
 
E1 LINK IS EUROPEAN FORMAT
E1 LINK IS EUROPEAN FORMAT E1 LINK IS EUROPEAN FORMAT
E1 LINK IS EUROPEAN FORMAT HimanshiSingh71
 
Multiplexing : Wave Division Multiplexing
Multiplexing : Wave Division MultiplexingMultiplexing : Wave Division Multiplexing
Multiplexing : Wave Division MultiplexingDr Rajiv Srivastava
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple accessJAIGANESH SEKAR
 
Human Memory
Human MemoryHuman Memory
Human MemoryNimo Gill
 
Spread Spectrum
Spread SpectrumSpread Spectrum
Spread SpectrumVarun Bansal
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionSaikrishna Tanguturu
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDHAhmar Hashmi
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rulesAlan Dix
 
HCI 3e - Ch 1: The human
HCI 3e - Ch 1:  The humanHCI 3e - Ch 1:  The human
HCI 3e - Ch 1: The humanAlan Dix
 
Chapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9eChapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9eadpeer
 
Human computer interaction -Design and software process
Human computer interaction -Design and software processHuman computer interaction -Design and software process
Human computer interaction -Design and software processN.Jagadish Kumar
 

What's hot (20)

Clocks
ClocksClocks
Clocks
 
Hci lecture03
Hci lecture03Hci lecture03
Hci lecture03
 
3rd sem ppt for wavelet
3rd sem ppt for wavelet3rd sem ppt for wavelet
3rd sem ppt for wavelet
 
video compression techique
video compression techiquevideo compression techique
video compression techique
 
Adaptive filter
Adaptive filterAdaptive filter
Adaptive filter
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
smds
smdssmds
smds
 
8. introduction to small scale fading
8. introduction to small scale fading8. introduction to small scale fading
8. introduction to small scale fading
 
E1 LINK IS EUROPEAN FORMAT
E1 LINK IS EUROPEAN FORMAT E1 LINK IS EUROPEAN FORMAT
E1 LINK IS EUROPEAN FORMAT
 
Multiplexing : Wave Division Multiplexing
Multiplexing : Wave Division MultiplexingMultiplexing : Wave Division Multiplexing
Multiplexing : Wave Division Multiplexing
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple access
 
Human Memory
Human MemoryHuman Memory
Human Memory
 
Spread Spectrum
Spread SpectrumSpread Spectrum
Spread Spectrum
 
Line coding
Line codingLine coding
Line coding
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rules
 
HCI 3e - Ch 1: The human
HCI 3e - Ch 1:  The humanHCI 3e - Ch 1:  The human
HCI 3e - Ch 1: The human
 
Chapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9eChapter 6 - Digital Data Communication Techniques 9e
Chapter 6 - Digital Data Communication Techniques 9e
 
Human computer interaction -Design and software process
Human computer interaction -Design and software processHuman computer interaction -Design and software process
Human computer interaction -Design and software process
 

Viewers also liked

Data Compression (Huffman)
Data Compression (Huffman)Data Compression (Huffman)
Data Compression (Huffman)Ali Mehmood
 
Oracle ERP
Oracle ERPOracle ERP
Oracle ERPrmustofa
 
Data comparation
Data comparationData comparation
Data comparationJay Choudhary
 
3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compression3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compressionShubham Jain
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresVideoguy
 
Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingVideoguy
 

Viewers also liked (7)

Data Compression (Huffman)
Data Compression (Huffman)Data Compression (Huffman)
Data Compression (Huffman)
 
Oracle ERP
Oracle ERPOracle ERP
Oracle ERP
 
ppt
pptppt
ppt
 
Data comparation
Data comparationData comparation
Data comparation
 
3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compression3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compression
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_Pres
 
Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video Streaming
 

Similar to Delta encoding in data compression by Nisha Menon K studying mtech at fisat

01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.ppt01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.pptHarshitPal37
 
LOCK-FREE PARALLEL ACCESS COLLECTIONS
LOCK-FREE PARALLEL ACCESS COLLECTIONSLOCK-FREE PARALLEL ACCESS COLLECTIONS
LOCK-FREE PARALLEL ACCESS COLLECTIONSijdpsjournal
 
Lock free parallel access collections
Lock free parallel access collectionsLock free parallel access collections
Lock free parallel access collectionsijdpsjournal
 
Super Computer
Super ComputerSuper Computer
Super Computergueste3bbd0
 
Aca2 10 11
Aca2 10 11Aca2 10 11
Aca2 10 11Sumit Mittu
 
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptx
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptxAlgorithms-Flowcharts-Data-Types-and-Pseudocodes.pptx
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptxRobertCarreonBula
 
Parallel programming model
Parallel programming modelParallel programming model
Parallel programming modeleasy notes
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...Nikhil Jain
 
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemJPINFOTECH JAYAPRAKASH
 
60141457-Oracle-Golden-Gate-Presentation.ppt
60141457-Oracle-Golden-Gate-Presentation.ppt60141457-Oracle-Golden-Gate-Presentation.ppt
60141457-Oracle-Golden-Gate-Presentation.pptpadalamail
 
Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"
Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"
Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"Fwdays
 
Software architecture unit 4
Software architecture unit 4Software architecture unit 4
Software architecture unit 4yawani05
 
Modelling pairwise key predistribution in the presence of unreliable links
Modelling pairwise key predistribution in the presence of unreliable links Modelling pairwise key predistribution in the presence of unreliable links
Modelling pairwise key predistribution in the presence of unreliable links Saikiran Gvs
 
Big data analytics K.Kiruthika II-M.Sc.,Computer Science Bonsecours college f...
Big data analytics K.Kiruthika II-M.Sc.,Computer Science Bonsecours college f...Big data analytics K.Kiruthika II-M.Sc.,Computer Science Bonsecours college f...
Big data analytics K.Kiruthika II-M.Sc.,Computer Science Bonsecours college f...Kiruthikak14
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEEMEMTECHSTUDENTPROJECTS
 
Using In-Memory Encrypted Databases on the Cloud
Using In-Memory Encrypted Databases on the CloudUsing In-Memory Encrypted Databases on the Cloud
Using In-Memory Encrypted Databases on the CloudFrancesco Pagano
 

Similar to Delta encoding in data compression by Nisha Menon K studying mtech at fisat (20)

01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.ppt01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.ppt
 
Hpc 6 7
Hpc 6 7Hpc 6 7
Hpc 6 7
 
LOCK-FREE PARALLEL ACCESS COLLECTIONS
LOCK-FREE PARALLEL ACCESS COLLECTIONSLOCK-FREE PARALLEL ACCESS COLLECTIONS
LOCK-FREE PARALLEL ACCESS COLLECTIONS
 
Lock free parallel access collections
Lock free parallel access collectionsLock free parallel access collections
Lock free parallel access collections
 
Super Computer
Super ComputerSuper Computer
Super Computer
 
Aca2 10 11
Aca2 10 11Aca2 10 11
Aca2 10 11
 
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptx
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptxAlgorithms-Flowcharts-Data-Types-and-Pseudocodes.pptx
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptx
 
Parallel programming model
Parallel programming modelParallel programming model
Parallel programming model
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
 
ewsn09
ewsn09ewsn09
ewsn09
 
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
 
60141457-Oracle-Golden-Gate-Presentation.ppt
60141457-Oracle-Golden-Gate-Presentation.ppt60141457-Oracle-Golden-Gate-Presentation.ppt
60141457-Oracle-Golden-Gate-Presentation.ppt
 
Hydan
HydanHydan
Hydan
 
Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"
Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"
Serhiy Kalinets "Embracing architectural challenges in the modern .NET world"
 
Software architecture unit 4
Software architecture unit 4Software architecture unit 4
Software architecture unit 4
 
Modelling pairwise key predistribution in the presence of unreliable links
Modelling pairwise key predistribution in the presence of unreliable links Modelling pairwise key predistribution in the presence of unreliable links
Modelling pairwise key predistribution in the presence of unreliable links
 
Big data analytics K.Kiruthika II-M.Sc.,Computer Science Bonsecours college f...
Big data analytics K.Kiruthika II-M.Sc.,Computer Science Bonsecours college f...Big data analytics K.Kiruthika II-M.Sc.,Computer Science Bonsecours college f...
Big data analytics K.Kiruthika II-M.Sc.,Computer Science Bonsecours college f...
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
Using In-Memory Encrypted Databases on the Cloud
Using In-Memory Encrypted Databases on the CloudUsing In-Memory Encrypted Databases on the Cloud
Using In-Memory Encrypted Databases on the Cloud
 

More from Nisha Menon K

High capacity optical
High capacity opticalHigh capacity optical
High capacity opticalNisha Menon K
 
Digital signature
Digital signatureDigital signature
Digital signatureNisha Menon K
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon kNisha Menon K
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kNisha Menon K
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless TechnologyNisha Menon K
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalizationNisha Menon K
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNisha Menon K
 

More from Nisha Menon K (11)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
Digital signature
Digital signatureDigital signature
Digital signature
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

Recently uploaded

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Delta encoding in data compression by Nisha Menon K studying mtech at fisat

  • 1. Application of Delta Encoding In Data compression Nisha Menon K Mtech Communication Engg Roll No: 16 12/6/2013 1
  • 2. Contents • • • • • • • • Delta encoding Delta compression Features of Delta coding Tools for delta compression Applications Extension of delta coding Disadvantages Conclusion 12/6/2013 2
  • 3. Delta Encoding • The term delta encoding, (from the Greek letter Δ, which in mathematics, denotes a difference) refers to several techniques that store data as the difference between successive samples (or characters), rather than directly storing the samples themselves. • The first value in the delta encoded file is the same as the first value in the original data. • All the following values in the encoded file are equal to the difference (delta) between the corresponding value in the input file, and the previous value in the input file. 12/6/2013 3
  • 5. Delta compression • Delta encoding used for data compression is known as delta compression • It is a lossless compression technique – restored data is identical to original • Delta encoding can be used for data compression when the values in the original data are smooth, that is, there is typically only a small change between adjacent values. 12/6/2013 5
  • 6. • Delta compression is the process of encoding a target le with respect to one or several similar source les. • If a delta’s target version is newer than its reference version in the history, then it is referred to as a forward delta. A reverse delta has the opposite orientation: an older target version and a newer reference version. • Reverse delta Forward delta 12/6/2013 6
  • 7. . The key feature is that the delta encoded signal has a lower amplitude than the original signal. In other words, delta encoding has increased the probability that each sample's value will be near zero, and decreased the probability that it will be far from zero. 12/6/2013 7
  • 8. Features of Delta coding • Delta compression algorithms take advantage of the statistical correlations between different files or packets so that common sequences between two files can be encoded using a copy reference. • From a logical point of view the difference between two data values is the information required to obtain one value from the other i.e. relative entropy. • Delta encoding followed by Huffman and/or run-length encoding is a common strategy for compressing signals. 12/6/2013 8
  • 9. Tools for delta compression • Unix diff Classic tool for generating deltas. Limited to text files • Vcdiff Delta encoding in HTTP and is employed in Google's Shared Dictionary Compression over HTTP technology used in Chrome browser. • Xdelta This is similar to diff, but it is targeted for binary files and does not generate human readable output. • Zdelta modification of the vcdiff 12/6/2013 9
  • 10. Applications • Delta compression forms the core of fast and efficient content download • Software Revision Control Systems: For maintaining the revision history of software projects and other documents . In these systems, multiple, often almost identical, versions of each object have to be stored in order to allow the users to retrieve past versions. • Delta Compression at the File System Level: The Xdelta File System (XDFS) aims to provide efficient support for delta compression at the file system level using a delta compressor called xdelta. This allows the efficient implementation of revision control systems of files. • Software Distribution: To generate software patches that can be efficiently transmitted over a network in order to update installed software packages. 12/6/2013 10
  • 11. Improving HTTP performance: To improve the latency for web accesses, by exploiting the similarity between current and outdated versions of a web page. This can significantly decrease the amount of data sent to the client, and is thus more appropriate for clients connected via low-bandwidth links such as cellular modems. It has also been observed that web pages on the same server often have a high degree of similarity (due to common layout and menu structure) that could be exploited with delta compression techniques. Client already has an old version of a page in his cache He send a tag identifying this version to server The server then sends the delta between old and current version 12/6/2013 11
  • 12. • Application in wireless sensor In a wireless sensor network, sensor readings and other streamed values can be expressed as the change in the value from some expected value. In many data sets, with well chosen expected values, these changes tend to be small relative to the range of possible values and lead to a high frequency of values within a small range. • Efficient Web Page Storage: The similarities between different versions of the same page or different pages on the same web site could also be used for increased storage. 12/6/2013 12
  • 13. • ECG compression The successive samples of ecg have high correlation and small difference between them so it can be effectively quantised by Delta compression • IFF 8SVX sound format applies delta compression to raw sound data before transmission. 12/6/2013 13
  • 14. Extension of Delta coding • The idea used in delta encoding can be expanded into a more complicated technique called Linear Predictive Coding, or LPC. • The algorithms used by LPC are similar to recursive filters, making use of the z-transform and other intensively mathematical techniques. 99 samples are encoded Work on sample number 100 Most likely value for sample 100?? Predict the most probable value by looking last several samples 12/6/2013 14
  • 15. • Linear Predictive Coding (LPC) is one of the methods of compression that models the process of speech production. • Linear prediction filters attempt to predict future values of the input signal based on past signals. • LPC models speech as an autoregressive process, and sends the parameters of the process as opposed to sending the speech itself. • A variation of delta encoding which encodes differences between the prefixes or suffixes of strings is called incremental encoding. It is particularly effective for sorted lists with small differences between strings, such as a list of words from a dictionary. 12/6/2013 15
  • 16. Disadvantages • To know the value of the signal at any point in time one has the read (know) all the previous values. • Data appearing in the target that has no similar data in the source is still compressed. In some cases, where the source and target have nothing in common, the delta is equivalent to a compressed form of the target • If the original signal is not changing, or is changing in a straight line, delta encoding will result in runs of samples having the same value. 12/6/2013 16
  • 17. Conclusion • Delta coding is beneficial only for values which are changing smoothly • For higher compression efficiency delta coding can be used along with other compression techniques 12/6/2013 17