GB2306281A - Method for decoding coded data - Google Patents
Method for decoding coded data Download PDFInfo
- Publication number
- GB2306281A GB2306281A GB9624640A GB9624640A GB2306281A GB 2306281 A GB2306281 A GB 2306281A GB 9624640 A GB9624640 A GB 9624640A GB 9624640 A GB9624640 A GB 9624640A GB 2306281 A GB2306281 A GB 2306281A
- Authority
- GB
- United Kingdom
- Prior art keywords
- codeword
- memory
- data
- bit
- run
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M7/00—Conversion of a code where information is represented by a given sequence or number of digits to a code where the same, similar or subset of information is represented by a different sequence or number of digits
- H03M7/30—Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
- H03M7/40—Conversion to or from variable length codes, e.g. Shannon-Fano code, Huffman code, Morse code
- H03M7/4006—Conversion to or from arithmetic code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/42—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation
- H04N19/436—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation using parallelised computational arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/102—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
- H04N19/13—Adaptive entropy coding, e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/90—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
- H04N19/91—Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Description
SPECIFICATION
TITLE METHOD FOR DECODING DATA 2306281 FIELD OF-THE INVENTION
The present invention relates to the field of data compression and decompression systems; particularly, the present invention relates to a method fo r Parau el decoding of data in cornpression/decompressiDn systems.
BACKGROUND OF THE INVENTION
Today, data compression is Widely used, particularly for storing and transmitting large amounts of data. Many different data compression techniques exist in the prior art. Compression techniques can be divided into two broad categodes, lossy coding and lossless coding. Lossy coding involves coding that results in the loss of information, such that there is no guarantee of perfect reconstruction of the original data. In lossless compression. all the information is retained and the data is compressed in a man.ner which allows for perfect reconstruction.
BAD ONGINAL In lossiess compression, input symbols are converted to output codewords. If the compression is successful, the codewords are represented in fewer bits than the number of input symbols. Lossless coding methods include dictionary methods of coding (e.g., Lempel-Mv), run length ed'cDding, enumerative coding and entropy coding.
Entropy coding consists of any method of lossiess coding which attempts to compress data close to the entropy limit using known or estimated symbol probabilities. Entropy codes include Huffrnan codes, arithmetic codes and binary entropy codes. Binary entropy coders are lossless coders which act only on binary (yes/no) decisions, often expressed as the most probable symbol (MPS) and the least probable symbol (LPS). Examples of binary entropy coders include IBM's 0-coder and a coder referred to as the BcDder.
For more information on the B-coder, see U.S. Patent No. 5,272,478, entitled Method and Apparatus for Entropy Codinj, (J.D. Alien), issued December 21, 1993, and assigned to the corporate assignee of the present invention.
See also M.J. Gormish and J.D. Alien, 'Finite State Machine Binary Entropy Coding, abstract in Proc. Data Compression Conference, 30 March 1993, Snowbird, UT, pg. 449. The B-coder is a binary entropy coder which uses a finite state machine for compression.
Figure 1 shows a block diagram of a prior art compression and decompression system using a binary entropy coder. For coding, data is input into context model (CM) 101 - CM 101 translates the input data into a set or sequence of binary decisions and provides the context bin for each decision. Bolkh the sequence of binary decisions and their associated context bins are output from CM 101 to the probability estimation module (PEM) 102.
BAD ORIGINAL PEM 102 receives each context bin and generates a probability estimate for each binary decision. The actual probability estimate is typically represented by a class, referred to as PClass. Each PClass is used for a range of probabilities. PEM 102 also determines whether the binary decision (result) is or is not in its more probable state (i.e., whether the decision corresponds to the MPS). The bit-stream generator (BG) module 103 receives the probability estimate (i.e., the PClass) and the determination of whether or not the binary decision was likely as inputs. In response, BG module 103 produces a compressed data stream, outputting zero or more bits, to represent the original input data.
For decoding, CM 104 provides a context bin to PEM 105, and PEM provides the probability class (PClass) to BG module 106 based on the context bin. BG module 106 is coupled to receive the probability class. In response to the probability class and the compressed data, BG module 106 returns a bit representing whether the binary decision (i.e., the event) is in its most probable state. PEM 105 receives the bit, updates the probability estimate based on the received bit, and returns the result to CM 104. CM 104 receives the returned bit and uses the returned bit to generate the original data and update the context bin for the next binary decision.
One problem with decoders using binary entropy codes, such as]BM's 0-coder and the B-coder, is that they are slow, even when implemented in hardware. Their operation requires a single large, slow feedback loop. To restate the decoding process, the context model uses past decoded data to produce a context. The probability estimation module uses the context to produce a probability class. The bit-stream generator uses the probability BAD ORIGINAL 5- class and the compressed data to determine if the next bit is the likely or unlikely result. The probability estimation module uses the likely/unlikely result to produce a result bit (and to update the probability estimate for the context). The result bit is used by the context model to update its history of past data. All of these steps are required for decoding a single bit. Because the context model must walt for the result bit to update its history before it can provide the next context, the decoding of the next bit must walt. It is desirable to avoid having to waft for the feedback loop to be completed before decoding the next bit. In other words. it is desirable to decode more than one bit or codeword at a time in order to increase the speed at which compressed data is decoded.
Another problem with decoders using binary entropy codes is that variable length data must be processed. In most systems, the codewords to be decoded have variable lengths. Alternatively, other systems encode va,.', able length symbols (uncDded data). When processing the variable length data, it is necessary to shift the data at the bit level in order to provide the correct next data for the decoding or encoding operation. These bit level manipulations on the data stream can require costly andlor slow hardware and/or software. Furthermore, prior art systems require this shifting to be done in time critical feedback loops that limit the performance of the decoder. It would also be advantageous to remove the bit level manipulation of the data stream from time critical feedback loops, so that parallelization could be used to increase speed.
BAD ORIGINAL 6 The present invention provides a method for decoding coded data comprising a plurality of codewords, said method comprising the steps of:
loading a count value into a counter associated with each run counter, wherein the count value corresponds to the size of a codeword memory used during encoding when a new run is started, said count value being loaded when a new codeword for said each run counter is fetched; decrementing the count value each time any codeword is 10 fetched; and clearing the bit generator state associated with said new codeword when the counter decrements to zero.
The present invention will now be described, by way of example only, with reference to the accompanying drawings. To assist in more fully understanding the present invention, it will be described and illustrated in the examples of coding and decoding methods and apparatus. The following is a brief description of the accompanying drawings context of 8 - Figure 1 is a block diagram of a prior art binary entropy encoder and decoder.
Figure 2A is a block diagram of an example of a 5 decoding system.
Figure 2B is a block diagram of an example of an encoding system.
Figure 2C is a block diagram of an example of a decoding system which processes context bins in parallel.
Figure 2D is a block diagram of an example of a decoding system which processes probability classes in 15 parallel.
Figure 3 illustrates a non-interleaved code stream.
-g- Figure 4 illUStrr--4leS an example of the interleaved Code stream as derived from an exemplary set of data.
Figure 5 is one example of a probability estimation table and bit-strearn, generator for an R-coder.
Figure 6 is a block diagram of, one example of an encoder.
Figure 7 is a block diagram Of One example of a bit generator.
Figure 8 is a block d,a.nramn Of One example of' a reorder unit.
Figure 9 is a block dia;rp-m of One example of a run count re:)rder unit.
reDrder unit.
Figure 10 is a block diagram of another example of a run count Figure 11 is a block diagram Of Orle example of a bit packing unit.
BAD ORIGINAL - Figure 12 is a block diagram of one example of the packing logic.
Figure 13 is a block diagram of the encoder bit 5 generator.
Figure 14A is a block diagram of an example of a decoding system.
Figure 14B is a block diagram of an example of a decoder.
Figure 14C is a block diagram of an example of a FIFO structure.
is Figure ISA illustrates one example of a decoding pipeline.
Figure 15B illustrates an example of a decoder.
Figure 16A is a block diagram of one example of a shifter.
Figure 16B is a block diagram of another example of a 25 shifter.
Figure 17 is a block diagram of a system having an external context model.
Figure 18 is a block diagram of another system having an external context model.
Figure 19 is a block diagram of one example of a decoder.
Figure 20 is a block diagram of one example of a decoder with separate bit generators.
Figure 21 is a block diagram of one example of a bit generator.
is Figure 22 is a block diagram of one example of a long t.
run uni Figure 23 is a block diagram of one example of a short 20 run unit.
Figure 24 is a block diagram of one example of an initialization and control logic.
Figure 25 is a block diagrarin of one example of reordering data us,.n.p a snooper decoder.
Ficure 26 is a block diagram of another example of a rewdering U n.., t.
Figure 27 is a block diagram, of another example of a reordering un,.14 usin.c a rnerced qjeue.
Figure 28 is a block diaz-.arn. of a high bandwiddh systern using the P7c-sent inverition.
Ficure 2^V is a block ba-idv,,im",h rnatzhing systern using W4 1 the invention.
Fioure 30 is a block dia-prarn of a rea!-lirne video sysliern using the p-esent Figure 31 illustrates one example of the coded data Memc)ry Figure 32 is a timing diagram of a decoding system.
Figure 33 is a graph of coding efficiency versus MPS probability for different R-codes.
BAD ORIGINAL A method and apparatus for parallel encoding and decoding of data is described. In the following description, numerous specific detalls are set forth, such as specific numbers of bits. numbers of coders, specific probabilities, types of data, etc., in order to provide a thorough understanding of the preferred embiodiments of the present invention. It Will be understood to one sWilled in the arl that the present invention may be practiced without these specific details. Also, well-known circuits have been shown in block d..agrarn form rather than in detail in order to avoid unnecessarily obscuring the present invention.
Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely BAD ORIGINAL convenient labels applied to these quantities. Unless specifically Ctated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions uti117-ing terms such as a i processing' or "computing or "calculating' or 'determining or 'displaying' or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such 10 inforr-,ia,.ion storage, transmission or display devices.
The present examples also relate to apparatus for performing the operations herein. This apparatus may be specially constructed for the is required purposes, or it may comprise a general purpose computer selectively a,-kivated or reconfigured by a computer program stored in the computer. The and disp!ays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose machines rnay be used with prograrns in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
OW -is- Parallel Eniropy Corlinc The present invention provides a parallel entropy coding system. The system includes an encoder and a decoder. In one example 1 the encoder performs encoding on data in real-time. Similarly, in one example, the 5 dewder of the present invention performs decoding on data in real-time. Together, the real-time encoder and real-time decoder form a balanced coding system.
The present invention provides a system that decodes losslessly encoded data in parallel. The data is decoded in parallel by using multiple decoding resources. Each of the multiple decoding resources is assigned data (e.g., codewords) from the data stream to decode. The assignment of the data stream occurs on the fly wherein the decoding resources decode data concurrently, thereby decoding the data stream in parallel. In order to enable the assionment of data in a manner which makes efficient use of the decoding resources, the data stream is ordered. This is referred to as parallelizing the data stream. The ordering of data allows each decoding resource to decode any ol all of the coded data without waiting for feedback from the context model.
Figure 2A illustrates a decoding system without the slow feedback loop of the prior art. An input buffer 204 receives coded data (i.e., codawords) and a feedback signal from decoder 205 and supplies coded data in a predetermined order (e.g., context bin order) to decoder 205 of the present invention, which decodes the coded data. Decoder 205 includes multiple decoders (e.g., 205A, 205B, 205C, etc. ).
BAD ORiGINAL 16- In one example, each of the decoders 205A, 20513, 205C, etc. is supplied data for a group of contexts. Each of the decoders in decoder 205 is supplied coded data for every context bin in its group of contexts from input buffer 204. Using this data, each decoder 205A. 205B. 205C, etc. produces the decoded data for its group of context bins. The context model is not required to associate coded data with a particular group of context bins.
The decoded data is sent by decoder 205 to decoded data storage 207 (e.g., 207A, 207B. 207C, etc.). Note that decoded data storage 207 may store inlermediale data that is neither coded nor uncoded, such as run counts. In this case, decoded data storage 207 stores the data in a compact, but not entropy coded, form.
Operating independently, context model 206 is coupled to receive the previous!y decoded data from decoded data storage 207 (i.e., 207A, 2078, 207C, etc.) in response to a feedback signal it sends to decoded data storage 207. Therefore, two independent feedback loops exist, one between decoder 205 and input buffler 204 and a second between context model 206 and decoder dalka storace 207. Since the large feedback loop is eliminated, the decoders in decoder 205 (e.g., 205A, 205B. 205C, etc.) are able to decode their associated codewords as soon as they are received from input buffer 204.
The context model provides the memory portion of the coding system and divides a set of data (e.g., an image) into different categories (e.g. , context bins) based on the memory. In the present examples, the context bins are considered independent ordered sets of data. In one example, each group of context bins has its own probability estimation model and each ORIG1r4P1 OAD P context bin has its own state (where probability estimation models are shared). Therefore, each context bin could use a different probability estimation model andlor bil-stream generator.
Thus, the data is ordered. or parallelized, and data from the data 5 stream is assigned to individual Coders for decoding.
AddnZ Pa!.allelisrn jo the ClasSIC Entropy Coding Mpdel 1 1 To parallelize the data stream, the data may be divided according to either context, probability, tiling, codeword sequence (based on codewords), etc. The reordering of the coded data stream is independent of the parallelism, a method used to parallelize data or the probability at any other point. A parallel encoder portion of an encoding system of the present example fed by dalka differentiated by context model (CM) is shown in Figure 2B.
is Referring to Figure 2B, the context dependent parallel encoder portion comprises context model (CM) 214, probability estimation modules (PEMs) 215-217, and bitstream generaiors (BGs) 218-220. CM 214 is coupled to receive coded input data. CM 214 is also coupled to PEMs 215-217. PEMs 215-217 are also couplecl to BGs 218-220, respectively, which output code 20 strearns 1, 2 and 3 respectively. Each PEM and BG palr comprises a coder. Therefore, the parallel encoder is shown with three coders. Afthough only three parallel coders are shown, any number of coders may be used.
CM 214 divides data stream into different contexts in the same way as a conventional CM and sends the multiple streams to the parallel hardware encoding resources. Individual contexts, or groups of contexts, are directed BAD ORIGINAk -is- to separate probability estimators (PEMs) 215-217 and bit generators (BGS) 218-219. Each of BGs 218-220 outputs a coded data stream.
Figure 2C is a block diagram of one example of the decoder portion of the decoding system. Referring to Figure 2C, a context dependent parallel decoder is shown haVing BGs 221-223, PEMs 224-226 and CM 227. Code streams 1-3 are coupled to BGs 221-223 respectively. BGs 221-223 are also coupled to PEMs 224-226 respectively.
PEMs 224-226 are coupled to CM 227 which outputs the reconstructed input data. The input comes from several code streams, shown as code streams 1 3. One code stream is assigned to each PEM and BG. Each of the BG 221 223 returns a bit representing whether the binary decision is in its more probable state, which the PEMs 224-226 use to return decoded bits (e.g., the bInary Each of PE1As 224-226 is ESSDClated with one of BGs 221 223. indicrating which code is to be used to produce a data stream from its input code stream. CM 227 produces a decoded data stream by selecting the decoded bIts from, the bit-stream generators in the proper sequence, thereby recreating the original data. Thus, the CM 227 obtains the decompressed data bit from the appropriate PEM and BG, in effect reordering the data into the original order. Note that the control for this design flows in the reverse direction of the data stream. The BG and PEM may decode data before the CM 227 needs it, staying one or more bits ahead. Alternatively, the CM 227 may request (but not receive) a bit from one BG and PEM and then request one or more bits from other BGs and PEMs before using the initially requested bit.
BAD ORIG1NAL 19- The configuration shown in Figure 2C is designed to couple the PEM and BG tightly. The IBM O-Coder is a good example of a coder having a tightly coupled PEM and SG. Local feedback loops between these two are not fundamental limit to system performance.
In a different design, the PEM could differentiate the data and send it to parallel BG units. Thus, there would be only one CM and PEM and the BG is replicated. Adaptive Huffirnan coding and finite state machine coding could be used in this way.
A similar decoding system that uses the PEM to differentiate the data and send it to parallel BGs is shown in Figure 2D. In this case, probability classes are handled in parallel and each bit-stream generator is assigned to a specific probability class and receives knowledge of the result. Refer-ring to Figure 2D, the coded data streams 1-3 are coupled to one of multiple bitstream, generators (e.g., BG 232, BG 233, BG 234, etc.), which are coupled to receive it. Each of the bit-stream generators is coupled to PEM 235. PEM 2315 is also coupled to CM 236. In this configuration, each of the bit-stream generators decodes Coded data and the results of the decoding are selected by PEM 235 (instead of by CM 236). Each of the bit-stream generator receives Coded data from a source associated with one probability class (i.e., where the coded data could from any context bin). PEM 235 selects the bitstream generators using a probability class. The probability class is dictated by the contexl bin provided to it by CM 236. In this manner, decoded data is produced by processing probability classes in parallel.
Numerous implementations exist. for the parallel decoding systems. In one example, the coded data streams BAD ORIGiNAL =rresponding to the multiple context bins can be interleaved into one stream ordered by the demands of the various coders. In one example, the coded data is ordered such that each coder is constantly supplied with data even though the coded data is delivered to the decoder in one stream. Note that the present examples operates with all types of data, including image data.
By using small simple coders that can be cheaply replicated in integraled circuits, coded data can be decoded quickly in parallel. In one example, the coders are implemented in hardware using field programmable gate array (FPGA) chips or a standard cell application spe integrated circuit (ASIC) chip. The combination of parallelism and simple bitstream generators allow the decoding of coded data to occur at speeds in excess of the prior art decoders, while maintaining or exceeding the cornpression efficiency of prior decoding systems.
Cha-lnel 0-,de"1n2 of blu,11i21e Da4a Streams There are many different design issues and problems that affect svstem performance. A few of these will be mentioned below. However, the examples shown in Figure 213 and 2C (and 2D) use the multiple code streams. Systems with parallel channels that could accommodate this embodiment are imaginable: multiple telephone lines, multiple heads on a disk drive, etc. In Some applications, only one channel is available, or convenient. Indeed, if multiple channels are required there may be poor utilization of the bandwidth because of the bursty nature of the individual code streams.
B.AP ORIGINAL In one example, the code streams are concatenated and sent conliquously to the decoder. A preface header contains pointers to the beginning bit location of each stream. Figure 3 illustrates one example of the arrangement of this data. Referring to Figure 3, three pointers 301-300 indicate the starting location in the COncatenated code of code streams 1, 2 and 3 respectively. The complete compressed data file is available in a buffer to the decoder. As needed, the cDdewords are retrieved from the proper location via the proper pointer. The pointer is then updated to the next codeword in that code stream.
Note that this method requires an entire coded frame to be stored at the decoder and, for practical purposes, at the encoder. If a real-time system, or less bursty data flow, is required then two frame buffers may be used for banking at both the encoder and the decoder.
Datp- Oder to Codeword Orde Notice that a decoder decodes codewords in a given deterministic order. With parallel coding, the order of the requests to the code stream is deterministic. Thus, if the codewords from parallel code streams can be interleaved in the dght order at the encoder, then a single code stream will suffice. The codewords are delivered to the decoder in the same order on a just-in-time basis. At the encoder, a model of the decoder determines the codeword order and packs the codeWDrds into a single stream. This model might be an actual decoder.
A problem with delivering data to the parallel decoding elements arises when data is variable length. Unpacking a stream of variable length RAD ORiGINAL 212- codewords requires using a bit shifter to align the codewDrds. Bit shifters are often costly and/or slow when implemented in hardware. The control of the bit shifter depends on the size of the particular codeword. This control feedback loop prevents variable length shifting from being performed quickly.
The virtues of feeding multiple decoders With a single stream cannot be realized if the process of unpacking the stream is performed in a single bit shifter that is not fast enough to kPep up with the multiple decoders.
The solution described herein separates the problem of d;stributing the coded data to the parallel coders from the alignment of the variable-length codewords for decoding. The cDdewords in each independent code stream are packed into fixed-length Words, called interleaved words. At the decoder end of the channel these interleaved words can be distributed to the pa,,al;el decoder units with fast hardwired data lines and a simple control circuit.
It is convenient to have the interleaved word length larger than the maxirrium codeword length so that at least enough bits to complete one codeword is contained in each interleaved word. Th:? interleaved words can cc-,.'Laln may codewords and parts of codewords. Figure 4 illustrates the interleaving of an example set of parallel code streams.
These words are interleaved according to the demand at the decoder.
Each independent decoder receives an entire interleaved word. The bit shifting operation is now done locally at each decoder, maintaining the parallelism of the system. Note in Figure 4 that the first codeword in each interleaved word is the IDweC remaining codeword in the set. For instance, the first interleaved words come from code stream 1, starting with the lowest B,0 ORIG114AL codeword (i.e., C). This is followed by the first interleaved word in code stream 2 and then by the first interleaved word in code stream 3. However, the next lowest codeword not contained completely in an already ordered interleaved word is #7. Therefore, the next word in the stream is the second 5 interleaved word of code stream 2.
In another example, the order in which the subsequent set of interleaved words (e.g., the codeword starting with codeword #8 in stream 1. the codeword starting with CDdeword #7 in stream 2, the codeword stalung with codeword #11 in stream 3) are inserted into the interleaved codestream is based on the first codeword of the previous set of interleaved words (e.g. , the codeword starting with codeword #1 in stream 1, the codeword starting with codeword #2 in stream 2, the codeword starting with codeword #4 in stream 3) and are ordered from the interleaved word with the lowest number first codeword to the interleaved word with the highest number first codeword.
Therefore, in this case, since the interleaved word starting with codeword #1 was first, then the next interleaved word in stream 1 is the first of the second group of interleaved words to be inserted into the interleaved stream, followed by the next interleaved word in stream 2 and then thenext interleaved word in stream 3. Note that after the second group of interleaved words is inserted into the interleaved stream, the next interleaved word in stream 2 would be the next interleaved word inserted into the stream because codeword?#7 is the lowest codeword of the second set of interleaved words (followed by codeword #48 in stream 1 and then codeWDrd #11 in stream 3).
Using the actual decoder as the modeler for the data stream accounts for all design choices and delays to create the interleaved stream. This is not BAD ORIGINAL a great cost for duplex systems that have both encoders and decoders anyway. Note that this can be generalized to any parallel set of variablelength (or different sized) data words that are consumed in a deterministic order.
lypes of Codes and s,,1-Stream Generalors For Parallel Decoding The present systems could employ existing coders, such as Q-CDders or Bcoders, as the bit-strearn generation elements which are replicated in parallel. However, other codes and coders may be used. The coders and their associated codes employed by the present example are simple coders.
Using a bit-stream generator with a simple code instead of complex code, such as the arithmetic Code used by the Q-CDder or the multi-state codes used by the B-coder, offers advantages. A 51M.Ple Code is advantageous in that the hardware implementation is much faster and sirnpler and requires less silicon than a complex code.
Another advantane is that Coding efficiency ran be improved. A code that uses a finite amount of state information cannot perfectly meet the Shannon entropy limit for every probability. Hardware implemented Codes known in the art that allow a single bil-stream generator to handle multiple probabilities or contexts have constraints that reduce coding efficiency. Removing the Constraints needed for multiple contexts or probability classes allows the use Of Codes that comes closer to meeting the Shannon entropy limit.
E1AD ORIGINAL IR-Cpde The code (and coder) employed by one examplary system is referred to as an R-CDde. R-codes are adaptive Codes that convert a variable number of identical input symbols into a codeword. In an embodiment, the R-cDdes are parameterized so that many different probabilities can be handled by a single decoder design. Moreover, the Rcodes of the present invention can be decoded by simple, high-speed hardware.
In the present examples, 5-codes are used by an R-cDder to perform encoding or decoding. In one example, an R-cDder is a combined bitstream generator and probability estimation module. For instance, in Figure 1, an R-coder could include the combination of probability estimation module 102 and bit-stream generator 103 and the combination of probability estimation module 105 with bit-stream generator 106.
Codewords represent runs of the most probable symbol (MPS). A hIPS represents the outcome of a binary decision with more than 50% probability. On the other hand, the least probable symbol (LPS) represents the outcome in a binary decision with less than 50% probability. Note that when two outcomes are equally probable, it is not important which is designated MPS or LPS as long as both the encoder and decoder make the same designation. The resulting bit sequence in the compressed file is shown in Table 1, for a given parameter referred to as MAXRUN.
BAD ORiGINAL Table 1 - Bit-generation Encodincl CidIZWr MeaninQ 0 MAXRUN Consecutive MPSS 1N N Consecutive MPSs followed by LPS, N < MAXRUN To encode, the number of MPSs in a run are counted by a simple counter. If that count equals the MAXRUN count value, a 0 codeword is emitted into the code stream and the counter is reset. If an LPS is encountered, then a 1 followed by the bits N, which uniquely describe the number of MPS symbols before the LPS, is emitted into the code stream. (Note that there are many ways to assign the N bits to describe the run length). Again the counter is reset. Note that the number of bits needed for N is dependent on the value of MAXRUN. AISD note that the l's complement of the codewords could be used.
To decode, if the first bit in the code stream is 0, then the value of MAXRUN is put in the MPS counter and the LPS indication is cleared. Then the 0 bit is discarded. It the first bit is a 1, then the following bits are examined to extract the bits N and the appropriate count (N) is put in the MPS counter and the LPS indicator is set. Then the code stream bits containing the 1 N codeword are discarded.
R-codes are generated by the rules in Table 1. Note that the definition of a given R-code Rx(k) is defined by the MAXRUN. For instance:
MAXRUN for Rx(k) = x 2k-1.
13,C) ovklGI%P- thus MAXRUN for R2(k) = 2 2k-1, MAXRUN for R3(k) = 3 2k-1, etc......
Note that R-codes are a subset of GDIOmb codes. Also note that Rice codes use R2(.) codes only. The R-codes of the present invention allow the use of both R2(k) and R3(k) codes, and other Rn(k) codes if desired. In one embodiment, R2(k) and R3(k) codes are used. Note that Rn exists for n=2 and n equals any odd number (e.g., R2, R3, R5, R7, R9, R11, R13, R15). In one embodiment, for R2(k) code, the run count, r, is encoded in N; the run count, r, is described in k bits, such that 1 N is represented with k+ l bits. Also in one embodiment, for an R3(k) code, the bits N can contain 1 bit to indicate if n<2(k-1) or nk2(k-1) and either k-1 or k bits to indicate the run count, r, such that the vahable N is represented by a total k or k+l bits respectively. In other embodiments, the i's complement of N could be used in the codeword. In this case, the MPS tends to produce code streams with many Os and LPS tends to produce code streams with many 1 s.
Tables 2, 3, 4 and 5 depict some efficient R-codes utilized for one embodiment of the present invention. It should be noted that other run length codes may also be used in the present invention. An example of alternative run length code for R2(2) is shown in Table 6. Tables 7 and 8 show examples of the codes used in an embodiment.
13AD OffiGWAL -2B- Table 2 - R2(0) uncoded data 1 codeword 0 0 1 1 1 1 Table 4 uncoded data 1 codeword 000 0 001 100 01 101 1 11 Table 6 -Alternative R2(2) Table uncoded data 1 codeword 00 0 01 10 1 11 Table uncoded data 1 codeword 0000 0 0001 100 001 101 101 110 1 ill able 7 lternative ode Alternative R2(2) ODOD 0 0001 ill 001 101 01 110 1 100 Preferred R3(2) 000000 0 000001 1000 100001 1010 0001 1001 001 1011 01 110 1 ill 3Aú) ORIGINAL Table 8 - Another Alternative R20 Code Preferred R2(2) ODOD 0 0001 100 001 110 01 101 1 ill Prc)bablf!ly Estrnation Model for R-Codes In one example, the R2(0) code performs no coding: an input of 0 is encoded into a 0 and an input of 1 is encoded into a 1 (or vice versa) and is optimal for probabilities equal to 50%. The R2(1) code of the currently preferred embodiment is optimal for probabilities close to 0.707 (i.e., 70.7%) and the R3(1) is optimal for the 0.794 probability (791.4%). The R2(2) code is cp"lirr,.al for the 0.841 probability (64.1 %). Table c.' below depicts the near optirnal run-lerngth code, where the probability skew is defined by the following equation:
Probability skew = -1092 (LPS).
BAD ORIGINAL Table 9 probabilit 7Probability skew Best Golomb Code 500 1.00 707 1.77 _R2(1) 841 2.65 R2(2) 917 3.59 R2(3) 058 4.56 R2(4) 979 5.54 R2(5) 989 6.RA R2(6) 995 7.53 R2(7) 997 8.53 R2(8) 91-19 9.53 R2(9) Note that the codes are near-optimal in that the probability range, as indicated by the probability skew, is covering the space relatively evenly even though the optimal probabilities do not differentiate as much in the higher k values as in the lower k values.
Reference is made to the probability at which an R-code is optimal. In fact, only R2(2) meets the entropy curve. The real consideration is for what range of probabilities is a particular R-coder better than all other R-codes in a given class. The following tables provide the probability ranges for the class 10 of R2 codes and the class of R2 and R3 codes.
For the class of R2 codes from 0 to 12 the ranges are in the Table 10 below. For example, when only R2 codes are used, R2(0) is best when 0.50 Bp,C) oBiGit4AL -31.
ú probability 5 0.6180. Similarly, R2(1) is best when 0.6180 s probability s 0.7862.
Table 10 - R2 Codes from 0 to 12 Code Probabilities R2(0) R2(1) R2(2) R2(3) R2 (4) R2 (5) R2(6) R2 (7) R2(8) R2(9) R2 (10) R2(1 1) R2(12) 0.6180 0.7862 0.8867 0.9416 0.9704 0.9851 0.9925 0.9962 0.9981 0.90-91 0.9995 0. 9998 For the class of R2 and R3 codes the solutions are in the Table 11 below. For example, when R2 and R3 codes are used, R2(1) is best when 0.6180 _n probability _n 0.7549.
BAD ORGINAL Table 11 - R2 and R3 codes lengths less than or equal to 13 bits Code 1 Probabilities R2(0) R2(1) R3(1) R2(2) R3(2) R2(3) R3(3) R2 (4) R3(4) R2 (5) R3(5) R2 (6) R3(6) R2 (7) R3(7) R2 (6) R3(6) R2 (9) R3(9) R2 (10) R30 0) R2(1 1) R3(1 1) R2(12) 0.6160 0.7549 O.Bl 92 0.8688 0.9051 0.9321 0.9514 0.9655 0.9754 0.9826 0.9876 O.OW 913 0.993B 0. 9 9 5 6 0.9969 0.9978 O.OW984 0.99B9 0.9992 0.9995 0.9996 0.9997 0.9998 An R2(k) for a fixed k is called a run-length code. However, a fixed k is only best for a range of probabilities. It is noted that when coding near an optimal p, obability, an R-code according to the Present example uses a 0 and 1 N codewords with roughly equal frequency. In other words, half the time, the R-coder of the present example outputs one code and the other half of the time, the R-coder outputs the other. By examihing the number of 0 and 1 N codewords, a determination can be made as to whether the best code is being used. That is, if too many 1 N cDdewDrds are being output, then the run-length is too long; on the other hand, if too many 0 codewords are being output, then the run length is too short.
The probability estimation model used by Langdon examines the first bit cl' each codeword to determine whether the source probability is above or below the current estimate. See G.G. Langdon, An Adaptive Run-Length CDd. ng Algorithm, IBb.1 Technical Disclosure Bulletin, Vol. 26. No. 7B, Dec. 1983. Based on this determination, k is increased or decreased. For example, if a codeword indicating MPS is seen, the probability estimate is too low. Therefore, according to Langdon, k is increased by 1 for each 0 codeword. If a codeword indicating less than MAXRUN MPS followed by an LPS (e.g., IN codeword) is seen, the probability estimate is too high. Therefol e, a.-cording to Langdon, k is decreased by 1 for each 1 N codeword.
The present examples allow more complex probability estimation than the simple increase or decrease of k by 1 every WdeWDrd. The present examples include a probability estimation module state that determines the code to use. Many states may use the same Code. Codes are assigned to sta-tes using a state table or state machine.
In one example, the probability estimate changes state every codeword output. Thus, the probability estimation module increases or decreases the probability estimate depending on BAD ORIGINAL whether a codeword begins with a 0 or a 1. For instance, if a '0' codeword is output, an increase of the estimate of the MPS probability occurs. On the other hand, if a '11 codeword is output, the estimate of MPS probability is decreased.
The Langdon coder of the prior arl only used R2(k) codes and increased or decreased k for each codeword. The present"example alternatively, uses R2(k) and R3(k) codes, in conjunction with the state table or state machine, to allow the adaptation rate to be tuned to the application.
That is. if there is a small amount of stationary data, adaptation must be quicker to result in more optimal coding, and where there is a larger amount of stationary data, the adaptation time can be longer so that the coding ran be chosen to achieve better compression on the remaInder of the data. Note that where variable numbers of state changes can occur, application specific clia"a--te,"istics may also influence the adaptation rate. Because of the nature of the R-codes, the estimation for R-codes is simple and requires little hardware, while being very powerful. Figure 33 illustrates this graph of coding C5ciency (codelength normalized with respect to entropy) versus MPS p4,cbab,,1,,.y. Figure 33 shows how some of the R-codes -over the probability space. As an example, Figure 33 shows that for a MPS probability of approximately 0.55, the efficiency of the R2(0) code is 1 -01 (or 1 % worse than) the entropy limit. In contrast, the R2(1) code has an etificiency of 1.09 (or 9% worse than) the entropy limit. This example shows that using the wrong code for this particular low probability case cause an 8% loss in coding efficiency.
EJAD ORIGINA' --------- - The incorporation of the R3(k) codes allows more probability space to be covered with a greater efficiency. An example probability estimation state table 1 is shown in Figure 5. Referring to Figure 5, the probability estimation state table shows both a state counter and the code associated with each of the separate states in the table. Note that the table includes both positive and negative states. The table is shown having 37 positive states and 37 negative states, including the zero states.
The negative states signify a different MPS than the positive states. In one example, the negative states can be used when the MPS is 1 and the positive states can be used when the MPS is 0, or vice versa. Note that the table shown in Figure 5 is an example only and that other tables might have mo,Pe or less states and a different state allocation.
Initially, the coder is in state D which is the R2(0) code (i.e., no code) for probability estimate equal to 0.50. After each codeword is processed, the stale counter is incremented or decremented depending on the first bit of the codeword. In onS example, a codeword of 0 increases the magnitude of a state counte r; a codeword starling with 1 decreases the magnitude of the stalle counter. Therefore, every codeword causes a change to be made in the state by the state counter. In other words, the probability estimation module 2D changes state. However, consecutive states could be associated with the same code. In this case, the probability estimation is accomplished without changing codes every codeWDrd. In other words, the state is changed for every codeword; however, the state is mapped into the same probabilities at certain times. For instance, states 5 to -5 all use the R2(0) code, while states 6 throuch 11 and---6 through -11 use the R2(1) code. Using the state table of BAD ORIGiNAL the present example, probability estimation is allowed to stay with the same coder in a nDn-linear manner.
h should be noted that more states with the same R-code are included for the lower probabilities. This is done because the loss of efficiency when using the wrong code at low probabilities is great. The nature of the run length codes state table is to transfer between states after each codeword. In a state table designed to change codes with every change in state, when toggling between states at the lower probabilities, the code toggles between a code which is very close to the entropy efficiency limit and code which is far from the entropy efficiency limit. Thus, a penalty (in terms of the number of coded data bits) can result in the transition between states. Prior art p;mc)bab11Ly estimation modules, such as Langdon's probability estimation module, lose performance because of this penalty.
In the higher probability run length codes, the penalty for being in the wrong code is not as great. Therefore, in the present examples, additional states are added at the lower probabilities, so that the changes of tongling between the two correct states are increased, thereby reducing the coding inefficiency.
Note that in certain examples, the coder may have initial probability estimate state. In other words, the coder could start in a predetermined one of the states, such as state 18. In one example, a different state table could be used so that some states would be used for the first few symbols to allow for quick adaptation, and a second state table Could be used for the remaining symbols for slow adaptation to allow fine-tuning of the probability estimate. In th;s manner, the coder may be able to use a more efficient code EiAD oRiGINAL sooner in the coding process. In another example, the code stream could specify an initial probability estimate for each context. In one example, the increments and decrements are not made according to a fixed number (e.g., 1). Instead, the probability estimate state can be incremented by a variable number according to the amount of data already encountered or the amount of change in the data (stability). Examples of such tables are Tables 21-25 described below.
If the state table is symmetric, as the example table of Figure 5 shows, only half of it (including the zero state) needs to be stored or implemented in hardware. In one example, the stale number is stored in sign magnitude (1 s) con, plement form to take advantage of the symmetry. In this manner, the table can be utilized by taking the absolute value of the ones complement number to determine the slate and examining the sign to determine whether the LIPS is a 1 or 0. This allows the hardware needed for incrementing and decre menting the state to be reduced because the absolute value of the state is used to index the table and the computation of the absolute value of ones complement nurnber is trivial. In another example, for greater hardware efficiency, a state table can be replaced by a hardwired or programmable stale machine. A hardwired state to code converter is one implementation of the stale table.
Overviow of 1he Sg lanced Parallel Entroov Codina System The present invention provides a balanced parallel entropy coding Systenn. The parallel entropy coding system includes both real-time encoding and real-time decoding performed in high speedllow cost hardware. The BAD ORIGINAL 4 -38.
present invention maY be used in numerous IDssless coding applications, including, but not limited to, real-time compressi on/de compression of writeable optical disk or magnetic disk data, real-time compression/decompressiDn of computer network data, real-time co,-,ipression/decDmpressiDn of image data in a compressed framestore in a multi-function (e.g., copier, facsimile, scanner, printer, etc.) machine, and real time compression/deCDmpression of audio data.
Spe-,,i,,Ing the performance of the encoder requires some attention. It iss"7a,,,hllfor%.ardiodes;p,nan encoder that achieves a certain rate for the original daI.a given a sufficiently fast coded data channel. In many app!,,-a4io,ns, however, the goal is for the encoder to utilize the coded data Channel efficiently. Coded data channel utilization is impacted by the burst rae of the original data interlace, the encoder speed, and the c:),m, pression achieved on the data. The impact of these effects must be c.-ns;,dc-red over sorne lo::a! amount of data which is dependent on the c'j bufflerinc in the encoder. It is desirable to have an encoder that the coded da'-z channel efficiently while maintaining encoder speed and high compression and still accommodating the maximum burst rate.
The following description describes an example of such an encoder.
A decoder that may be used with the encoder is also described.
Peal-lirne Encoclinc Figure 6 is a blDCk diagram of the encoding system.
In one example the encoder performs real-firne encoding. Referring to Figure 6, the encoding system 600 includes Bp,'D OgIGMA1- an encoder 602 coupled to a context model (CM) & state memory 603 for generating coded information in the form of codeword information 604 in response to oginal data 601. CodeWDrd information 6D4 is received by a reorder unit 606, which is coupled to a reorder memory 607. In response to codeword information 604, reorder unit 6D6 in cooperation With reorder mernory 607 generates coded data stream 608. 11 should be noted that the encod;4ng system 600 is not limited to operating on codewords, and may, in cliher examples operate on discrete analog waveforms, vadable length bit P-Cerns, cilAanne! symbols, alphabets, events, etc.
Enc,Dder 602 includes a context model (CM), a probability estimation r.,.a:,hline (PEt,,,',) and a bitsl,,,.eam generator (BG). The context model and PE1A estimation ma--hine) in encoder 602 are essentially identical to th,zs-^- in the decoder (except the direction of data flow). The bit generator of encoder 602 is sirnilar to the decoder bit generator, and is deschbed below.
The oil the coding by encoder 602 is the output of zero or more bits that 14 represer, the c)hginal data. The output of the bitstrearn generator a!so includes one or more control signals. These control signals provide a control path to the data in the bit stream. In one example,, the 23 Codeword information may comprise a starl of run indication, an end of run ind--ation, a codeword and an index identifying the run count (whether it be by Contexl or probability class) for the codeword. One example of the ce-,ieA-aic)r is described below.
Reorder unit 606 receives the bits and control signals generated by the 25 bit streann generator (if any) of coder 602 and generates coded dalla. In one BAD ORIGINAL -4D- example, the coded dalla output by reorder unit 606 comprises a stream of interleaved words.
In one. example, reorder unit 606 performs two fundons. Reorder unit 606 moves codewDrds frorn, the end of runs as created by the encoder to the beginning of runs as needed by the decoder and combines variable length codewords into fixed length interleaved words and outputs them in the proper order required by the decoder.
The reorder unit 6D6 uses a temporary reordering memory 607. In one example, where encoding is performed on a workstation, temporary rcring rnemory 607 can be over 100 Megabyles in size. In the balanced SYStern of the presenll, examples, the temporary reordering memory 607 is much sMa!!er (e.g., approximately 1 Kbyle) and fixed. Thus, in one example real-time encoding is performed using a fixed amount of rrien, ory, even if this increases the memory required by the decoder or the (sj--h, as when an output is made prior to the complelkiDn of a run). The decoder is able to deiermine the effecIts of the reorder memory using, for instance, implicit, explicit or instrearn signaling (as desc,bed below). Reorder unit 6D6 has finite memory available for reordering, but the memory "needed" is unbounded. Both the effect of limited rne,"nD-.y for end of run to beginning of run queue and for interleaved word reordering must be considered.
In one example, the encoding system (and corresponding decoding system) of the present invention performs the encoding (or decoding) using a sincle intecraied circuit chip. In another example, a single inllegraled cl-,cuit contains the encoder systen including its BA0 ORIGINAL e,ncDder and decoder. and m. emory. A separate external memory may be added to aid in encoding. A multi-chip Module or integrated circuit may =ntain both the encodingidecoding hardware and the memory.
The encoding systern. 1 may attempt to increase the effe--Live bandwith by up to a factor of N. If the compression achieved is less than NA, then the coded data channel will be fully utilized but the Clective bandwidth increase achieved is only equal to the compression rate.
If the compression achieved is greater then NA, then the effective bandwidth is a::',ljeved with extra bandwidth being writable. In both cases, the cc),-ip,,ession achieved must be over a local region of the data defined by the c', buffeiing present in the encoding system.
T- = fc)rlhe Encoder Fic..,re 7 ShDWS one example of the encoder bit generator.
Bit cenerator 701 is coupled to receive a probability class ant,' an unc:)ded bit (e.g., an L1PS) or LPS indication) as inputs. In response to the inpuls, bit generator 701 outputs multiple signa!s. Two of the outputs are co4-Jlkrol signals that indicate the start of the run and the end of a run (each cDdeword represents a run), start signal 711 and end signal 712 respectively.
It is possible for a run to start and end at the same lime. When a run starts or ends, 'index" output 713 comprises an indication of the probability class (or corntext) for the uncoded bit. In one example, index output 713 represents a cD-.nbij-ia'ion of the probability class for the bit and a bank identification for systerns in which each prob-a- bility class is replicalled in several banks of BAD ORIGMAL memory. CDdeWOrd output 714 is used to Output a COdeword from bit generator 701 when a run ends.
A memory 702 is coupled to bit generator 701 and Contains the run count for a given probability class. During bit generation, bit generator 701 reads from memory 702 using the index (e.g., probability class). After reading frorn, man. ory 702. bit generator 701 performs bit generation as follows. First, if the run count equa!s zero, then start signal 711 is asserled indicating the sta-1 of a run. Then, if the uncoded bit is equal to the LPS, then end signal 712 is asserted indicating the end of the run. Also if the uncoded bit equa!s an LPS, cc)dewD-,d output 714 is set to indicate that the CDdeword is a 1 N and the run count is cleared, e.g., set to zero (since its the end of the run). If the uncoded bit does not equal the LPS, then the run count is and a lest determines if the run count equa!s the maximum run c-..,r.'t 1.w the code. If so, then end signal 712 is asserted, codewDrd DUtpUt 714 is set to zero and the run count is cleared (e.g., run count is set to zero). Ifthle les' de-ter-mines thaI 'the run count does not equal the maximum for the cz--e, then the run count is incremented. Note that index signal 713 represents the probability class received as an input.
In the present examples, the generation of 1 N cDdewords is performed such that their length can be determined without any additional information.
Table 12 illustrates 1 N cDdewords representations of R3(2) CDdewords for the decoder and encoder. The decoder expects that the M' bit in a 1 W be the LS5 and that W' count portion is in the proper MS13 LSB order. In decoder order, the variable lenoth cDdeword cannot be d;s',inguished from zero padding without knowing which particular code is El,hD OBIG1NAL -43.
used.. In encoder order, the codeword is reversed and the position of the rn.^st significant 1 bit indicates the length of 1 W codewords. To generate cc)dewo4,.ds in encoder order, the complement of the count value must be reversed. This can be accomplished by reversing the 13-bit count and then sh.tli,Ling it so that it is aligned to the L5B. As described in detail below. the bit paCk unit reverses the codewords back into decoder order. However, this reversal of codewords causes no increased complexity of the bit pack unit 6DE s,n--e it must perforr-ning shifting anyway.
Tab!e 12 - "1 W CDdew:)rd ReDresentalions for R3(2) Co ewords IX-1 1 codeword reverse decoder order 1 encoder order odei data 1 of count value (count value is underlined) 0 -ooooDDDDOD000 00000000000D0 033311: 1000 0.3 000DD00000001 0000000001000 03M1 11010 01 0000DOODD0101 0D000D0D01010 0031 1001 10 ODOODDODO1001 000300D031P01 031 1011 11 0003000D01101 0DD000D001011 01 110 0 0000000000011 ODODOODODO110 1 ill 1 0000000000111 OODOODDOODIll For R3 codes, generating W cDdewords also requires that the bit following the M indicate whelher a short or long count is present.
By using mulliple banks of memory, the present example allows p.,pelining. For instance, in the case of a multi-poried memory, a read operation Occurs to MeMDry for an uncoded bit while a write operation occurs tz the me-.nDry for the previous uncoded bit.
BAD ORIGINAL A" Cepa AHDL Se-nnl,2 Desian One example of the encoder bit generator. comprises a FPGA. The design handles all R2 and R3 codes up to R2(12). The AHDL (Aftera Hardware deschption language) source code is listed 5 be low.
The design comprises rnultiple parts. as shown in Figure 13. First, 'ENCBW 1301 is the main part of the design which has the logic to handle thestart, end and Continuation of runs. Second, KEXPAND' 1302 is used to expand the probability class into the maximum run length, a variable length mask, and the length of the first long codeword for R3 codes. KEXPANW 1302 is identical to the decoder function with the same name. Third, the 'LPb-CW" 1303 part takes a count value and information about the probability c!ass as inpits and generates the prope- r 1 W CDdeword.
The design uses two pipeline stages. During the first pipeline stage, the cl-.lurt is inCremented, the probability class is expanded, and a subtraction and for long R3 codewDrds is performed. All of the other cpe!.at,i-V,ns are performed duhng the second pipeline stage.
cncbg.tdf MLE "Bit Generator for the encoder"; PQCLUDE "kex-pand.inc"; DCLU'DE Ipscw.inC; SUBDESIGN encbg k13-01, r3, bit, count in[I2..0], clk e 0 OFLIG1t1W : INPUT; Start-run, end_run, index[4..0], count - out[12..0], codeword[12..0] V7 k_q[3..0], r3_q, k_qq[3..0], : OUTPUT; r3qq, is bit % bitAl count in q[12..0], start - run, end-run, start run_q, indJ[4..0], coun t - out[12..0], count_plus[12..0], m ax_r 1 [ 12.. 0], code,^,ord[12..0] : DFF; kexpand_: kexpand; lpscw_: lpsci%,; BEGIN Ipsc%v_.cIk = clk; k_q[].clk = clk; r3_q.clk = clk.; k-qqO.clk = clk; r3_qq.clk = clk; bit_q.clk = clk; bit_qq.clk = clk; coun t - in - qn.clk = clk., start - run.clk = clk; end-run.clk - clk., start run q.clk = clk; indeZo.cl-k- = clk; count - outo,clk = clk; count-PIUSD.Clk = clk., max_rl[].clk = clk; code",ordo.clk = clk-, k_qo r3_q k-_qqo r3_qq bit q bit_qq count - in - qU count-pluso Start-run stat run q index[O] index[4..1] kD; r3; k_q D r3_q; bit; bit_q; count-inD; count-in-q D + 1; start-run-q; (count_in_qO -- 0); r3_qq; _qqo; kexpand_.k_rego = k_q D; kexpand,r3-reg = r3-q; Ipscw_.r3 = r3_q; Ipscw_l-qO - k_qo Ipscw_x3_q = r3_qq; Ipscw_.counto - count-in-qD; Ipscw_.maskG = kex-pand_.mask[] Ipscw_x3_splito = kexpand_.r3splito Ipscw_.maxTl_q = max-rin; inax_r 10 = kexpand_.maxTI[] IF (bit-qq) THE end run count - outo codewordo ELSIF (count_plus[] end run count - outo codes..,ordo ELSE end run count - outo codewordo ENT IF; a;D; Ipsc-%4,.tdf SUBDESIGN Ipscw VCC; 0; psew-.C",0; = max rlo) THE VCC; 0; 0; GND; count_pluso; 0; 9/0 LPS C/0 is r3, k_q[3..0], r3_q, count[12..0], mask[ 1 L.0], r3_split[10..0], ma>z- l_q [ 12-0], clk cw[12..0] VARIABLE temp[12..Ol temp_rev[12..0] temp_sh[12..0] split[l L.0] r3_Iong count - minus[l L.0] mask_q[l L.0] count_q[12..0] BEGIN input; output; NODE; NODE, NODE NODE, DFF; DFF; DFF; DFF; r3_Iong.clk = clk; count - minuso.clk - clk; mask_qo.clk = clk; count_qn.clk = clk; split[10 03 = r3_split[L split[ll] = GND; r3-long = (r3) AND (count[l 1-01.=split[]); count - rninuso = count[l L.0] - split[]; mask_qo = mask[] count_qU = counto % pipelin e stage - % IF (r3_Iong) THLN templi 1-0] = (count-minusD) XOR mask_qE1; ELSE temp[ 11-0] = coun t_q [ 1 L.0] XOR mask_q 1ENT IF; temp[12] = GND temp_rev[O] = temp[12] temp_rev[l] = ternp[l I] temp_re,,,[2] = temp[10] temp_re,.,[3] = temp[9) temp_rev[4] = temp [8] temp_rev[S] - temp[7]; temp_rev[6] = temp[6]; tempjev[7] temp[S]; temp_rev[8] - temp[4]; temp_rev19] = temp[3]; temp_rev[10] = temp[2]; temp---.rev[1 l] = temp[l]; temp_rev112] - temp [0] CASE k-qo IS WHEN 0 => temp_sho = 0; WHEN 1 => temp_sh[O] = temp_rev[12]; temp_sh[12 1] = 0; WHEN 2 => temp_sh[l 0] = temp_rev[12 11]; temp_sh[12 2] = 0; WHEN 3 => temp_sh[2 0] = temp_rev[12 10]; temp_sh[12 3] = 0; WHEN 4 => temp_sh[3 0] = temp_rev[12 9] temp_sh[12 4] = 0; WHEN 5 => temp_sh[4 0] = temp_re.,,,[12 8]; temp_sh[12 5] = 0; WHEN 6 => temp_sh[S 0] temp_re-,.,[12 7]; temp_sh[12 61 = 0; WHEN 7 => temp_sh[6 Ol = temp_re\,[12 61; temp_sh[12 77] = 0; WHEN 8 => temp_sh[7 0] = temp_rev[12 5]; temp_sh[12 8] = 0; WHEN 9 => temp_sh[8 0] = temp_re-,,[12 4]; temp_sh[12 9] = 0; WHEN 10 => temp_sh[I2 10] = 0; temp_sh [ 12 10] = 0; WHEN 11 => temp-sh[10 0] temp_rev[12 2]; temp_sh [ 12-11 = 0; WHEN 12 => temp-sh[ll 0] temp_re-,,[12 II; temp_sh[12] = GND; END CASE, IF (NOT r3_q) THEN % R27 916 cliv[] = temp_sho OR ma>z-l_qg; ELSIF (NOT r3_Iong) THEN c/o R3 SHORT % C",[11..0]=temp_sh[12..1] ORmaxTl_q[11-0]; 121 GND; ELSE R3 LONG n.[12..1]=temp_sh[I2..II OR (ma>z-l_q[l L.0] AND NOT mask-qll 1-01) ENT IF; EKD; cw[O] - temp_sh[O]; kexpand.tdf TTI1E "decoder, k expand logiC; SUBDESIGN kexpand k reg[3..0], J reg maxTI [ 12..0] mask[l L.0] r3split[I0..0] BEGIN : input; : output; TABLE k_rego,r3_reg > maxrl[],masko, r3split11 0, 0 > 1, 0, X; 1, 0 > 2, 11 X; 1 > 3, 11 1; 0 > 4, 3, X; 2: 1 > 6, 3, 2., 3, 0 > 8, 7, X -, 3, 1 > 12, 7, 4; 4, 0 > 16, 15, X; 4, 1 > 24, 15, 8; 5, 0 > 32, 31, X; 5, 1 > 48, 31, 16:
6, 0 > 64, 63, X; 6, 1 > 96, 63, 32; 7, 0 = > 128, 127, X; 7, 1 = > 192, 127, 64; 8, 0 = > 256, 255, X; 8, 1 = > 384, 255, 12 8; 9, 0 = > 512, 511, X -, 9, 1 = > 768, 511,256; 10, 0 = > 1024, 1023, X; 10, 1 = > 1536, 1023, 5 12; 11, 0 = > 2048, 2047, X, -so- 11, 1 > 3072, 12, 0 > 4D96, W\M TAELF, ENW; 2047, 1024; 4095, X; The FRenlder Unll of the Present Invention Figure 8 is a block diagram of one example of the reorder unit. Reterhng to Figure 8, reorder unit 606 comprises a run count reorder unit 801 and a bit packing unit 802. Run count reorder unit 801 moves codewords frorn. the end cf, runs as created by the encoder to the begnning of runs as needed by the decoder, while bit packing unit 602 combines variable length codewords into fixed length interleaved words and outputs them in the proper order reqj,red by the decoder.
is A "snooper" decoder can be used to reorder for any decoder, in which a dg--0-.j.-t7 is included in the encoder and provides requesis for data in an order in whiCh the codewords will be needed by the real decoder. To support a sno:)pe decoder, reo#rderinp of run counts might have to be done indeperidently for each strearn. For decoders that can be modeled easily, 2D mjh;,p,e time stamped queues or a single merged queue may be used to aliDw reordering. In one, example, reordering CaCh CDdeWDrd can be ac--orr.plished using a queue-like data structure and is independent of the use c'I multiple coded data streams. A description of how the reordering may be performed is given below.
The first reordering operation that is performed in the encoder is to reorder each of the run counts so that the run count is specified at the bez,,n,r,ing of the run (as the decoder requires for decoding). This reordering ISAD ORIGINAL -51.
is required because the encoder does not determine what a run count (and codeword) is until the end of a run. Thus, the resulting run count produced from coding the data is reordered so that the decoder is able to properly decode the run counts back into the data stream.
Referring back to Figure 8, reorder unit 606 comprises run count reorder unit 801 and bit pack unit 802. Run count reorder unit 8D1 is coupled to receive multiple inputs that include starl signal 711, end signal 712, index signal 713 and codeword 714. These signals will be described in more detail in conjunction with the run count reorder unit of Figure 1-1. In response to the inputs, the run count reorder unit 601 generates codeword 803 and signal 8D4. Signal 804 indicates when to reset the run count. Codeword 603 is received by bit pack unit 802. In response to 803, bit pack unit 802 generaies interleaved words B05.
Run count reorder unit 801 and bit pack unit 8D2 are described in turther Cetall below.
Pen-de. Unil As desc,bed above, the decoder receives COdaWOrdS at the time the beginning of the d-=&a coded by the codeword is needed. However, the encoder does not know the identity of the CD1Jeword until the end of the data coded by the codeword.
A block diagram of one example of the run count reorder unit 8D1 is des--, nbed in Figure 9. The described embodiment accommodates four streams, where ea:i'i interic-aved word is 16 bits, and the codc-..,ords vary in length from one to thirteen bits. In such, a case, the BAD ORIGINAL reorder unit 6M may be pipelined to handle all streams. Furthermore, an encoder that associates run counts with probability classes is used such that the maximum number of run counts that can be active at any lime is small, and is assumed to be 25 for this embodiment. Note that the present example is not limited to four interleaved streams, interleaved words of 16 bits or =dewzrd lengths of 1 to 13 bits, and may be used for more or less streams w.,",h interleaved words of more or less than 16 bits and codeWDrd lengths that exIend from 1 bit to over 13 bits.
Referring to Figure 9, a pointer memory 9D1 is coupled to receive index input 713 and produces an address output that is coupled to one input of rn,u!i,plexer (MUX) 902. Two other inputs of MUX 902 are coupled to receive an address in the form of a head pointer from head Counter 903 and an P- in the form of a tail pointer from tail counter 9D4. The output of MUX G^J2 is ar) address Coupled to and used to access a CDdeword memory 908.
is Index input 713 is also coupled to as an input to MUX 905. Another inp,.J4 of 1,1UX 9D5 is coupled to the cDdeword input 714. The Output Of MUX 9"-5 is to an input of valid detection module 906 and to a datla bus 9D7. Dala bus 907 is coupled to codeword memory 90B and an input of MUX 95. Also coupled to data bus 907 is an output of control module 9D9. Start inpulk 711 and end input 712 are coupled to separate inputs Of Control module 9g. The oLPputs of valid detection module 9D6 comprise the codeword Output ED3 and the signal BD4 (Figure 8). Run count reorder unit 801 also czn, prises controller logic (not shown to avoid obscuring the present to coordinate the operations of the various components of run c:)unt reordef. unit B01.
8,D ORIGa4AL To re.:'lerae, index input 713 identifies a run. In One example, the index indicates one of 25 Probability classes. In such a case, five bits are needed to represent the index. Note that if multiple banks of probability classes are used, then extra bits might be required to specify the particular bank. In one example, the index input identifies the probability class for the run count. Codeword input 714 is the codeWDrd when the end of a run Occurs and is a "don't care" otherwise. Start input 711 and end input 712 are control siara!s that indicate whether a run is beginning, ending, or both. A run bezins and ends at the same lime when the run consists of a single unCDded bit.
Run count reorder unit 801 reorders the run counts generated by the b.& generator in response to its input signals. CDdeword memory 908 stores diring reordering. In one example, CDdeword memory 908 is Lha4.he number of run counts tha! can be active at one time. This to b=.-, ,er compression. If the CDdeWOrd memory is smaller than the n,,,,,,nb-2r of run counts that can be active at one time, this would actually limit the nurnbz-r of active runcolunts to the number tha! could be held in memory. In a system that provides good compression, it olften occurs that while data for One CDdeword with a 1Dno runcouni is being accumulated, many codewords with short runcounts will start (and perhaps end also). This requires having a laMe Memory to avoid forcing out the long run before it is completed.
Pointer memory 901 Stores addresses for codeword Memory IDcatiDns for prol,,J-:,bil,;ty classes that are in the middle of a run and addresses cDdeword rinern.ory.5138 in a ra,-idD,,n access fashion. Pointer memory 901 has a storage IDcation fz,. the address in codeword memory 908 for each probability class BAD ORIGINAL -54.
that may be in the middle of a run. Once a run has completed for a particular probability class, the address stored in pointer memory 901 for that probability class is used to access codeword memory 908 and the completed codeword is written into codeword memory 908 at that location. Until that lime, that location in codeword memory 908 contained an invalid entry. Thus, pointer memory 901 stores the location of the invalid codeword for each run count.
Head counter 903 and tail counter 904 also provide addresses to access codeword memory 908. Using head counter 903 and tail counter 904 allow codeword memory 908 to be addressed as a queue or circular buffer (e.g., a first in, first out IFIFO] memory). Tail pointer 904 contains the address of the next available location in codeword memory 908 to permit the insertion of a codeword into codeword memory 908. Head counter 903 contains the address in codeword memory 908 of the next codeword to be output. In other words, head counter 903 contains the codeword memory address of the next codeword to be deleted from codeword memory 908. A location for each possible index (e.g., probability class) in pointer memory 901 is used to remember where tail pointer 904 was when a run was started so that the proper codeword can be placed in that location of codeword memory 9D8 when the run ends.
Control module 909 generates a valid signal as part of the data stored in codeword memory 908 to indicate whether or not an entry stores valid codeword data. For instance, if the valid bit is at a logical 1, then the codeword memory location Contains valid data. However, if the valid bit is at a logic 0, then the codeword memory location contains invalid data. Valid detect module 907 determines if a memory location contains a valid codeword BAD ORIGiNAL Each. time a codeword is read out from Codeword memory BD9. In one example, the valid detection module 907 detects whether the memory loCattion has a valid codewDrd or a special invalid code.
When starting a new run, an invalid data entry is put in codewDrd memory 90B. The invalid data entry acts as space holders in the stream of data stored in codeword memory 908, such that the codeword for the run may be store,-,' in the memory in the correct location (to ensure proper ordering to model the decoder) when the run has completed. In one example. the data entry includes the index via 1AUX 9D5 and an invalid indication (e.c., an, invalid b,t) from control module 9D9. The address in codeword mernoy. 9DB all which the invalid entry is stored is given by tail pointer 904, and subse,,jenlly stored in pointer mernory 901 as a reminder of the location fic, the run coint in codewoid mernory 908. The rernainder of the data that P-pp=-a,s be-tween hear.' pointer 903 and tail pointer 904 in codeword memory as comple-ted run counts (e.g., reordered run counts). The maximum n,.;,,n,ber of invalid rnemo-.y locations is 0 to 1-1 where 1 is the number of run VJher) a codev.,z,,d is complete at the end of a run, the run count is Cj'e'd in codeword memory 905 using the address stored in pointer memory 9M.
When a run starts, the index for the run is stored in codeword memory so that if cDdeword memory 908 is full but the run is not yet complete, the index is used in conjunction with signal 604 to reset the corresponding run ccin,Ler. In addition to storing codewords or indices in codeword memory 9S, one b'l, refe, red to herein as the "valid" bit, is used to indicate which of these two types of data is stored.
BAD ORUNAL If not starting or ending a run, the run count reorder unit is idle. If starting a run and not ending a run and if the memory is full, then a Codeword is OUtpUt from CDdeWOrd Memory 908. The codewDrd that is output is the COdeWDrd stored at the address contained in head pointer 903 for that probability class. Then, if starting a run and not ending a run (irrespective of whether the memory is full), index input 713 is written into codeword memory 9D8 via LlUX 905 at the address designated by tail pointer 904. Tail pointer 934 is then w,PiIten into pointer memory 901 at an address designated by the d _=41a on index input 713 (e.g., at the location in pointer memory 901 for the p-,cbab,,lity class). A,er writing tail pointer 9D4, tail pointer 904 is incremented.
If endin a run and not starting a run, then the address stored in the rniem.z-,y 901 corresponding to the index (probability class) is read out and used as the in the codewDrd memory to store the completed code%,:),d on codeword input 714.
a run and ending a run (i.e., a run both begins and ends at the s-=me firne), and the mernory is full, then a codeword is output from codeword memory 908. Then. if starting a run and ending a run (irrespective of whether the memory is full), codeword input 714 is wCen into codeword memory M at the address specified by tall pointer 904. Tail pointer 904 is then incremented to contain the next available location (e.g., increment by 1).
in the present examples, run count reorder unit 801 may output codewords at different times. In one example C0dewords may be output when they we valid or invalid. Codewords may be output when invalid if a rnernory full ccndtion exiss and a run has not completed. Invalid cDdewords BAD ORIGINAL may also be ortpit to maintain a minimum rate (i.e., for rate control). Also, invalid codewords may be output to flush codeword Memory 9DE when all of the data has undergone run count reordering or when the run count reorder uni.1 jumps to the Middle Of COCIeWDrd memory 908 as a result of a reset operation. Note that in such a case, the decoder must be aware that the encoder is operating in this way.
As described above, a COCIeWDrd is output whenever the codeword memory ODE is full. Once the memory is full, whenever an input (i.e., starting a new codewo,d) to the cDdewotd memory 90B is made, an output from the codeword memory 9DE is made. Note that an update to an entry does not cause an output from the codeword memory 908 when a memory full cc)nd:l, ion exists. That is, the completion of a run followed by the writing of the resiing code%,c,,d into its previously assigned memory location does not ca,-,se a memory full output lo occur. Similarly, when a run ends and the c:7resp:),ndi,in address in pointer memo-,y 901 and the address in the head =inter 933 are the same, the codeword can be output immediately and the head counter PD3 can then be incremented wthoul accessing the codeword memory 905. In one example, a memory full condition occurs when the tail pointer 904 is equal the head pointer 903 after the tail pointer has been incremented. Therefore, once the tall pointer 904 has been incremented, the controller logic in the run count reorder unit 801 compares the tall pointer 904 and the head pointer 9D3 and if the same, the controller logic determines that the codewDrd memory 908 is full and that a cDdewDrd should be output. In another example, cDdewords may be output prior to the memory beling full. For instance, if the p:)rlion of the queue addressed by the head contains BAD ORIGINAL is valid cDde",o,-ds, it may be output. This requires that the beginning of the queue be repeated!y examined to determine the status of the cDdeworcis therein. Note that the cDdeword memory 908 is emptied at the end of coding of file.
Using run count reorder unit BD1, a CDdeword is output by first reading a value (e.g., data) from codeword memory 9D6 at an address specified by head pointer 9M. The cuiputing of codewords is controlled and coordinated Using controller logic. Valid detection Module 906 performs a test to del =_ rm Ine i 1 the va! Lie is a CDdeword. In oll her words, valid detection module if the cDdeword is valid. Inone example, valid cJete:ion 9D5 determines the validity of any entry by checking the validity bit stored Y,,,'4,h each entry. If the value is a cDdeworcl (i.e., the codeword is valid), t h =_,-$ t 11 le va!je is output as a codeword. On the other hand, if the value is not a (i.e., the codeword is invalid), then any codeword may be output whiCh has P run of LIPSs at least as lono as the current run count. The '7 is one cDdeword that correctly represents the current run thus far, and may, be output. Afler the output has been made, head pointer 903 is incre-nented to the next location in cDdeWDrd memory 908 Altematively, using the 1 W wIth the shortest allowable run lengths allows the deCDder to check only whether a codeword has been forced out before emitting a LPS.
In one, example, run count reorder unit 801 operates with a two clock cycle lime. In the first clock cycle, inputs are received into run count reorder unit 801. In the second clock cycle, an output from codeWDrd memory 935 BAD oRIGINAL While codewords may be output whenever head pointer 903 addresses a valid codeword, it may be desirable in some implementations to only output a codeword when the buffer is full. This causes the system to have a fixed delay in terms of a number of codewords. instead a variable delay. If memory 908 is able to hold a predetermined num ber of codewords, between the time when a run is started and is input and when is output, the delay is that number of codewords since an output it is not made until it is full. Thus, there is constant delay in codewords. Note that the reordering delay is still variable in other measures, for example, the amount of coded or original data. By allowing memory 908 to fill up prior to producing an output, the output generates a codeword per cycle.
Note that if a codeword memory location is marked as invalid, the unused bits may be used to store an identification of what run count it is for (i.e., the context bin or probability class that must fill the location is stored therein). This information is useful for handling the case where the memory is full. Specifically, the information may be used to indicate to the bit generator that a codeword for this particular run length was not finished and that it must be finished now. In such a case, a decision has been made to output an invalid codeword, which may have occurred due to a memory full condition.
Thus, when the system resets the run counter, the information indicates when, in terms of bit generators and run counts, the system is to begin again.
With respect to the index input, for pipelining reasons when banks of probability classes are used, the index may include a bank identifier. That is, there may be multiple run counts for a particular probability class. For BAD ORIGINAL instance, two run counts may be used for the 80 percent code, where one is used and then the other.
Since the codewords are variable length, they must be stored in codeword memory 908 in a manner that allows their length to be determined.
While it would be possible to store the size explicitly, this would not minimize memory usage. For R-codes, storing a value of zero in memory can indicate a one bit "D" codeword and the M Nn codewords can be stored such that a phoity encoder can be used to determine the length from the first 01' bit.
If codeword memory 908 is multi-ported (e.g., dual ported), this design can be pipelined to handle one codeword per one clock cycle. Because any location in codeword memory 908 could be accessed from multiple ports, a location in codeword memory 908 may be written, such as when an invalid or codeword is being stored, while another Portion may be read, such as when a codeword is being output. Note that in such a case, the mutliplexers may have to be modified to support the multiple data and address buses.
Whenever the encoder outputs a "0" codeword and resets a run counter because the codeword memory is full, the decoder must do the same.
This requires the decoder to model the encoder's cDdeword memory queue.
How this is accomplished will be discussed below.
Note that to save power in CMOS implementations, counters can be disabled for "IN" codewords when "0" cDdewords are output for invalid runs.
This is because a M W codeword being decoded is valid, while only a "0" codeword may be invalid.
BAD C)RIGINAL -61.
Alternative Example Based on Context Figure 10 is a block diagram for another example of a run count reorder unit that reorders data received according to Context (aS Opposed to p,l,obp-b,1,lty class). The run count reorder unit 1000 performs reordering using the R-codes. Referring to Figure 10. the reorder unit 1 ODD includes a pointer memory 1001, ahead counter 1002, a tail counter 10D3, a data multiplexer (.I,UX) 1 OD4, an address MUX 1 DDS, a Compute length block 1006, a valid deect block 1007, and a CDdeword memory 1 ODE. Codeword memory 1008 stores codewords during reordering. Pointer memory 1001 stores addresses fo4, c:)de.,%,zrd memory locations for context bins that are in the middle of a run.
Head counter 1 D02 and tall counter 1003 allow CDdeword memory 1008 to be addressed as a queue or circular buffer in addition to being addressed in access fashion by the polinter mern.ory 1001. ForR-codes,sto,Pinga va!ue c: zero in memory can indicate a one bit "D" CDdeWOrd and the M N' codewords can be stored such that a priority encoder can be used to de',e,rn,ine the length frorn, the first 1" bit. Compute length module 1006 cpe,a',es like a priority encoder. (if other variable length Codes were used, it w:)uld be more memory efficient to add a M bit to mark the start of the cDdeword than to add 1092 bits to explicitly store the length.) Run count reorder unit 1 ODD also includes backstage controller logic to Coordinate and control the operation of the components 1001-1 ODE.
The operation of the run count reorder unit 10DO is very similar to the run count reorder unit that is based on probability estimates. If starting a new run, then an invalid entry including the context bin is written into CDdeword memory 1008 at the address indicated by tail pointer 1003. Tail pointer 1003 BAD ORGINAL address is then stored in pointer memory 1001 at the address of the context bin of the current run count. Tail pointer 1003 is then incremented. When completing a run, then the Pointer in pointer memory 1001 corresponding to the run count is read from pointer memory 1001 and the codeword is written in parallel into codeword memory 1008 at a location designated by that pointer. If neither starting or ending a run, and if a location in codeword memory 1008 designated by the address of head pointer 1002 does not contain invalid data, then the codeword addressed by the head is read and output. Head pointer 1002 is then incremented. For the case when a run both begins and ends at the same time, the codeword is written into codeword memory 1008 at the address designated by tail pointer 1003 and then tail pointer 1003 is incremented.
Similarly, when a run ends and the corresponding address in pointer memory 1001 and the address in head counter 1002 are the same, the codeword can be output immediately and value in head counter 1002 can be incremented without accessing codeword memory 1008.
For run count "by contexl" systems, every context requires a memory location in pointer memory 1001, so the width of the BG and PEM state memory can be extended to implement this memory. The width of pointer memory 1001 is equal to the size needed for a codeword memory address.
The number of locations in codeword memory 1008 can be chosen by the designer in a particular implementation. The limited size of this memory reduces compression efficiency, so there is a cost/compression trade-off. The width of the cDdeword memory is equal to the size of the largest codeword plus one bit for a valid/invalid indication.
BAD OBIGMAL An example using the R2(2) code, show in Table 13 below, will be used to illustrate reordering. Table 14 shows the data to be reordered (O=MPS, more probable symbol; 1=LPS, less probable symbol), labeled by contexl. There are only two contexts. The uncoded bit number indicates time in uncoded bit clock cycles. Start and end of runs are indicated, and codewords are shown at the end of runs.
Table 13
Code Original Codeword 0000 0 0DO1 100 001 110 01 101 1 ill BAD ORIGWAL Table 14 - Example Data to be Encoded Uncoded Data Context Start/End Codeword bit n=ber 1 of Run 1 0 0 2 0 1 3 0 0 4 1 1 E 101 0 0 6 0 1 7 0 0 E 0 8 1 1 E 101 9 0 0 S 0 1 S 11 0 0 12 0 1 13 0 0 14 0 1 1 0 E 100 16 0 1 E 0 The reordering operation for the example data is shown in Table 15. A codeword memory with four locations, 0-3, is used, which is large enough to not overflow in this example. Each row shows the state of the system after an operation which is either the start or end of run for a certain context or the output of a codeword. An "x" is used to indicate memory locations that are "donl care". For some uncoded bits, a run neitherstarts or ends so the run count reorder unit is idle. For coded bits that end runs, one or more codewords can be output, which may cause several changes to the system state.
BAD ORIGINAL Table 15 - Example of Reordering Operations Uncoded Input pointers pointer memory cDdeword memory output bit number head 1 tail 0 o 11 12 13 1 start 0 0 1 0 X invalid X X 2 start 1 0 2 0 1 invalid invalid X X 3 (reorderino unit idle) 4 endl.lol FO 12 10 1 X 1 invalid 1101 1 X (reorderina unit idle) 6 start 1 0 3 0 2 invalid 101 invalid X 7 endD,0 0 3 X 2 0 101 invalid X 1 3 X 2 X 101 invalid X 0 2 3 X 2 X X invalid X 101 8 2 3 X X X X 101 X 3 3 X X X X X X 101 9 start 0 3 0 3 X X X X invalid 3 1 3 0 invalid X [X invalid 11 12 (reordering unit idle) 13 14 endO,loo 3 1 X 0 invalid X X 100 0 1 X 0 invalid X X X 100 16 endi.0 0 1 X X 0 X X X 1 1 X X X X X X 0 Referring to Table 15, the head and tall pointers are initialized to zero, indicating that nothing is contained in the codeword memory (e.g., queue).
The pointer memory is shown having two storage locations, one for each context. Each location has don't care" values prior to bit number one. The codeword memory is shown with a depth of four codewords, all initially adon't care values.
In response to the data received for bit number 1, the head pointer remains pointing to codeword memory location 0. Since the decoder will expect data, the next available codeword memory location, 0. is assigned to the codeword and an invalid value is written into the memory location 0. Because the context is zero, the address of the codeword memory location assigned to the codeword is stored in pointer memory location for the zero context (pointer memory location 0). Thus, a V' is stored in pointer memory location 0. The tail pointer is incremented to the next codeword memory location 1.
In response to the data corresponding to bit number 2, the head counter remains pointing to the first memory location (since there has not been an output causing it to increment). Since the data corresponds to the second context, context 1, the next codeword memory location is assigned to the codeword as codeword memory location 1 as indicated by the tail pointer and an invalid value is written into the location. The address, codeword location 1, is written into the pointer memory location corresponding to context 1. That is, the address of the second codeword memory location is written into the pointer memory location 1. The tail pointer is then incremented.
In response to the data corresponding to bit number 3, the reorder unit is idle since a run is not starting or ending.
BAD oRiGINAL In response to the data corresponding to bit number 4, an end of a run is indicated for context 1. Therefore, the codeword M01" is written into the codeword memory location assigned to context 1 (codeword memory location 1) as indicated by the pointer memory location for context 1. The head and tall pointers remain the same, and the value in the pointer memory location for context 1 will not be used again, so it is "donl care".
In response to the data corresponding to bit number 5, the reorder unit is idle since a run is not starting or ending.
In response to the data corresponding to bit number 6, the same type of operations as described above for bit 2 occur.
In response to the data corresponding to bit number 7, the end of the run for the codeword for context 0 occurs. In this case, the codeword 'V is written into the codeword memory location (codeword memory location 0) as indicated by the pointer memory location for context 0 (pointer memory location 0). Then the value on the pointer memory location will not be used again, such that it is a "don't care." Also the codeword memory location designated by the head pointer contains valid data. Therefore, the valid data is output and the head pointer is incremenled. Incrementing the head pointer causes it to point at another codeword memory location containing a valid codeword. Therefore, this cDdeword is output and the head pointer is incremented again. Note that in this example, codewords are output when they are able, as OppDSed to when the codeword memory is completely full.
Processing through the uncoded bits continues to occur according to the description above. Note that the codeword memory locations are not dedicated for use with particular Contexts, such that cDdewords from any of BAD ORIGINAL the contexts may be stored in a particular codeword memory location throughout the coding of a data file.
The Et Pack Unt Bit packing is illustrated in Figure 4 where data processed by the reorder unit before and after bit packing is shown. Referring back to Figure 4, sixteen vahable length codewDrds are shown, numbered 1 through 16 to ind,7cae the order of use by the decoder. Every codeword is assigned to one of three coded streams. The dr-_'a in each coded stream is broken into fixed leng,,,h words called interleaved words. (Note that a single variable length codev,,.-.,,d may be broken into two interleaved words.) In this example, the i r.4,e,,,'eaved words are ordered in a sinale interleaved stream such that the order cl f;i,,slk va-'dable lencth codeword (or partial cDdeword) in a pa- tcular interleave word determines the order of the interleaved word. Other types of criteria may be perlormed. The advantage of inle71eaving the coded sirearns is that a single coded data channel to transfer data can be used and 1hal variable length shifting can be performed for each stream, in a parallel or in a pipeline.
The bit pack unit 802 receives the vadable length codewords from the run count reorder unit 801 and packs them into interleaved words. The bit pack unit 802 comprises logic to perform the handling of variable length codewDrds and a merged queue type reordehing un;11 to cLr!p,J1 fixed lenalkh interleaved words in the correct order. In one example, the codewords are received from the run count reorder unit at a r-r-4,e of up to one codewo4rd per clock cycle. A block diagram of one 3,D ontGtt4AL example of the bit pack unlit 802 is shown in Figure 11. in the following example, four interleaved streams are used, each interleaved word is 16 bits, and codewords vary in length from one to thirteen bits. In one example, a single bit pack unit is pipelined to handle all streams. If the bit paCk unit 802 uses a dUal-PDried memory (or register file). it can output one interleaved word per Clock cycle. This may be faster than required to keep up with the rest of the encoder.
Referring again to Figure 11. the bit pack unit 602 includes packing log', ,,-, 1101. a stream counter 1102, memory 1103, tail pointers 1104 and a he a,,.' c o u nter 1105. Packing logic 1101 is Coupled to receive the CDdewords and is ccupled to strearn, counter 1102. Stream counter 1102 is also coupled ID 41,h-2menoryllo3. Also coupled to memory 1103 are tail pointers 1104 and he -=d cc unlle r 1105.
Stream counter 1102 keeps track of the intefleaved stream with which the current input codeword is associaled. In one example, stream counter 1102 repealedfly counts the strearns from 0 to N-1, where N is the number of strea-ns. Once stream counter 1102 reaches N-1, it begins counting from 0 in one, example, strearn counter 1102 is a tWD-bil counter and Counts from 0 10 3 (for four interleaved streams). In an example, stream counter 1102 is initialized to zero (e.g., through global reset).
Packing ID9iC 1101 merges the current input CDdeword with previously inpX, COdeWDrds to form interleaved CDdewords. The length of each of the WdeWDrdS may vary. Therefore, packing lopic 1101 packs these vahable len-th codewDrds into fixed length words. The interleaved WdeWDrds created by packing lopic 1101 are output to memory 1103 in order and are stored in BAD ORIGINAL MS-Mory 1103 unti l the proper time to output them. In one example, memory 1103 is a static random access Memory (SRAM) or a register file with sixty-four 1 6-bit words.
The interleaved words are stored in Memory 1103. In the present 1 example, the size of memory 1103 is large enough to handle two cases. One case is the normal operation case where one interleaved stream has m,,n,mu",n length cDdewDrds and the other interleaved streams have maximum len71h codewords. This first case requires 3x13=39 Memory locations. The Cher case isthe ini. A case where again one strearn, has minimum le.-iz:lbh, or short, codewords and the others have maximum length, or long, codewords. For the second case, while 2x3xl 3=78 memory locations are lhe cperaion of the PEIA allows a tighter bound of 56.
Memory 1103 in cooperation wilth stream counter 1102 and the tail p.-,,,n,=-,,s1104pe,,4,ormreDrdering. Stream counter 1102 indicates current strea-n of a c:)dewDrd being received by memory 1103. Each interleaved C.reams is asso--17aed wil.h, at least one tail pointer. Tail pointers 1104 and h=-z-d c:)Lj:,,"ter 1105 perform, a reordering of the cDdewo,,ds. The reason for having two tail pointers per stream follows from interleave word N being requested by the decoder when data in interleaved word NA contains the of the next CDdewDrd. One tail pointer determines the location in the memory 1103 to store the next interleaved word from a given interleaved strean,. The other tail pointer determines the location in memory to store the in,erleave,,41 word after the next one. This allows the location of interleaved wz,,,d N to be specified when the decoder request time of interleaved word N-1 BAD ORIGINAL is known. In one example, the pointers are eight 6-bit registers (two tail pointers per stream).
In onE example, at the staTI of encoding, the Wil pointers 1104 are set such that the first eight interleaved words (two from each stream) are stored in the memory 1103 in sequence one from each stream. After initialization, whenever the packing logic 1101 begins a new interleaved word for a parlicular code stream, the "next" tail pointer is set to value of the 'after nexto tall pDinlic-r, and the "after next" tail p:)inter for the Code stream is set to the next avallable memory location. Thus, there are two tal! pointers for each 54 Lrearm. In another example, only one tail pointer is used for each stream and indicates where the next interleaved word is to be stored in the memory 1103.
The head counter 1105 is used to determine the memory location of the next interleaved word to output from the bit pack unit 802. In the desc:r&.bec example, the head counter 1105 comprises a 6-bit counter that is incrern.en4&ed to ouiput an entire interleaved word at a time.
The memory 1103, in addition to being used for reordering, can also be used as a FIF0 buffering between the encoder and the channel. 11 may be desirable to have this memory bigger that what is required for reordering, so a FIFO-almost-full signal can be used to stall the encoder when the channel cannot keep up with the encoder. A one-bil-per-cycle encoder cannot generate one interleaved word per cycle. When an encoder is well matched to a channel, the channel will not accept an interleaved word every cycle, and some FIFO buffering is necessary. For example, a channel that. can accept a d3AD ORUNAL 16-bit interleaved wc,md every 32 clock cycles would be a well matched design fo,, 2:1 effective bandwidth expansion when compression was 2:1 or greater.
* The Packing Logic of the Present Examples A block diagram of the packing logic is shown in Figure 12. Referring to Figure 12, the packing logic 1101 comprises a size unit 1201. a set of accumulators 1202, a shifter 1203. a MUX 1204, a set of registers 1205, and an, OR gate loolc 1206. Size unit 1201 is coupled to receive CDdewords and is cD,.,pled to accumuia'&ors 1202. The accumulators as well as the c:)dew.,)rds are COUP1eld to shifter 1203. Shifter 1203 is coupled to MUX 1204 and OR cate logic 1206. MUX 1204 is also coupled to registers 1205 and an citpit c! OR gate lozic 1205. The registers are also coupled to OR gate logic 12DE.
In CA-le example, zodewords are input on a 13-bJ1 bus with unused b'z- zec.2d. These zeroed unused bits are adjacent to the "1 " in M W so a priority encoder in size unit 1201 can be used to determine the 1-2nc:h of the 01 W cDdewords and generate a size for"D codewords.
Accumulators 1202 comprise multiple accumulators, one for each interleaved stream. The accumulator for each interleaved stream maintains a re--o,,d of the number of bits already in the current interleaved word. In one e,-nbDdiment, each accumulator comprises a 4-bit adder (with carTY out) and a 4-b:'1'rep,ster used for each stream. Inone example, the output of the adder is the output of the accumulator. In another embodiment, the output of 1he re:,se,- is the cu4lpj4l ofthe accumulator. Using the size of the cDdewords as received from size unit 1201, the accumulators determine the number of BAD ORIGINAL b41s to shift to concatenate the current codeword into the register containing the current interleaved word for that stream.
Based on the current value of the accumulator, the shifter 1203 aligns the current codeword so it properly follows any previous C0deWDrds in that interleaved word. Thus, data in the encoder is shifted into decoder order. The output of shifter 1203 is 28 bits, which handles the case where a 13-bit codeword must be appended to 15 bits in the current interleaved word, such that bits from the current codeword end up in the higher 12 bits of the 28 bits being output. Note that shifter 12D3 operates without feedback, and, thus, can be pipelined. In one example, shifter 1203 comprises a barrel shifter.
Regsters 1205 store bits in the current interleaved words. In one example, a 16-bit recister for each interleaved stream holds previous bits in the current interleaved word.
int,Li-zlly, a codeword of a stream is received by shifter 1203, while size unit 1201 indicates the size of the codeword to the accumulator c:),,, espz)n,d:i,nc to the streann. The accumulator has an initial value of zero set th,,cu^h a glc)bal reset. Since the accumulator value is zero, the codeword is not shifted and is then 0Red using OR logic 1206 with the contents of the register corresponding with the stream. However, in some examples, 1N codewDrds must be shifted to be properly aligned even at the start of an interleaved word. This register has been initialized to zero and, therefore, the result of the ORing operation is to put the codeword into the right-MDst bit p:)sitions of the output of OR logic 1206 and are feedback through MUX 1204 to the re9,ster for storace until the next codeword from the stream. Thus, initia'ly shifter 1203 operates as a pass through. Note that the number of bits 13AD ORIGINAL in the first codeword are now stored in the accumulator. Upon receiving the next codeword for that stream, the value in the accumulator is sent to the Shifter 1203 and the codeword is shifted to the left that number of bits for combining with any previously input bits in the interleaved word. Zeros are placed in the other bit positions in the shifted word. Sits from the register corresponding to the stream are combined with bits from shifter 1203 using OR logic 1206. If the accumulator does no. produce a carry out indication (e.g., signal), then more bits are required to complete the current interleaved word and the data resulting from the ORin.c; o:)eration is saved back into the re";s4erthrough, MUX 1204. In one. example, MUX 1204 comprises a 2:1 When the a,-,r-,umulaltDr generates a carry out, the 16 bits of OFRe.-.' drata from OR logic 1206 are a complete interleaved word and are then output. LlUX 1204 causes the rec;ster to be loaded with any additional bits (e.g., the upper 12 bits of the 28bils outpul from the shifter 1203) after the firs' 16 and f1Ps the rest with zeros.
The control for both MUX 1204 and the outputting of the interleaved wDrd comprises the carry out signal from the accumula!c)r. In one example, the multiplexer 1204 comprises sixteen 2:1 multiplexers with 4 of these having one input that is always zero.
FRe:pdenc) C)zi;cns Multiple options are possible for performing reordering on the dalka. For instance, in a system with multiple code streams, the code streams must be reordered into interleaved words as shown in BAD ORIGINAL Fi-ure 4. There are b numerous ways to accomplish reordering into interleaved words.
One method for reordering data into interleaved words is to use a snooper decoder as shown in Figure 25. Referring to Figure 25, multiple run count reorder units 2501A-n are coupled to receive codeword information along with the cDdeword stream. Each generates a codeword output and a size citput. A separate bit packing logic (11 D1) unit, such as bit packing units 25mj2A-n, is Coupled 10 receive the codeword and size outputs from one of the run counI reorder units 2501 A.n. Bit packing 1DgIC units 2502a.n output inteirieaved words thal, are coupled to both MUX 2503 and snooper decoder 254. Decoder 2504 provides a select control signal that is received by MUX 2W3 and indicates to MUX 2503 which interleaved word to output into the code 5",46am,.
Each, coded data strearn has a run count reorder unit, comprising run ccint reorder unit 801, in Figure 6. Each bit pack unit combines variable len-th codewords into fixed size interleave words, perhaps 8, 16 or 32 bits per w,-..t,. Each bit pack unit contains registers and shifting circuitry, as described above. DeCoder 2504 comprises a fully operational decoder (including BG, PEM, and CM) that has access to interleaved words from all bit pack units (Cher on separate buses as shown in Figure 25 or via a common bus).
Whenever decoder 2504 is selected an interleave word from one of the bit pa,-.k units, that word is transmitted in the code stream. Since the decoder at the receiving end will request the data in the same order as the identical snooper decoder, the interleaved words are transmitted in the proper order.
BAD ORIGINAL 76- An encoder with a snooper decoder may be attractive in a half duplex system, since the snooper decoder can also be used as a normal decoder. An advantage of the snooper decoder approach is its applicability for any deterministic decoder. Alternative solutions, discussed below, without dependence on a snooper decoder, use simpler models of the decoder in order to reduce hardware Cost. For the decoders that decode multiple codewords in the same clock cycle, modeling the decoder with less hardware than a decoder itself may not be possible, necessitating the use of a snooper decoder. As will be described below, for decoders that only decode at most one codeword per cycle, simpler models exist.
Another technique for reordering data for pipelined decoder systems that decode at most one code word per clock cycle is based on the fact that the only information needed to model the decoder's requests for coded data is to know the order of the codewords (considering all codewords, not the codewords for each coded data stream independently). If a time stamp is associated with each codeword when it enters the run count reorder unit, whichever bit packed interleaved word has the oldest time stamp associated with it is the next interleaved codeword to be output.
An exemplary encoder reordering unit is shown in block diagram form in Figure 26. Referring to Figure 26, the encoding system is the same as described in Figure 25, except time stamp information is received by each run count reorder unit 2501A.n as well. This time stamp information is also forwarded to bit pack units 2502A-n. Bit pack units 2502A.n provide interleaved words to MUX 2503 and their associated time stamps to logic 13AD ORIG" 77- 2601. Lomic 2601 provides a control signal to MUX 2503 10 select the interleaved word to be output to the code stream. In this example, the snooper decoder is replaced by a simple comparison which determines which of bit pack unlis 2502a-n has a codeword (or part of a codeword) with the oldest time stamp. Such a system appears to MUX 2503 as multiple queues with time stamps. Logic 2601 simp!y selects between various queues. The logic of each of run count reorder units 2503A-n only changes slightly (from run count reorder unit B01) to write a lime stamp when a run is stalled. Each run count reorder units 2501 A-n is equipped to store the time stamp in the codeword memory.
Storing time stamps with enough bits to enumerate every odeword word in the coded data stream is sufficient, but in some examples, fewer bits may be used.
A short description of the steps used with multiple queues with time
Camps appears below. The description is discernible to one skilled in the art. These we the encoder operations. No simplification has been done for the cases where a run is both started and ended by the same CDdeword. The operations can be checked for each symbol encoded (although in practice not aM checks need to be made). Interleaved words are assumed to be 32 bits in sI z e.
9 (no current codeword f or CDritCXt) 1 place lime in Oueue (Lised to determine next Oueue) place context pointer in Oueue place invalid data in Ojewe point conlexl to Oueue entry imrement Oueue tail 9 (already a CDdeWDrd and WIPS) increment comexl runcount BAD ORUNAL 9 (MAXRUN or LPS) ( place correct data in Oueue (context pointer unneeded) zero pointer & runcount in context memory update probability estimate in context memory it (valid data at head of next queue) place 32 bits of data on output cJear Oueue entry increment Oueue head while (any queue is almost full) 1 t) find the next Oueue which must place data on the output while (less than 32 bits of valid data) ( use context pointer to find context zero pointer & run count in context memory place MAX1RUN code word in Oueue data The decoder operations are similar although the codewords need not be saved in the queue. It is still necessary to save the time stamp of the codewords in the queue.
The function of the time stamps discussed above is used to store the order information of the codewords. An equivalent manner of expressing the same concept is through the use a single queue for all codewords, i.e., a merged queue. In a merged queue system, as shown in Figure 27, a single run count reorder unit 2701 is used for all interleaved streams. Run count reorder unit 2701 generates codeword, size and stream outputs to bit pack units 2502A.n output interleaved words to MUX 2503 and position information to logic 2702, which signals MUX 2503 to output interleaved words as part of the code stream.
For arbitrary streams, the run count reorder memory stores an interleaved stream ID for each codeword. Each interleaved stream has its BAD ORIGINAL own head pointer. When a bit pack unit needs more data, the corresponding head pointer is used to fetch as many codewords as are needed to form a new interleaved word. This may involve looking at many codeword memory locations to determine which ones are part of the proper stream. Afternatively, this may involve looking to the cDdeword memory for additional fields to implement a linked list.
Another method of interleaving streams uses a merged queue with fixed stream assignment. This method uses a single tail pointer as in the merged queue case, so no time stamps are required. Also, multiple head pointers are used as in the previous case, so there is no overhead in cilpu",.ing the datta from a particular stream. To accomplish this, the assicnrnen't of codewords to interleaved streams is performed according to the followina rule, for N streams: codeword M is assigned to stream M M:)".ilo (mod) N. Note that interleaved streams can have codewords from any c:)-.,texi bin or probability class according to this method. If the number of strearns is a power of two, 1A mod N can be computed by discarding some of the more sizniilicant bits. For example, assume that the codeword reorder memory is addressed with 12 bits and that four interleaved streams are used. The taJ1 pointer is 12 bits long, and the two least significant bits identity the coded stream for the nexl codeword. Four head Pointers With 10 bits, each are implicitly assigned to each of the four possible combinations of the two least significant bits. Bot h the tail and head pointers are incremented as norrnal binary counters.
In the decoder, the shifier has registers to store interleaved words.
The shifter presents properly aligned coded data to the bit generator. When BAD ORiGiNAI_ -so- the bit generator uses some coded data, it informs the shifter. The shifter presents properly aligned data from the next interleaved stream. If the number of coded data streams is N, the shifter has N-1 clock cycles to shift out the used data and perhaps request another interleaved codeword before that particular interleaved stream will be used again.
The Decoder The present, examples include a decoder that supporls the real-time encoder with limited reorder memory. In one example, the decoder also includes reduced memory requirements and complexity by maintaining a run count for each probability class instead of each context bin.
One Example of the Decoder System Figure 14A illustirates a block diagram Of One example of a decoder hardware svstem. Referring to Figure 14A, the decoder system 1400 includes first-in/first-out (FIF0) Structure 1401, decoders 1402, memory 1403, and context model 1404. Decoders 1402 includes multiple decoders. Coded data 1410 is coupled to be received by FIFO structure 1401. FIFO structure 1401 is Coupled to Supply the coded dalha to decoder 1402. Decoders 1402 are coupled to memory 1403 and context model 1404. Context model 1404 is also coupled to memory 1403.
One output of context model 604 comprises the decoded data 1411.
In system 1400. the coded data 1410 input into FIFO structure 1401 is ordered and interleaved. FIFO structure 1401 contains data in proper order.
The streams are delivered to decoders 1402. Decoders 1402 requires data 13,,D ()BIGINAL from these Streams in a serial and deterministic order. Although the order in which decoders 1402 require the coded data is non-trivial, h is not random.
By ordering the codewords in this order at the encoder instead of the decoder, the coded.data can be interleaved into a single stream. In another example, coded data 1410 may comprise a single stream of non interleaved data, where data for each context bin, context class or Drobability class is appended onto the data stream. In this case, FIFO 1401 is replaced by a storane area' 'to receive all of the coded data prior to forwarding the data to deCoders 1402 so that the data may be segmented properly.
As the coded data 1410 is received by FIFO 1401. context model 1404 determines the current context bin. In one examplel context model 1404 determines the current context bin based on previous pixels andlor bits. Afthough not shown, line buffering may be included for context model 1404. The line buffering provides the necessary data, or template, by which context model 1404 determines the current context bin. For example, where the context is based on pixel values in the vicinity of the current pixel, line buffering may be used to store the pixel values of those pixels in the vicinity that are used to proVide the specific context.
In response to the context bin, the decoder system 1400 fetches the decoder slate from memory 1403 for the current context bin. In one example, the decoder state includes the probability estimation module (PEP,A).stalle and the bit generator state. The PEM state determines which code to use to decode new codewords. The bit generator stale maintains a record of the bits in the current run. The state is provided to decoders 1402 from memory 1403 in response to an address provided by conlexl model BAD ORIGINAL 14D4. The address accesses a location in memory 1403 that stores the information corresponding to the context bin.
Once the decoder state for the current context bin has been fetched from memory 1403, system 1400 determines the next uncompressed bit and processes the decoder state. Decoders 1402 then decode the new codeword, if needed, andlor updates the run count. The PEM state is updated, if needed, as well as the bit generation state. Decoders 1402 then write the new coder state into memory 1403.
Figure 14B illustrates one example of a decoder. Referring to Figure 14B, the decoder includes shifting logic 1431, bit
generator logic 1432, 0New k" logic 1433, PEM update logic 1434, New codeword logic 1435, PEM state to code logic 1436, C0de-to-mask logic 1437, cDde-to-MaxRL, Mask, and R3Split expansion logic 1438, decode logic 1439, multiplexer 1440, and run. count update logic 1441. Shifting logic 1431 is coupled to receive the coded data input 1443, as well as the state input 1442 (frorn memory). The output of shifting logic 1431 is also coupled as an input to bit generation Ionic 1432, "new-k" generatiDn logic 1433 and PEM update logic 1434. Sit generation logic 1432 is also coupled to receive the state input 1442 and generates the decoded data output to the context model.
New-k logic 1433 generates an output that is coupled to an input of codeto mask logic 1437. PEM update logic 1434 is also coupled to state input 1442 and generates the state output (to memory). State input 1442 is also coupled to inputs of new-codeword logic 1435 and PEM state-tD-code logic 1436. The output of PEM state-to-code logic 1436 is coupled to be received by expansion logic 1435. The output of expansion IDgic 1438 is coupled to BA[) ORIGINAL decode logic 1439 and run count update logic 1441. Another input to decode logic is Coupled to the output of code-to-mask 1437. The output of decode logic 1439 is coupled to one input of MUX 1440. The other input of MUX 1440 is coupled to state input 1442. The selection input of MUX 1440 is coupled to the output of new codeword logic 1435. The output of MUX 1440 and expansion logic 1436 are coupled to two inputs of run count update logic 1441 with the output of cDde-to-mask logic 1437. The output of run count update logic 1441 is included in the state output to memory.
Shifting logic 1431 shift in data from the code data stream. Based on the coded data input and state input, bit generation logic 1432 generates decoded data to the context model. New-k logic 1433 also uses the shifted in data and the state input to generate a new value of k. In one example, new-k lcgic 1433 uses the PEM state and the first bit of coded data to generate the new value of k. Based on the new k value, code-to-mask logic 1437 generates a R1 7 mask for the next codeword. The RLZ mask for the next codeword is sent to decode logic 1439 and the run count update logic 1441.
The PEM update logic 1434 updates the PEM state. In one example, the PEM state is updated using the present state. The updated state is sent to memory. New codeword logic 1435 determine if a new codeword is needed. PEM state-to-code logic 1436 determines the code for decoding using the state input 1442. The code is input to expansion logic 143B to generate the maximum run length, the current mask and an R3 split value. Decode logic 1439 decodes the codeword to produce a run count output. MUX 1440 seleCts either the output from decode logic 1439 or the BAD ORGINAL -84.
r, state input 1442 to the run count update logic 1441. Run count update logic 1441 updates the run count.
The decoding system 1400, including decoders 1402 1 operates in a pipeline manner. In one, example, the decoding system 1400 of. the present invention determines context bins, estimates probabilities, decodes codewords, and generates bits from run counts all in a pips-lined manner. One. example of the pipeline structure of the decoding system is depicted in Figure 15A. Referring to Figure 15A. an example of the ppellned decoding process of the present invention is shown in six C,a:es, numbered 1-6.
In the first stage, the current context bin is determined (1501). In the second stage, after the context bin has been determined, a memory read oCcills (1502) in which the current decoder state for the context bin is fetched from mernory. As stated above, lhe decoder state includes the PEM state and the bit generator state.
In the third stage of the pipelined decoding process a deCornpressed bit is generated (1503). This allows for a bit to be available to the context model. Two other operations occur during the third Ctage. The PEM state is converted into a code type (1504) and a determination is made as to whether a new codeword must be decoded (1505) also occur in the third stage.
During the fourth stage, the deCDding system processes a codeword andlor updates the run count (1506). Several sub-operations are involved in processing a codeword and updating the run count. For instance, a codeword is decoded to determine lhe nexl run count or the run count is updated for the BAD ORIGINAL current codeword (1506). If needed when decoding new codewords, more coded data is fetched from the input FIFO. Another sub-operation that occurs in the fourth stage is the updating of the PEM state (1507). Lastly, in the fourth stage of the decoding pipeline, the new PEM state is used to determine what the run length zero codeword (described later) is for the next code if the run count of the current code word is zero (1508).
During the fifth stage of the decoding pipeline the decoder state with an updated PEM state is written into memory (1509) and the shifting begins for the next cDdeword (1510). In the sixth stage, the shifting to the next codeword is completed (1510).
The pipelined decoding, actually begins with 3 decision as to whether to start the decoding process. This determination is based on whether there is enough data to present to the decoder.
If there is not enough data from the FIFO, the decoding syslern is stalled. In another case. the decoding system may be stalled when outpitting decoded data to a peripheral device that is not capable of receiving all of the data output from the decoder as it is being generated. For instance, when the decoder is providing output to a video display interface and its associated video circuitry, the video may be too slow, such that the decoder needs to be stalled to allow a video to catch up.
Once the decision has been made to start the decoding process, the current contexl b1n is determined by the context model. In the present invention, the current context bin is ascertained by examining previous data. Such previous data may be stored in line buffers and may include data from the current line and/or previous lines. For instance, in a context template, for BAD 0RUNAL a given bit. Bits from line buffer(s) may be designed using a template with respect to the previous data, such that the context bin for the current data is selected according to whether the previous data being examined matches the template. These line buffers may include bit shift registers. A template may 5 be used for each bit plane of an n-bil image.
In one example, the context bin is selected by ioutputting an address to memory during the next pipeline stage. The address may include a predetermined number of bits, such as three bits, to identify the bit plane. By using three bits, the bit position in pixel data may be identified. The template used to determine the context may also be represented as a portion of the address. The bits used to identify the bit plane and the bits identifying the template may be combined to create an address for a specific location in mernory that contains the state information for the context bin defined by th--se bits. For example, by utilizing three bits to determine the bit position in a pixel and the ten previous bits in the same position in each of the previous p,,xe!s in the template, a 13-bit conlext address may be generaled.
Using the address created by the context model, the memory (e.g., RAM) is accessed to obtain the state information. The state includes the PEN1 state. The PEM state includes the current probability estimate.
Because more than one state uses the same code, the PEM state does not include a probability class or code designation, but rather an index into a table, such as the table shown in Figure 5. Also when using a table such as that shown in Figure 5, the PEM state also provides the most probable symbol (MPS) as a means for identifying whether the current PEM state is located on the positive or negative side of the table. The bit generation state 13p,'D ORIGINAL- may include the count value and an indication of whether an LPS is present.
In one embodiment, the MPS value for the current run is also included for decoding the next codeword. In the present invention, the bit generator state is stored in memory to reduce the space required for run counters. If the cost of space in the system for counters for each context is low, the bit generation state does not have to be stored in memory.
Once the fourth stage has been completed, the new bit generator state and PEM state is written to memory. Also in the fifth stage, the coded data stream is shifted to the next codeword. The shifting operation is completed in the sixth stage.
Figure 14C is a block diagram of one example of FIFO structure 1401 illustrating interleave word buffering for two decoders. Note that any number of decoders may be supported using the teachings of the present invention. As shown, the input data and the FIFO are wide enough to hold two interleave words. FIFO 1401 comprises FIFO 1460, registers 1461-62, MUXs 1463-1464 and control block 1465. The two input codewords are coupled as the input interleaved words. The outputs of FIF0 1460 are coupled to inputs to registers 1461-1462. Inputs to MUX 1463 are coupled to the outputs of registers 1461 and 1462. Control block 1465 is coupled to provide control signals to FIFO 1460, registers 1461 and 1462 and MUXs 1463 and 1464. Interleave words are the output data (output data 1 and 2) provided to two decoders. Each decoder uses a request signal to indicate that the current word has been used and a new word will be needed next. The request signals from the decoders are coupled to inputs of control BAD ORGINAL -8B- block 1465. Control block 1465 also outputs a FIFO request signal to request more data from memory. initially, the FIFO and registers 1461 and 1462 are filled with data and a valid flip flop in the control unit 1465 is set. Whenever a request occurs, the control block 1465 provides the data according to the logic shown in Table 16.
Table 16
Both Valid Requestl Request 2 Multiplexer 1 Multiplexer 2 Next Both FIFO and Valid Register Enable 0 0 0 FX - X 0 0 0 0 1 X REG 1462 1 1 0 1 0 REG 1462 X 1 1 0 1 1 REG 1452 FIFO 0 1 1 0 0 X X 1 0 1 0 1 X REG 1461 0 0 1 1 0- LREG 1461 X 0 0 1 1 REG 146 REG 1462 1 1 X means 'doni care.
Figure 15B illustrates a different conceptual view of the decoder.
Referring to Figure 15B, variable length (coded) data is input into a decoder. The decoder outputs fixed length (decoded) data. The output is also fed back as a delayed feedback which received as an input into the decoder. In the decoder of the present invention, variable length shifting 13AD ORIGINAL used in decoding is based on decoded data that is available after some delay. The feedback delay does not reduce the throughput in the delay tolerant decoders.
The input variable length data is divided into fixed length interleaved words such as described in conjunction with Figure 4. The decoder uses the fixed length words as described in Figure 16A below. The decoder and delay models a pipeline decoder as described in conjunction with Figures 15 and 32 or multiple parallel decoderq such as described in conjunction with Figures 2-A-2D. Thus, the present, example provides a delay tolerant decoder. The delay tolerant decoders of the present invention allow handling of vahable length data in parallel.
Prior art decoders (e.g., Huffrnan decoders) are not delay tolerant. Information determined from decoding all previous codewords is required to perform the variable length shifting needed to decode the nexl cDdLword. In contrast, the present examples are delay tolerant decoders.
S'I.'tn: in the Decodno SvsIemn The decoder has shifting logic to shift the interleaved words to the proper bit generator for decoding. The shifter does not require any particular type of "by context" or by probab,lity' parallelism. An encoder which assigns codeword M to stream M mod N (M%N in the C language), where N is the number of streams is assumed. In the present example,coded data from the current stream is presented until a codeword is requested. Only then is the data switched to 25the next stream.
BAD ORIGINAL -go- Figure 16A illustrates one example of the shifter for the decoder.
Shifter 1600 is designed for four data streams. This allows four clock cycles for each shifting operation. The interleaved words are 16 bits and the longest codeword is 13 bits. Referring to Figure 16A &m"" 1600 comprises four registers 1601-1604 coupled to receive inputs from the interleaved coded data. The outputs of each of registers 1601-1604 is coupled as inputs to MUX 1605. The output of MUX 1605 is coupled to the input of a barrel shifter 1606. The output of barrel shifter 1605 is coupled as inputs to a register 1607, MUX & registers 1608-1610, and a size unit 1611.
The oLIput of size unit 1611 is coupled to an accumulator 1612. An output of accumulator 1612 is fed back and coupled to barrel shifter 1606. An output of register 1607 is coupled as an input to MUX & register 1605. An output of MUX & register 1608 is coupled as an input to MUX & register 1309. An output of MUX & register 1609 is coupled as an input to MUX & register 1610.
The output c', MUX & register 1610 is the aligned coded data. Inone ei-llb:)d'ir,nent, registers 1601-1604 are 16-bit registers, barrel shifter 1600^ is a 32-bit to 13-bit barrel shifter and accumulator 1612 is a 4-bit accumulator.
Reg,sters 1601-1604 accept 16-bit words from the FIFO and input them into barrel shifter 1606. At least 32 bits of the undecoded data is provided to barrel shifter 1606 at all times. The four registers 1601- 1604 are initialized with two 16-bit words of coded data to begin. This allows there to always be at least one new codeword available for each stream.
For R-codes, codewDrd size unit 1611 determines if a '0' or M N' codeword is present and, if it is an M W codeword so, how many bits after the M' are part of the current codeword. The size unit, providing the same BAD ORIGINAL function, was described in conjinction with Figure 12. For other codes, determining the size of a codeword is well-known in the art.
Shifter 16DO comprise a FIFO consisting of four registers, three of.
which have multiplexed inputs. Each register of registers 1607-1610 holds at least one codeword, so the width of the registers and the multiplexers is 13 bIts to accommodate the longest Possible codeWDrd. Each register also has one control flip-flop associated with it (not shown) that indicates if a particular register contains a codeword or if it is waiting for barrel shifter 1606 to provide a codeword.
The FIFO will never empty. Only one codeword can be used per clock cycle and one codeword can be shifted per clock cycle. The delay to perform the shifting is compensated for since the system starts out four codewords ahead. As each codeword is shifted into being the aligned coded data output, the other codewords in registers 1607-1610 shift down. When the codeword left, in the FIFO is stored in register 1610, the barrel shifter 1606 causes codewords to be read cut from registers 1601-1604 through MUX 1605 in order to fill registers 1607-1609. Note that the FIFO may be designed to refill register 1607 with the next codeword as soon as its codeword is shifted into register 1608.
Barrel shifter 1606), codeword size calculator 1611 and an accumulator select 1612 handle the variable length shifting. Accumulator 1612 has four registers, one for each coded data stream, that contains the alignment of the current codeword for each data stream. Accumulator 1612 is a four bit accumulator used to control barrel shifter 1606. Accumulator 1612 increases its value by the value input from the codeword size unit 1611. When BAD ORIGINAL azcurn,ulator 1612 overflows (e.g., every time the shift count is 16 or greater).
registers 1601-1604 are clocked to shift. Every other 16 bit shift causes a new 32 bit word to be requested from the FIFO. The input to accumulator 1612 is the size of the codewDrd, which is determined by the current code and the first one or two bits of the current cDdeword. Note that in some examples, registers 1601-1604 must be initialized with coded data before the decoding can begin.
When a CDdeWOrd is requested by the system, the registers in the FIFO are clocked so that codewords are moved towards the output. When the barrel shifier 1606 is ready to deliver a new codeword, it is multiplexed into the first empty register in the FIFO.
In this example, a next codeword signal from the bit generator is recewed before the decision to switch streams is made.
If the next codeword sional from the bit generator cannot be guaranteed to be received before the decision to switch streams, a lookahead system such as the one shown in Figure 16B can be used. Referring to Figure 16B, a sh;iLer 1620 using look ahead is shown in block diagram form. Shifter 1620 includes a shifter 1600 that produces outputs of the current coded data and the next coded data. The current coded data is coupled to an input of codeword preprocessing logic unit 1621 and an input of a codeword processing unit 1624. The next coded data is coupled to an input of codeword preprocessing IDDiC unit 1622. Outputs from both preprocessing ionic units 1621 and 1622 are coupled lo inputs of a MUX 1623. The output of LlUX 1623 is coupled to another input of codeword processing logic 1624.
13, D CoGisAL The logic that uses the codeword is divided into two parts, codeword preprocessing logic and codeword processing logic. Two identical pipelines preprocessing units 1621-1622 operate before the interleaved stream can be shifted. One of preprocessing units 1621-1622 generates the proper, information if the stream is switched and the other generates the information if the stream is not switched. When the stream is switched, the output of the proper codawDrd preprocessing is multiplexed by MUX 1623 to codeword processing logic 1624 which completes the operation with the proper codeword.
Off Ch,.n rvlerno: and Coniexi Models In one example, it may be desirable to use multiple Chips for externa! memory or external context models. In these examples, it is to reduce the delay between generating a bit and having the bit be a,a,.1'able to the context model where multiple integrated circuits are used.
Figure 17 illustrates a block diagram of one example of a system with both an external context model chip 1701 and a coder chip 1702 with memory for each context. Note that only the units relevant to the context model in the Coder chip are shown; it is apparent to those skilled in the arl that 2D the coder chip 1702 contains bit generation, probability estimation, etc.
Referring to Figure 17. the coder chip 1702 comprises a zero order context model 1703, context models 1704 and 1705, a select logic 1706, a memory control 1707 and a memory 1708. Zero order context model 1703 and context models 1704-1705 generate outputs that are coupled to inputs of the selec:t logic 1706. Another input of select logic 1706 is coupled to an output of BAD ORIGiNAL external context model chip 1701. The output of select logic 1706 is coupled to an input of memory 1708. Also coupled to an input of memory 1708 is an output of memory control 1707.
Select logic 1706 allows either an external context model or an internal context model (e.g., zero order context model 1703, context model 1704, context model 1705) to be used. Select logic 1706 allows the internal zero order portion of context model 1703 to be used even when the external context model 1701 is used. Zero order context model 1703 provides one bit or more while the external context model chip 1701 provides the remainder. For instance, the immediately previous bits may be feedback and retrieved from zero order context model 1703, while previous bits go to the external context model 1701. In this manner, the time critical information remains onchip. This eliminates the off-chip communication delay for recently generated bits.
Figure 18 is a block diagram of one system with an external context model 1801, and exiernal memory 1803 and a coder chip 1802. Referring to Figure 18, some memory address lines are driven by the external context model 1801, while others are driven by the "zero order" context model in the decoder chip 1802. That is, the context from the immediately past decoding cycle are driven by the zero order context model. This allows the decoder chip to provide the context information from the immediate past with minimum communication delay. The context model chip 1802 precedes the rest of the context information using bits decoded further in the past only, therefore allowing for communication delay. In many cases, the context information from the immediate past is zero order Markov state, and the context BAD ORIGINAL information from further in the past is higher order Markov state. The example shown in Figure 18 eliminates the communication delay inherent in implementing the zero order model in the external context model chip 1802.
However, there may still be a context bin determination to bit generated delay due to the decoder chip 1802 and the memory 1803.
It should be noted that other memory architecture's could be used. For instance, a system with the context model and memory in one chip and the coder in another chip'may be used. Also a system may includes a coder chip with an internal memory that is used for some contexts and an external memory that is used with other contexts.
B', Ge,)eralops Usnc a klerno:y Figure 19 shows a decoder with a pipelined bit generator using memory. Referring to Figure 19, the decoder 1900 comprises a context model 10-01, memory 1 -902, PEM state-to-code block 1903, pipelined bit generator 1935, memory 1904 and shifter1906. The input of Context model 1910 1 comprises the decoded data from pipelined bit stream generator 1 9D5.
The inputs of shifter 1905 are coupled to receive the coded data. The output of context model 1901 is coupled to an input to memory 1902. The output of mer-nory 1902 is coupled to PEM stale-to-code 1903. The output of PEM state-to-code 1903 and the aligned coded data output from shifter 1906 are coupled to inputs of bit generator 1 9D5. Memory 1904 is also coupled to bit generalor 1905 using a bl-directional bus. The output of bit generator 1905 is the decoded data.
BAD ORUNAL Context model 1901 outputs a context bin in response to coded data on its inputs. The context bin is used as an address to access memory 19D2 based on the context bin to DbUdn a probability stale. The probability stale is received by PEM state-to-code module 1903 that generates the probability class in response to the probability state. The probability class is then used as an address to access memory 1904 to obtain the run count. The run count is then used by bit generator 1905 to produce the decoded data.
In one example, memory 1902 comprises a 1024x7 bit memory (where 1024 is the number of different contexts), while memory 1 9D4 comprises a 25x14 bit memory (where 25 is the number of different run counts).
Since bit generator states (run counts. etc.) are associated with probability classes, not. contexl bins, there is additional pipeline delay before a b.t is available to the context model. Because updating a bit generator state takes multiple clock cycles (the bit generator state memory revisit delay), multiple bit generator states will be used for each probability class. For example, if the pipeline is six clock cycles, then the bit generator state memory Will have six entries per probability class. A counter is used to select the proper memory location. Even with multiple entries per probability class, the size of the memory will typically be less than the number of contexts. The memory can be implemented with either multiple banks of SRAM or a multiported register file.
Since one run count may be associated with multiple contexts, a system must upgrade the probability estimation state of one or more BAD ORI1GINAL contexts. In onE example, the PEM state of the context which causes a run to end is updated.
Instead of requiring a read, modify and write of a runcount before it can be read again, a run count can be used again as soon as the modify is 5 complete.
Figure 32 illustrates. a timing diagram of a decode operation in one example of a decoder. Referring to Figure 32, a three cycle decode operation is depicted. Signal names are listed on the left hand column of the timing diagram. The validity of a signal during any one cycle is indicated with a bar during the cycle (or portion thereof). In certain cases, the unit or logic responsible for generating the signal or supplying the valid signal is shown adjacent to the valid signal indication in a dotted-lined box. At times, examples of specific elements and units disclosed herein are provided as well. Note that any portion of the signal that extends into another cycle inci.--a',es the validity of the signal only for that period of time in which the sicnal is shown extending into the other cycle. Also, certain signals are shDwn as being separately valid for more than one cycle. An example of such is the temp run count signal which is valid at one point at the end of the second cycle and then again during the third cycle. Note that this indicates that the signal is merely being registered at the end of the cycle. A list of dependencies is also shown in Table 17 below setting forth the dependcies from the same or previous clock cycle to the current time which the signal is specified to be valid.
BAD ORUNAL Table 17
Name Unit 7F07eDendencies 1- CM {previous bit. CM shittregister) re!;isler file 1 state to code CM register file 1 barrel shitt SH (accurnulator register. unafigned coded data recisterffi s,ize SH barrel snifter output (aligned coded data) (K. R-! acc (a=umulator) SH size (previous accumulator recister value) register file 2 {K, R3 registered) BG ci (codeword needed) BG register file 2.
code to (rrask, BG {K, R3 registere-1 rr,-->xRL. P3sr)h11) gen bit (generator bit) BG register file 2 barrel shifter output (aligned coded data) code to (mask, maxRL, R3split) (recister file 1, reffistered MPS cJe:ooe barrel shifter output (aligned Coded data) BG code to (mask, maxRL, R3sDI11) PEM =le (K. R3 registered) PEM (PEti. upciale) TT (registered. PEM table output, LPS present, PEM continuel -1 (run count u;>,.,ale) (registered: codeword needec(re gistered, run count BG LPS ore ent. continue) y (confinue, LPS {regislered: codeword needear, run count, LPS weserll UD:1211e) BG ent. continue) model, SH=shitter, BC-=bit generator, PE[vli=probability estimation machine. [italics} means dependencies from preViDUS Clock cycle.
t-t In one embodiment, most combinational logic for updating the PEM state is performed in the 'PEM table" step, TEM update" is simply a multiplex operation.
lrn21ic!t Sicnalina InSOMP_ examples, the decoder must model the finite reordering buffer of the encoder. In one example, implicit signalling.
this MDdeling is accomplished with BAD ORIGINAL -0 9g- As expWned previously which regard to the encoder, when a =dewDrd is started in the encoder, space is reserved in the appropriate buffer for the codeword in the order the codewords should be placed on the channel. When the last space in a buffer is reserved for a new codeword, then some codewords are placed in the compressed bit stream whether or not they have been completely determined.
When a partial COdeword must be completed, a codeword may be chosen which is shorl and correctly specifies the symbols received so far. For example, in a R-coder system, if it is necessary to prematurely complete a codeword for a series of 100 MPSs in a run code with 128 maximum run- length, then the codeword for 128 MPSs can be used, since this correctly spec,,fles the first 100 symbols.
Allernatively, a codeword that specifies 100 MPSs followed by a LPS can be used. When the codeword has been completed, it can be removed from, thereDrdering buffer and added to the code stream. This may allow previously completed codewords to be placed in the code stream as well. If forcing the completion of one partial codeword results in the removal of a codeword from the full buffer then encoding can continue. If one buffer is still full, then the nexl codeword must again be compleled and added to the code stream. This process continues until the buffer which was full is no longer full. The decoder may model the encoder for implicit signaling using a counter for each bit generator state information memory location.
In one example, each run counter (probability class in this exarmple) has a counter which is the same size as the head or tail counters in the encoders (e.g., 6 bits). Every time a new run is started (a new codeword ORIGNAL -100- is fetched), the corresponding count is loaded with the size of the codeword memory. Every time a run is started (a new codeword is fetched) all counters are decremented. Any counter that reaches zero causes the corresponding run count to be cleared (and the LPS present flag is cleared).
On,tic)"ls for Sionaling for Finite Mernor Real-time encoding in the present examples requires the decoder handle runs of MPSs that are not followed by an LPS and are not the r-..axim,um run length. This occurs when the encoder begins a run of MPSs, but does not have enough limited re-ordering memory to wait until the run is corn.p!c-,tle. This condition requires a new codeword to be decoded the next time this context bin is used, and this condition must be signaled to the de-.odc-. Three potential ways of modifying the decoder are described below.
When the buffer is full, the run count for the context bin or probability class that is foiced out must be reset. To implement this efficiently, storing the context bin or probability class in the codaword memory is useful. Since this is only needed for runs 'that do not yet have an associated codeword, the memory used to store the codeword can be shared. Note that in some systerns, instead of forcing out an incomplete codeword, bits can be forced into the contextiprobability class of the (or any) codeword that is pending in the bu"iler when the buffer is full. The decoder detects this and uses the corresponding (wrong) context bin or probability class.
Insiream signaling uses codewords to signal the decoder. In one example, the R2(k) and R3(k) code definitions are changed to include non-maximum length runs of MPS that are not followed by an LPS. This can BAD ONG'%AL -101- be implemenlled by adding one bit to the codewDrd that should occur with the lowest probability. This allows a uniquely decodable prefix for the nonmaximum length run counts. Table 18 shows a replacement for R2(2) codes that allows instream signaling. The disadvantages of this method are that the R-code decoding logic must be changed and that there is a compression cost every time the codewDrd with the lowest probability occurs.
Table 18
Oricinal Data Codeword 0000 0 D001 1000 001 101 01 110 1 ill ODD 100100 OD 100101 0 10011 In sonme examples, ine deCDder performs implicit signaling using time stamps. A counter keeps track of the current "time" by incrementing every time a codeword is requested. Also, whenever a CDdeword is started, the current lime" is saved in MeMDry associated with the codeword. Anylime after the first time a codeword is used, the corresponding stored "time" value 15 plus the size of the encoder's reordering buffer is compared with the current time. If the current ntime" is greater, an implicit signal is generated so that a new codeword is requested. Thus, the limited reorder memory in the encoder BAD ORG&NAL -102- has been simulated.]none example, enough bits for"time" values are used to allow all codewords to be enumerated.
To reduce the memory required, the number of bits used for the time stamps is kept to a minimum. If the time stamps use a small number of bits, such that lime values are reused, care must be taken that all old time stamps are noted before the counter starts reusing times. Let N be the greater of the number of address bits for the queue or the bit generator state memory. Time stamps with N+1 bits can be used. The bit generator state memory must support multiple accesses, perhaps two reads and two writes per decoded bit.
A counter is used to cycle through the bit generator state memory, incrementing once for each bit decoded. Any memory location that is too old is cleared so a new codeword is fetched when its used in the future. This guarantees alj'time stamps are checked before any time value is reused.
If the bit generator state memory is smaller than the queue, the rate of counting (the time stamp counter) and the memory bandwidth required can be reduced. This is because each time stamp (one per bit generator state mernory) must be checked only once per the number of cycles required to use the entire queue. Also storing the time stamps in a different memory might reduce the memory bandwidth required. In a system that uses V' codewords for partial runs, time stamps do not have to be checked for 1 W codewords. In a system that uses 1 W codewords for partial runs, the time stamp only has to be checked bef ore,ge ne rating a LPS.
In SOMe examples, implicit signaling is implemented with a queue during decoding. This method might be useful in a half duplex system where the hardware for encoding is available during decoding. The operation of the 60, OFI1GINAL -103- queue is almost the same as during encoding. When a new cDdewDrd is requested, its index is placed in the queue and marked as invalid. When the data from a cDdeword is completed, it's queue entry is marked as valid. As data is taken out of the queue to make room for new codewords, if the data taken out is marked as invalid, the bit generator state information from that index is cleared. This clearing operation may require that the bit generator state memory be able to support an additional write operation.
Explicit signaling, in contrast, Communicates buffer overflow as compressed data. One example is to have an auxiliary context bin that is used once for every normal context bin decode or once for every codeword that is decoded. Bits decoded from the auxiliary context bin indicates if the new-c:)dewo,,.d-needed condition occurs and a new CDdeword must be de=ded for the corresponding normal cDn'Lext bin. In this case, the codeivords for this special context must be reordered properly. Since the Ltil',za'ion of this context is a function of something known to the reorder unit (typi--a!ly, it is used once for each codeword), the memory required to reorder the auxiliary context can be bounded or modeled implicitly. Also, the possible coies allowed for this auxiliary context can be limited.
Implicit signaling Models the encoder's limited buffer when decoding to generate a signal that indicates that a new codeWDrd must be decoded. In one example, a time stamp is maintained for each context. In one example, the encoder's finite size reordering buffer is modeled directly. In a half duplex system, since the encoder's reordering circuitry is available d,.j,,ing decod;,ng, it might be used to generate the signals for the decoder.
13AD 0RiGjNAL ----------- _ -104- Exactly how implicit signaling is accomplished depends on the details of how the encoder recognizes and handles the full buffer condition. For a system using a merged queue with fixed allocation, the use of multiple head pointers allows choices of what 'buffer full" means. Given a design for the encoder, an appropriate model can be designed.
The following provides encoder operation and a model for use by the decoder for a merged queue with fixed stream assignment, parallel by probability system. For this example, assume that the reordering buffer has 256 locations, 4 interleaves streams are used, and each interleaved word is 16 bits. When the buffer contains 256 entries, an entry must be sent out to a blit packer (e.g., bit pack unit) before the entry for the 257th codeword can be placed in the queue. Entries can be forced out earlier if necessary.
In some systems removing the first entry in the buffer requires removing enough bits to complete an entire interleaved CDdeword. Therefore, if 1bit codewords are possible, removing codeword 0 might require also removing codewords 4, 8,12,..., 52, 56, 60 for 16-bit interleaved words. TO ensure that all of these buffer entry have valid entries, forcing an entry to be filled to because the memory is full can be performed at address 64, 192 locations from the location where a new codeword is entered (256 - 16 X 4 192).
In the decoder there is a counter for each probability. When a new codeword is used to start a run, the counter is loaded with 192. Any time a new codeword is used by any probability, all counters are decremented. If any c:)unter reaches zero, the run length for that probability is set to zero (and the LPS present flag is cleared).
BAD ORIGINAL -105- It may be convenient to use multiple RAM banks (multi-ported memory, simulation with fast memory, etc.), one bank for each coded data stream. This permits all bit pack units to receive data simultaneously, so reading multiple codewords for a particular stream does not prohibit reading by other 5 streams.
In other systems, multiple bit pack units must arbitrate for a single memory based on the codeword order as stored in the buffer. In these systems, removing an entry from a buffer may not complete an interleaved word. Each bit pack unit typically receives some fraction of an interleaved word in sequence. Each bit pack unit receives at least a number of bits equal to the shortest codeword length (e.g. 1 bit) and at most a number of bits equal tot he longest codeword length (e.g. 13 bits). Interleave words cannot be emitted until they are complete, and must be emitted in the order of initialization. In this example, a bit pack unit might have to buffer 13 interleave words, this is the maximum number of interleave words that can be c.ompleted with maximal length codewords while another stream has an interleaved word pending that is receiving minimal length codewords.
A system where every codeword requires two writes and one read of memory may be less desirable for hardware implementation than a system that performs two writes and two reads. If this was desired for the example system with four streams, bit pack units 1 and 2 could share one memory read cycle and bit pack units 1 and 3 could share the other read cycle (or any other.arbitrary combination). While this would not reduce the size of the buffering needed, it would allow a higher transfer rate into the bit pack unit.
BAD ORUNAL 1 --- -106- This may allow the bit pack units to better utilize the capacity of the coded data channel.
Systems with Fixed Size MemoLy.
One advantage of a system that has multiple bit generator states per probability class is that the system can support lossy coding when a fixed size memory overflows. This might be useful for image compression for a frame buffer and other applications that can only store a limited amount of coded data.
For systems with fixed size memory, the multiple bit generator states for each probability are each assigned to a part of the data. For example, each of eight states could be assigned to a particular bitplane for eight bit data. In this case, a shifter is also assigned to each part of the data, in contrast to shifters sequentially providing the next codeword. It should be noted that the data need not be divided by bitplane. Also, in the encoder, no interleaving is performed, each part of the data is simply bitpacked. Memory is allocated to each part of the data.
Memory management for coded data is presented for systems that store all of the data in a fixed size memory and for systems that transmit data in a channel with a maximum allowable bandwidth. In both of these systems, graceful degradation to a lossy system is desired. Different streams of data are used for data with different importance so that less important streams can be stored or not transmitted when sufficient storage or bandwidth is not available.
BAD ORIGINAL -107- When using memory, the coded data must be storedso that it can be accessed such that less important data streams can be discarded Without losing the ability to decode important data streams. Since coded data is vadable length, dynamic memory allocation can be used. Figure 31 shows an example dynamic memory allocation unit for three coded data streams. A register file 3100 (or other storage) holds a pointer for each stream plus another pointer for indicating the next free memory location. Memory 3101 is divided into fixed size pages.
Initially, each pointer assigned to a stream points to the start of a page of memory and the free pointer to the next available page of memory. Coded data from a particular stream is stored at the memory location addressed by the corresponding pointer. The pointer is then incremented to the next memory location.
When the pointer reaches the maximum for the current page, the following occurs. The address of the start of the next free page (stored in the free pointer) is stored with the current page. (Either part of the coded data memory or a separate memory or register file could be used.) The current pointer is set to the next free page. The free pointer is incremented. These actions allocate a new page of memory to a particular stream and provide links so that the order of allocation can be determined during decoding.
When all pages in the memory are in use and there is more data from a stream that is more important than the least important data in memory, one of three things may be done. In all three cases, memory assigned to the least important data stream is reassigned to more important data stream and no more data from the least important data stream is stored.
1 BAD ORIGWAL -108- First, the page currently being used by the least important stream is simply assigned to the more important data. Since most typical entropy coders use internal state information, all of the least important data stored previously in that page is lost.
Second. the page currently being used by the least important stream is simply assigned to the more important data stream. Unlike the previous case, the pointer is set to the end of the page and as more important data is written to the page, the corresponding pointer is decremented. This has the advantage of preserving the least important data at the start of the page if the more important data stream does not require the entire page.
Third, instead of the current page of least important data being reassigned, any page of least important data may be reassigned. This requires that the coded data for all pages be coded independently, which may reduce the compression achieved. It also requires that the uncoded data corresponding to the start of all pages be identified. Since any page of least important data can be discarded, greater flexibility in graceful degradation to lossy coding is available.
The third alternative might be especially attractive in a system that achieves a fixed rate of compression over regions of the image. A specified number of memory pages can be allocated to a region of the image. Whether less important data is retained or not can depend on the compression achieved in a particular region. (The memory assigned to a region might not be fully utilized if lossless compression required less than the amount of memory assigned.) Achieving a fixed rate of compression on a region of the image can support random access to the image regions.
6AC) ORIGINAL -log- The ability to write data into each page from both ends can be used to better utilize the total amount of memory available in the system. When all pages are allocated, any page that has sufficient free space at the end can be allocated for use from the end. The ability to use both ends of a page must be balanced against.the cost of keeping track of the location where the two types of data meet. (This is different from the case where one of the data types was not important and could simply be overwritten.) Now consider a system where data is transmitted in a channel instead of being stored in a memory. Fixed size pages of memory are used, but only one page per stream is needed. (Or perhaps two if ping-ponging is needed to provide buffing for the channel, such that while writing to one, the other may be read for output) When a page of memory is full, it is transmitted in the channel, and the memory location can be reused as soon as the page is transmitted. In some applications, the page size of the memory can be the size of data packets used in the channel or a multiple of the packet size.
In some communications systems, for example ATM (Asynchronous Transfer MDde), priorities can be assigned to packets. ATM has two priority levels, priority and secondary. Secondary packets are only transmitted if sufficient bandwidth is available. A threshold can be used to determine which streams are priority and which are secondary. Another method would be to use a threshold at the encoder to not transmit streams that were less important than a threshold.
BAD ORIGINAL -110- Sepa-aie Bit Generators f r Each Code Figure 20 is a block diagram of a system with separate bit generators for each code. Referring to Figure 20, decoding system 2000 comprises context model 2001, memory 2002, PEM state-to-code block 2003. decoder 2004, bit generators 2005A-n, and shifter 2006. The output of context model 2001 is coupled to an input of memory 2002. The output of memory 2002 is coupled to an input of PEM state-to-code block 2003. The output of PEM state-to-code block 2003 is coupled to an input of decoder 2004. The output of decoder 2004 is coupled as an enable for bit generators 2005A.n. Bit generators 2005A.n are also coupled to receive coded data output from shifter 2006.
Context model 2001. memory 2002, and PEM state-to-code block 2003 operate like their counterparts in Figure 19. Context model 2001 generates a context bin. Memory 2002 outputs a probability state based on the context bin. The probability state is received by the PEM state-to-code block 2003 which generates a probability class for each probability state. Decoder 2004 enables one of the bit generators 2005A-n upon decoding the probability class. (Note that decoder 2004 is a M to 2M decoder circuit similar to a 74xl 3B 3:8 decoder which is well-known -- it is not an entropy coding decoder.) Note that since each code has a separate bit generator, some bit generators may use codes other than R-codes. Particularly, a code for probabilities near 60% might be used to better tile the probability space between R2(0) and R2(1). For instance, Table 19 depicts such a code.
BAD ORIGINAL -111- Table 19 uncoded data codeword 0 0 0 0 0 0 0 1 0 1 0 1 1 0 1 1 1 If needed to achieve the desired speed, pre-decoding of one or more bIts may be done to guarantee that decoded data is available quickly. In Some examples, to avoid the need to be able to update a large run count every clock cycle, both codeword decoding and run counting for long codes are palLitioned.
The bit generator for R2(0) codes is uncomplicated. A codeword is requested every lime a bit is requested. The bit generated is simply the codeword (X0Red with the MPS).
Codes for short run length, for example, R2(1), R3(1), R2(2) and R3(2), are handled in the following manner. All of the bits in a codeword are deCDded and stored in a state machine that comprises of a small counter (1, 2, or 3 bits respectively) and a LPS present bit. The counter and LPS present bit operate as an R-code decoder.
For longer codes, such as R2(k) and R3(k) for k >2, bit generators are par,Ititioned into two units as shown in Figure 21. Referring to Figure 21, a bit generator structure for R2(k) codes for k>2, is shown having a short run unit 2101 and a long run unit 2102. Note that although the structure is for use with BAD ORIGINAA- -112- R2(k>2) codes, its operation will be similar for R3(k>2) Codes (and is apparent to one skilled in the art).
Short run unit 2101 is coupled to receive an enable signal and a codeword E2-03 as inputs into the bit generator and an "all ones" signal and a ocount zero signal (indicating a count of zero), both from long run unit 2102. In response, to these inputs, short run unit 2101 outputs a decoded bit and a next signal indication, which signals that a new codeword is needed. Short run unit 2101 also generates a count enable signal, a count load signal and a count max signal to long run unit 2102. Long run unit 2102 is also coupled to 10 receive codeword -[k... 3] as an input to the bit generator.
Short run unit 2101 handles runs of up to length 4 and is similar to a R2(2) bit generator. In one, example, short run unit 2101 is the same for all R2(k>2) codes. The purpose of long run count 2102 is to determine when the last 1-4 bits of the run are to be output. Long run unit 2102 has inputs, 15 AND locic and a counter that vary in size with k.
One example of the long run count unit 2102 is shown in Figure 22.
Referring to Figure 22, the long run unit 2102 comprises AND logic 2201 coupled to receive the codewDrd[k... 3] and outputs an "all ones" signal as a logical 1 if all of the bits in the codeword are 1's, thereby indicating that the current codeword is a 1 N codeword and that the run count is less than 4.
NOT logic 2-202 is also coupled to receive the codeword and inverts it. The output of NOT logic 2202 is coupled to one input of a bit counter 2203. The bit counter 2203 is also coupled to receive the count enable signal, the Count loam.' sicnal and the count max signal. In response to the inputs, the bit counter 2203 generates a count zero signal.
BAD c)R1GiNAL -113- In one example, the counter 2203 is a k-2 bit counter and is used to break long run counts into runs of four MPSs and Possibly some remainder. The count enable signal indicates that four MPSs have been output and the counter should be decremented. The count load signal is used when decoding M N codewords and causes the counter to be loaded with the cornplement of codeword bits k through 3. The count max signal is used when decoding "0" codewords and loads the counter with its maximum value. A count zero output signal indicates when the counter is zero.
One example of the short run count unit 2101 is shown in Figure 23. Referring to Figure 23. the short run count unit contains a control module 2301. a two-bit counter 2302 and a three-bit counter 2303. The control module 2301 receives the enable signal, the codeword [2..0], and the all ones and count zero siona!s from the long run count unit. The two bit, Counter is used to count four bit runs of MPSs that are part of longer runs. A R2(2) counter and LPS bit (three bits total) 2303 is used to generate the 1-4 bits at the end of a run. The enable input indicates that a bit should be generated on the bit output. The count zero input when not asserted indicates that a run of four MPSs should be output. Whenever the MPS Counter 2302 reaches zero, the count enable output is asserted. When the count zero input is asserted, either the R2(2) counter the LPS is used or a new codeword is decoded and the next output is asserted.
When the new codeword is decoded, the actions performed are determined by the codeword input. If the input is "D" COdeWDrd, the MPS counter 2302 is used and the count max output is asserted. For 01 W codewords, the first three bits of the codeword are loaded into the R2(2) BAD ORIGINA1 -114counter and LPS 2303, and the count load output is asserted. If the all ones input is asserted then the R2(2) counter and LPS 2303 are used to generate bits; otherwise the MPS counter is used until the count zero input is asserted.
From a system perspective, the number of codes must be small for the system to work well, typically 25 or less. The size of the multiplexer needed for bit and next codeword outputs and the decoder for enabling a particular bit generator must be limited for fast operation. Also, the fan-out of the codeword from the shifter must not be too high for high speed operation.
Separate bit generators for each code allow pipelining. If all codewords resulted in at least two bits, processing of codewords could be pipelined in two cycles instead of one. This might double the speed of the deCoder if the bit generators were a limiting portion of the system. One way to accomplish this is for the run length zero codeword (the codeword indicates just a LPS) to be followed by one bit which is the next uncoded bit. These might be called RN(k)+1 codes and would always code at least two bits. Note that R2(0) codewords and perhaps some of the other short codewords do not need to be pipelined for speed.
Separate bit generators lends itself for use with implicit signaling. Implicit signaling for encoding with finite memory can be accomplished in the following manner according to one embodiment of the present invention. Each bit generator has a counter that is the size of a queue address, for example, 9 bits when a size 512 queue is used. Every time a new codeword is used by a bit generator, the counter is loaded with the maximum value. Any time any bit generator requests a codeword, the counters for all bit generators are decremented. Anytime a counter reaches zero, the corresponding bit generator's state is cleared (for example, the MPs 13AC) ORIGINAL -115- counter, the R2(2) counter and LPS and the long run count counter are cleared). Because clearing can occur even if a particular bit generator is not enabled, there is no problem With stale counts.
Intialization-of Merriwy for Each Context Bin In cases where memory for each context bin holds probability estimation information, additional memory bandwidth may be required to initialize the decoder (e.g., the memory) very quickly. Initializing the decoder quickly can be a problem when the decoder has many contexts and they all 10. need to be cleared. When the decoder supports many contexts (1 K or more) and the memory cannot be globally cleared, an unacceptably large number of clock cycles would be required to clear the memory.
In order to clear contexts quickly, some examples use an extra bit, referred to herein as the initialized status bit, that is stored w.,th each Context. Thus, an extra bit is stored with the PEL1 state (e.g., 8 b;ts) for each context.
The memory for each context bin and the initialization control logic are shown in Figure 24. Referring to Figure 24, a context memory 2401 is shown coupled to a register 2402. In one example, the register 2402 comprises a one bit register that indicates the current proper state for the initialized status bin. The register 2402 is coupled to one input of XOR logic 2403.
Another input to XOR logic 2403 is coupled to an output of the memory 2401.
The output of XOR lopic 2403 is the valid signal and is Coupled to an input of control lopic 2404. Other inputs of control logic 2404 is coupled to the output of counter 2405 and the context bin signal. An output of control logic 24D4 is BAD ORIGINAL -116- coupled to the select inputs of MUXs 2406-2407 and to an input of counter 2405. Another output of control logic 2404 is coupled to the select input of MUX 2408. The inputs of MUX 2406 are coupled to the output of counter 2405 and the context bin indication. The output of MUX 2406 is coupled to the memory 2401. The inputs of MUX 2407 are coupled to the new PEM state and zero. The output of MUX 2407 is coupled to one input of the memory 2401. The output or memory 2401 and the initial PEM state are coupled to input of " 2408. The output of MUX 2408 is the PEM state out.
The value in register 2402 is complemented every occurrence of a decode operation (i.e., each data set, not each decoded bit). XOFR logic 2403 compares the validity of the accessed memory location with the register value to de-termine whether the accessed memory location is valid for this decode operation. This is accomplished using XOR logic 2403 to check if the inil.iial,ized status bit matches the proper state in register 2402.If the data in men, o-iy 2401 is not valid, then Control logic 2404 causes the data to be ignored by the state to code logic and the initial PEM stale to be used instead.
This is accomplished using MUX 2408. When a new PEM state is written to memory, the initialized bit is set to the current value of the register so that it will be considered valid when accessed again.
Every context bin memory entry must have its initialized status bit set to the current value of the register before another decode operation can begin. Counter 2405 steps through all memory locations to assure that they are initialized. Whenever a context bin is used, but its PEM state in not updaled, the unused write cycle can be used to test or update the memory location pointed to be counter 2405. After a decode operation is complete, if ahD OR09m- -117- counter 2405 has not reached the maximum value, the remaining contexts are initialized before beginning the next operation. The following logic is used to control operation.
wrte-R false: counter 0; all intlialized a false; wIZIe (=unterc maximum cornext bin+l) read PEM state from context memory R ( (counter -- context bin read) and (write_h)) wrhe_ft false Counter a counter ff ( (PEm state changed) write new PEM state else h (write-ft) write inhial PEM state to memory location 'counter" counter = counter + 1 else read memory location 'counter if (inifialized bit in read location is in wrong state) write-it true else counter counter + 1 al-in,iba!zed - true; whi'le read PEM, state from context memory C (PEM state channed) write new EM stale FEM, %,,,4h F2St Adan,4,aiion The PEM used may include an adaptation scheme to allow faster adaptation regardless of the amount of, data available. By doing so, the decoding is allowed to adapt more quickly initially, and to adapt more slowly as more data is available, as a means for providing a more accurate estimate. Furlihermore, the PEM may be fixed in an field programmable gate array (FPGA) or ASIC implementation of a PEIJI state tablelmachine.
BAD ORIGINAL -116- Tables 2D-25 below describe a number of probability estimation state machines. Some tables use do not use R3 codes or do not use long codes, for reduced hardware cost. All tables except for Table 20 use fast adapting special states used to quickly adapt at the start of coding until the first LPS occurs. These fast adaptation states are shown italisized in the tables. For instance, referring to Table 21, when decoding begins, the current state is state 0. If an MPS occurs, then the decoder transitions to state 35. As long as MPSs occur. the decoder transitions upward from state 35, eventually transitioning to state 28. If an LPS occurs at any time, the decoder transitions out of the bolded fast adapting states to a state that represents the correct probability state for the data that has been received thus far.
Note that for each table, after a certain number of MPSs have been received, the decoder transitions out of fast adapting states. In the desired example, once the fast adapting states have been exited, there is no mechanism to return to them, aside from restarting the decoding process. In other examples, the state table may be designed to re-enter these fast adapting states by allowing faster adaptation, the present invention allows for the decoder to arrive at the more skewed codes faster, thereby possibly benefiting from improved compression. Note that the fast adaptation can be eliminated for a particular table by changing the table entry for current state 0 such that the table transitions only one state up or down depending on the data input.
For all the tables, the data for each state is the code for that state, the next state on a positive up,.4jate (up) and the next state on a negative update la,, x) ORIGINAL -119- (down). Asterisks indicate states where the MPS must be changed on a negative update.
Table 20
Current Code Up next Down state state next state 0 r2(0) 1 0 1 r2(0) 2 0 2 r2(0) 3 1 3 r2(0) 4 2 4 r2(0) 5 3 r2(0) 6 4 6 r2(1) 7 5 7 r2(1) 8 6 8 r2(1) 9 7 9 r2(1) 10 8 r2(1) 11 9 11 r2(1) 12 10 12 r3(1) 13 11 13 r3(1) 14 12 14 r3(1) is 13 r2(2) 16 14 16 3W 17 15 17 r2(3) 18 16 Current Code Up next Down state state next state is r3(3) 19 17 19 r2(4) 20 is r3(4) 21 19 21 r2(5) 22 20 22 r3(5) 23 21 23 r2(6) 24 22 24 r3(6) 25 23 r27) 26 24 26 r3M 27 25 27 r2(8) 28 26 28 r3(8) 29 27 29 r2(9) 30 28 r3(9) 31 29 31 r2(1 0) 32 30 32 r3 (10) 33 31 33 r2(1 1) 34 32 34 r3(1 1) 34 33 a Switch to NTS -120- Table 21
Current Code Up next Down State state next sta 4-,a 00 r2(0) 35 35 1 r2(0) 2 1 2 r2(0) 3 1 3 r2(0) 4 2 4 r2(0) 5 3 r2(0) 6 4 6 r2M 7 5 7 r2M 8 6 8 r2M 9 7 9 r2M 10 8 r2M 11 9 11 r2M 12 10 12 r3M 13 11 13 r3M 14 12 14 r3M 15 13 r2(2) 16 14 16 r3(2) 17 15 17 r2(3) 18 16 18 r3(3) 19 17 19 r2W 20 18 r3W 21 19 21 r23) 22 20 Current Code Up next Down State state next state 22 r3(5) 23 21 23 r2(6) 24 22 24 r3(6) 25 23 r2(7) 26 24 26 r3(7) 27 25 27 r2(8) 28 26 28 r3(8) 29 27 29 r2(9) 30 28 r3(9) 31 29 31 r2(10) 32 30 32 r3(10) 33 31 33 r2(11) 34 32 34 r3(11) 34 33 r2(0) 36 1 56 r2M 37 2 57 r2(2) 38 4 58 r2(3) 39 6 39 r2W 40 10 r2(5) 41 16 41 r2(6) 42 19 42 r27) 43 22 r2(8) 28 25 0 Switch to MPS -121- Table 22
Current Code Up next Down State state next state 0 r2(0) 35 35 1 r2(0) 2 1 2 r2(0) 3 1 3 r2(0) 4 2 4 r2(0) 5 3 r2(0) 6 4 r2M 7 5 7 r2M -8 6 8 r2M 9 7 9 r2M 10 8 r2M 11 9 11 r2M 12 10 12 r2M 13 11 13 r2(2) 14 12 14 r2(2) is 13 r2(2) 16 14 16 r2(2) 17 15 17 r2(3) is 16 is r2(3) 19 17 19 r2(4) 20 18 r2(4) 21 19 21 r25) 22 20 0 switch MPS Current Code Up next Dom State state next state 22 r2(5) 23 21 23 r2(6) 24 22 24 r2(6) 25 23 r2M 26 24 26 r2(7) 27 25 27 r2(8) 28 26 28 r2(8) 29 27 29 r2(9) 30 28 r2(9) 31 29 31 r2(1 0) 32 30 32 r2(1 0) 33 31 33 r2(11) 33 3T7-1 r2(0) 36 1 56 r2M 37 2 57 r2(2) 38 4 38 r2(3) 39 6 59 r2W 40 10 48 r23) 41 16 41 r2(6) 42 19 42 r2M 43 22 r2(8) 28 25 -122- Table 2.3
Current Code Up next Down State state next state 0 r2(0) 35 35 1 r2(0) 2 1 2 r2(0) 3 1 3 r2(0) 4 2 4 r2(0) 5 3 r2(0) 6 4 6 r2(1) 7 5 7 r2M 8 6 8 r2M 9 7 9 r2M 10 8 r2M 11 9 11 r2(1) 12 10 12 r3M 13 11 13 r3M 14 12 14 r3M 15 13 r2(2) 16 14 116 r3(2) 17 is 17 r2(3) 18 16 18 r3(3) 19 17 19 r2(4) 20 18 r3(4) 21 19 1 r23) 2-2 20 Current Code Up next Down State state next state 2-2 r2(5) 23 21 2-3 r2(6) 24 22 24 r2(6) 25 23 r27) 6 24 26 r2M 27 25 27 r2(8) 28 26 28 r21M 29 27 29 r2(9) 30 28 r2(9) 31 29 31 r2(10) 32 30 32 r2(1 0) 33 31 33 r2(11) 34 32 34 r2(11) 34 33 i2(0) 36 1 56 r2(1) 37 2 57 r2(2) 38 4 58 r2(3) 39 6 59 r2W 40 10 48 r2(5) 41 16 41 r2(6) 42 19 42 r27) 43 22 r2(8) 28 25 Switch MPS -123- Table 24
Current Code Up next Down State state next state 0 r2(0) 35 35 1 r2(0) 2 1 2 r2(0) 3 1 3 r2(0) 4 2 4 r2(0) 5 3 r2(0) 6 4 6 r2M 7 5 7 r2M 8 6 8 r2M 9 7 9 r20) 10 8 r2M 11 9 11 r2(1) 12 10 12 r3M 13 11 13 r3M 14 12 14 r3M is 13 r2(2) 16 14 16 r3(2) 17 15 17 r2(3) 18 16 18 r3(3) 19 17 19 r2(4) 20 18 r3(4) 21 19 21 r23) 2-2 20 - SvAtch MPS Current Code Up next Down State state next state 22 r3(5) 23 21 23 r2(6) 24 22 24 r3(6) 25 23 r2(7) 26 24 26 r2(7) 27 25 27 r2(7) 127 26 r2(0) 36 1 36 r2M 37 2 57 r2(2) 38 4 58 r2(3) 39 6 39 r2(4) 40 10 r2(5) 41 16 41 r2(6) 42 19 42 25 22 -124- Table 25
Current Code Up next Down State state next state 0 r2(0) 35 35 1 r2(0) 2 1 2 r2(0) 3 1 3 r2(0) 4 2 4 r2(0) 5 3 r2(0) 6 4 6 r2M 7 5 7 r2M 8 6 8 r2M 9 7 9 r2M 10 8 r2(1) 11 9 11 r2M 12 10 12 r2M 13 11 13 r2(2) 14 12 14 r2(2) 15 13 r2(2) 16 14 16 r2(2) 17 15 17 r2(3) is 16 is r2(3) 19 17 19 r2(4) 20 18 2P1 r2(4) 21 19 r23) 22 20 516itch mm Current Code Up next Down State state next state 22 r2(5) 23 21 23 r2(6) 24 22 24 r2(6) 25 23 2.5 r2M 26 24 26 r2(7) 27 25 27 r2(7) 28 26 28 r2M 28 27 r2(0) 36 1 56 r2M 37 2 57 r2(2) 38 4 38 r2(3) 39 6 _q r2W 40 10 4 0 r2(5) 41 16 41 r2(6) 42 19 42 r2(7) 25 22 r2(8) 28 25 -125- Adding a fast adaptation to probability estimation only helps at the start of coding. Other methods can be used to improve adaptation during coding when the statistics of a context bin change more rapidly than the previously described PEM state tables can track.
One method of maintaining fast adaptation throughout coding is to add an acceleration term to the PEM state update. This acceleration could be incorporated into a PEM state table by repeating every code a constant number of times (e.g., 8). Then an acceleration term M (e.g., a positive integer) can be added or subtracted from the current state when updating. When M is 1, the system operates the same as one without acceleration and the slowest adaptation occurs. When M is greater than 1, faster adaptation occurs. Initially, M may be set to some value greater than 1 to provide an inifial fast adaptation.
One method for updating the value of M is based on the number of consecutive codewords. For instance, if a predetermined number of codewords occurred consecutively, then the value of M is increased. For instance, if four consecutive codewords are V V V 0 or 1 W 1 W 1 NO M W, then the value of M is increased. On the other hand, a pattern of switching between V and M W codewords may be used to decrease the value of M. For instance, if four consecutive codewords are V 1 Nw Om 1 NP or 01 M' V 1 W V then the value of M is decreased.
Another method of acceleration uses state tables in which each code is repeated S times, where S is a positive integer. S is an inverse acceleration parameter. When S is one, adaptation is fast, and when S is larger, adaptation is slower. The value of S can be initially set to 1 to provide initial BAD ORIGINAL -126- fast adaptation. Using a similar method to the one described above, the value of S may be updated when four consecutive codewords are MOW MOW won mole or 01 NR M N ffil N 01 Nw. In such a case, the value of S is decreased. In contrast, if four consecutive codewords are MOW -1 N- MOW -1 N- or M N MOW W1 Nw MOW, then the value of S is increased.
The definition of consecutive codewords can have several meanings.
In a by context system, consecutive codewords may refer to consecutive codewords in one context bin. In a "by probability" system, consecutive codewords may refer to consecutive codewords in one probability class.
Alternatively, in either system consecutive codewords may refer to consecutive codewords globally (without regard to context bin or probability class). For these three examples, the bits of storage required to maintain a history of codewords is 3 x number of-context-bins, 3 x number-of_probability---classes and 3 respectively. Maintaining acceleration for each context bin might provide the best adaptation. Since poor tracking is often due to a global change in the uncoded data, determining acceleration globally might also provide good adaptation.
Systern Applications One virtue of any compression system is to reduce storage requirements for a set of data. The parallel system of the present invention may be substituted for any application'currently fulfilled by a lossless coding system, and may be applied to systems operating on audio, text, databases, computer executable, or other digital data, signals or symbols. Exemplary lossless coding systems include facsimile compression, database BAD ORIGINAL -127.
cCompression, compression of bitmap graphic images, and compression of transform coefficients in image compression standards such as JPEG and MPEG. The present invention allows small efficient hardware implementation and relatively fast software implementations making it a good choice even for 5 applications that do not require high speed.
The real vinue that the present invention has over the prior art is the pcss,;bjll'oly of operation at very high speeds, especially for decoding. In lhis manner. the present invention can make full use of expensive high speed channels. such as high speed computer networks. satellite and terrestrial broadcast channels. Figure 2B illustrates such a system, wherein broadcast data or a high speed computer network supplies data to decoding system 25C1 which decodes the data in parallel to produce output data. Current hardware ertrcpy (such as the Q-Coder) would slow the throughput of these systerns. All of these syslerns are designed. at great cost, to have high It is counter productive to have a decoder slow the throughput.
The present invention inct only accommodates these high bandwim',ths, it aclual!y increases the effective bandwidth because the data can be transmitted in a compressed form.
The present invention is also applicable to obtaining more effective bandwidth out of moderately fast channels like ISDN, CD-ROM. and SCSI. Such a bandwidth matching system is shown in Figure 29. whereas data llrom sources, such as a CD-ROM. Ethernet. Srnall Computer Standard Interface (SCSI), or other similar source. is coupled to decoding system 2901, whicn receives and decodes to the data to produce an output. These channels are still faster than sorne current coders. Otten these BAD ORIGINAL.
-128- channels are used to service a data source that requires more bandwidth than the channel has, such as real-time video or computer based multimedia. The system of the present invention can perform the role of bandwidth matching.
The present invention is an excellent choice for an entropy coder part of a real-time video system like the High Definition Television (HDTV) and the MPEG video standards. Such a system is shown in Figure 30. Referring to Figure 30, the real-lime video system includes decoding system 3001 which iS coupled to compressed image data. System 3001 decodes the data and outputs it to lossy decoder 3002. Lossy decoder 3002 could be the transform, color conversion and subsampling portion of an HDTV or MPEG decoder. Monitor 3003 may be a television or Video monitor.
Whereas many alterations and modifications of the present invention will no doubt become apparent to a person of ordinary skill in the art after having read the foregoing descri"ption, it is to be understood that the particular embodiment shown and described by way of illustration is in no way intended to be considered limiting. Therefore, references to details of the preferred embodiment are not intended to limit the scope of the claims which in themselves recite only those features regarded as essential to the invention.
Thus, a method and apparatus for parallel decoding and encoding of data has been described.
SAD OBIG1NAL - 129 Attention is drawn to the following UK patent applications:
Patent Application Number 9518375.2 (Publication Number GB 2 293 735), from which the present application is 5 divided, which claims aspects of an encoding method and encoding system using an encoder, context model and state memory, reorder unit and reorder memory; Patent Application Number ct 5'3,9 (Publication Number GB a further divisional of Application Number 9518375.2, which claims aspects of the encoding and decoding systems described above incorporating fast adaption of states and acceleration; Patent Application Number R LI,<75 5 --- 1 (Publication Number GB), a further divisional of Application Number 9518375.2, which claims aspects of a decoder for decoding a plurality of interleaved words, comprising a variable length shifting mechanism, a run length decoder, a probability estimation machine and a plurality of registers; and Patent Application Number (Publication Number GB a further divisional Application Number 9518375.2, which claims aspects of a decoding system using a context modelling mechanism having a plurality of integrated circuits, a memory and a plurality of decoders.
BAD CMiGINAL - 130 -
Claims (4)
1. A method for decoding coded data comprising a plurality of codewords, said method comprising the steps of:
loading a count value into a counter associated with each run counter, wherein the count value corresponds to the size of a codeword memory used during encoding when a new run is started, said count value being loaded when a new codeword for said each run counter is fetched; decrementing the count value each time any codeword is fetched; and clearing the bit generator state associated with said new codeword when the counter decrements to zero.
2. The method defined in claim 1 wherein each run 15 counter corresponds to a PEM state.
3. The method defined in claim 1 wherein each run counter corresponds to a context bin.
4. A method according to any one of the preceding claims and substantially as described herein.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US31611694A | 1994-09-30 | 1994-09-30 | |
GB9518375A GB2293735B (en) | 1994-09-30 | 1995-09-07 | Method and apparatus for encoding data |
Publications (3)
Publication Number | Publication Date |
---|---|
GB9624640D0 GB9624640D0 (en) | 1997-01-15 |
GB2306281A true GB2306281A (en) | 1997-04-30 |
GB2306281B GB2306281B (en) | 1997-10-22 |
Family
ID=26307711
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9624754A Expired - Fee Related GB2306868B (en) | 1994-09-30 | 1995-09-07 | Apparatus for decoding data |
GB9624640A Expired - Fee Related GB2306281B (en) | 1994-09-30 | 1995-09-07 | nethod for decoding data |
GB9624357A Expired - Fee Related GB2306279B (en) | 1994-09-30 | 1995-09-07 | Apparatus for decoding data |
GB9624358A Expired - Fee Related GB2306280B (en) | 1994-09-30 | 1995-09-07 | A coding system and entropy decoder |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9624754A Expired - Fee Related GB2306868B (en) | 1994-09-30 | 1995-09-07 | Apparatus for decoding data |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9624357A Expired - Fee Related GB2306279B (en) | 1994-09-30 | 1995-09-07 | Apparatus for decoding data |
GB9624358A Expired - Fee Related GB2306280B (en) | 1994-09-30 | 1995-09-07 | A coding system and entropy decoder |
Country Status (1)
Country | Link |
---|---|
GB (4) | GB2306868B (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6222468B1 (en) * | 1998-06-04 | 2001-04-24 | Ricoh Company, Ltd. | Adaptive coding with adaptive speed |
GB2356508B (en) | 1999-11-16 | 2004-03-17 | Sony Uk Ltd | Data processor and data processing method |
US11113054B2 (en) | 2013-09-10 | 2021-09-07 | Oracle International Corporation | Efficient hardware instructions for single instruction multiple data processors: fast fixed-length value compression |
US9378232B2 (en) | 2013-09-21 | 2016-06-28 | Oracle International Corporation | Framework for numa affinitized parallel query on in-memory objects within the RDBMS |
US10025822B2 (en) | 2015-05-29 | 2018-07-17 | Oracle International Corporation | Optimizing execution plans for in-memory-aware joins |
US10067954B2 (en) | 2015-07-22 | 2018-09-04 | Oracle International Corporation | Use of dynamic dictionary encoding with an associated hash table to support many-to-many joins and aggregations |
US10419772B2 (en) * | 2015-10-28 | 2019-09-17 | Qualcomm Incorporated | Parallel arithmetic coding techniques |
US10061832B2 (en) | 2016-11-28 | 2018-08-28 | Oracle International Corporation | Database tuple-encoding-aware data partitioning in a direct memory access engine |
US10055358B2 (en) * | 2016-03-18 | 2018-08-21 | Oracle International Corporation | Run length encoding aware direct memory access filtering engine for scratchpad enabled multicore processors |
US10061714B2 (en) | 2016-03-18 | 2018-08-28 | Oracle International Corporation | Tuple encoding aware direct memory access engine for scratchpad enabled multicore processors |
US10402425B2 (en) | 2016-03-18 | 2019-09-03 | Oracle International Corporation | Tuple encoding aware direct memory access engine for scratchpad enabled multi-core processors |
US10599488B2 (en) | 2016-06-29 | 2020-03-24 | Oracle International Corporation | Multi-purpose events for notification and sequence control in multi-core processor systems |
US10380058B2 (en) | 2016-09-06 | 2019-08-13 | Oracle International Corporation | Processor core to coprocessor interface with FIFO semantics |
US10783102B2 (en) | 2016-10-11 | 2020-09-22 | Oracle International Corporation | Dynamically configurable high performance database-aware hash engine |
US10176114B2 (en) | 2016-11-28 | 2019-01-08 | Oracle International Corporation | Row identification number generation in database direct memory access engine |
US10459859B2 (en) | 2016-11-28 | 2019-10-29 | Oracle International Corporation | Multicast copy ring for database direct memory access filtering engine |
US10725947B2 (en) | 2016-11-29 | 2020-07-28 | Oracle International Corporation | Bit vector gather row count calculation and handling in direct memory access engine |
CN116192154B (en) * | 2023-04-28 | 2023-06-27 | 北京爱芯科技有限公司 | Data compression and data decompression method and device, electronic equipment and chip |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5381145A (en) * | 1993-02-10 | 1995-01-10 | Ricoh Corporation | Method and apparatus for parallel decoding and encoding of data |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA1291820C (en) * | 1986-09-15 | 1991-11-05 | William B. Pennebaker | Probability estimation based on decision history |
CA1291821C (en) * | 1986-09-15 | 1991-11-05 | Glen G. Langdon, Jr. | Arithmetic coding encoder and decoder system |
KR960006827Y1 (en) * | 1990-03-31 | 1996-08-08 | 엘지전자 주식회사 | A multipurpose plat of a front panel |
US5475388A (en) * | 1992-08-17 | 1995-12-12 | Ricoh Corporation | Method and apparatus for using finite state machines to perform channel modulation and error correction and entropy coding |
US5272478A (en) * | 1992-08-17 | 1993-12-21 | Ricoh Corporation | Method and apparatus for entropy coding |
US5583500A (en) * | 1993-02-10 | 1996-12-10 | Ricoh Corporation | Method and apparatus for parallel encoding and decoding of data |
JP3220598B2 (en) * | 1994-08-31 | 2001-10-22 | 三菱電機株式会社 | Variable length code table and variable length coding device |
-
1995
- 1995-09-07 GB GB9624754A patent/GB2306868B/en not_active Expired - Fee Related
- 1995-09-07 GB GB9624640A patent/GB2306281B/en not_active Expired - Fee Related
- 1995-09-07 GB GB9624357A patent/GB2306279B/en not_active Expired - Fee Related
- 1995-09-07 GB GB9624358A patent/GB2306280B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5381145A (en) * | 1993-02-10 | 1995-01-10 | Ricoh Corporation | Method and apparatus for parallel decoding and encoding of data |
Also Published As
Publication number | Publication date |
---|---|
GB9624640D0 (en) | 1997-01-15 |
GB2306281B (en) | 1997-10-22 |
GB2306279A (en) | 1997-04-30 |
GB9624754D0 (en) | 1997-01-15 |
GB2306279B (en) | 1997-10-22 |
GB9624357D0 (en) | 1997-01-08 |
GB2306280B (en) | 1997-10-22 |
GB2306868B (en) | 1997-10-22 |
GB2306280A (en) | 1997-04-30 |
GB2306868A (en) | 1997-05-07 |
GB9624358D0 (en) | 1997-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2156889C (en) | Method and apparatus for encoding and decoding data | |
US5717394A (en) | Method and apparatus for encoding and decoding data | |
GB2306281A (en) | Method for decoding coded data | |
US11705924B2 (en) | Low-latency encoding using a bypass sub-stream and an entropy encoded sub-stream | |
US5583500A (en) | Method and apparatus for parallel encoding and decoding of data | |
US11431351B2 (en) | Selection of data compression technique based on input characteristics | |
US5381145A (en) | Method and apparatus for parallel decoding and encoding of data | |
TWI789089B (en) | Entropy encoding and decoding scheme | |
EP1912443B1 (en) | Context-based adaptive arithmetic decoding system and apparatus | |
JP2000503512A (en) | Variable length decoding | |
GB2333000A (en) | Finite state machine coding of information | |
JP3230933B2 (en) | Data decompression device, data decompression method, decoding device, decoding method, encoding device, and entropy decoder | |
CN1268826A (en) | Device and method for relay waving absorbing | |
CA2273144C (en) | Apparatus and system for decoding data | |
AU2016203305A1 (en) | Method, apparatus and system for encoding and decoding video data | |
Pastuszak | High-speed architecture of the CABAC probability modeling for H. 265/HEVC encoders | |
CN111083475B (en) | Quantization transformation coefficient management device and encoder suitable for HEVC standard | |
AU2011201344A1 (en) | Method, apparatus and system for encoding video data | |
An et al. | A video encoder/decoder architecture for consumer-use HD-DVCRs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20070907 |