1. Field of the Invention
Embodiments of the present invention relate to decoding variable length codes (VLC) used in Joint Photographic Experts Group (JPEG) image files.
2. Related Art
In computing applications, variable length coding (VLC) encoding schemes allow for lossless data compression. In general, VLC encoding schemes utilize a probabilistic approach, where the more common symbols require fewer bits to express than the less common symbols. VLC encoding is used extensively throughout computing, and particularly in media applications, such as images, music, and video, where the uncompressed information would require far more storage space than a compressed version.
One VLC encoding scheme is Huffman coding. Huffman coding is an extremely efficient means of compressing data, particularly when the item to be compressed is used to help generate the corresponding Huffman tree, by using the occurrence of values within the source material to determine where in the Huffman tree each symbol value should appear. Huffman coding also offers an advantage, in that it generates prefix free codes, sometimes called prefix codes; that is, no symbol generated by a Huffman tree will correspond to a prefix of any other symbol generated by that Huffman tree.
Huffman coding is used extensively throughout media applications, and in particular in the Joint Photographic Experts Group (JPEG) image file format. Every JPEG uses Huffman coding to compress data, and, correspondingly, every JPEG viewer must process the Huffman coding to decompress the image. The more efficiently a JPEG viewer can process Huffman coding, the faster the decoding process.
The JPEG standard allows for different Huffman tables for every image. The frequency of occurrence of every value in the image is determined, and those frequencies are used to generate unique Huffman tables for that image. As such, in order for a viewer to decode a JPEG image, the necessary information to reconstruct the Huffman tables is included in the file itself, as part of the file header.
An approach to decoding Huffman symbols in JPEG images is described. One approach involves a method of decoding Huffman codes in a JPEG image file. This method involves obtaining a bitstream sample from a bitstream associated with the JPEG image file. The bitstream sample is compared against a threshold value, to identify a Huffman group number. Information associated with a Huffman group is retrieved, and used to extract the current Huffman symbol from the bitstream. A corresponding symbol value can then be obtained, using the current Huffman symbol and the group information.
Another approach is described, in which a system is used to decode Huffman codes in a JPEG image file. The system includes a controller module, for performing operations on the JPEG image file. A Huffman table generator is used to generate a base table and a secondary table from information included in the JPEG image file. A bitstream buffer can then be used to store a data excerpt from image data included in the JPEG image file, and a number of threshold comparators are used to identify a Huffman group corresponding to a current Huffman symbol. The controller module can obtain group information associated with the Huffman group, and use the group information to obtain a symbol value corresponding to the current Huffman symbol.
Another approach describes a method of decoding Huffman variable length codes in a JPEG image file. This method involves scanning 16 bits from a bitstream associated with the JPEG image file into a bitstream buffer. A Huffman group corresponding to a current Huffman symbol is identified, and group information associated with that Huffman group is retrieved from a base table. A symbol value for the current Huffman symbol is obtained from a secondary table, with reference to the group information.
The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention:
Reference will now be made in detail to several embodiments of the invention. While the invention will be described in conjunction with the alternative embodiment(s), it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternative, modifications, and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the claimed subject matter. However, it will be recognized by one skilled in the art that embodiments may be practiced without these specific details or with equivalents thereof. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects and features of the subject matter.
Portions of the detailed description that follows are presented and discussed in terms of a method. Although steps and sequencing thereof are disclosed in figures herein (e.g.,
Some portions of the detailed description are presented in terms of procedures, steps, logic blocks, processing, and other symbolic representations of operations on data bits that can be performed on computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. A procedure, computer-executed step, logic block, process, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout, discussions utilizing terms such as “accessing,” “writing,” “including,” “storing,” “transmitting,” “traversing,” “associating,” “identifying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Computing devices typically include at least some form of computer readable media. Computer readable media can be any available media that can be accessed by a computing device. By way of example, and not limitation, computer readable medium may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computing device. Communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signals such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
Some embodiments may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments.
Although embodiments described herein may make reference to a CPU and a GPU as discrete components of a computer system, those skilled in the art will recognize that a CPU and a GPU can be integrated into a single device, and a CPU and GPU may share various resources such as instruction logic, buffers, functional units and so on; or separate resources may be provided for graphics and general-purpose operations. Accordingly, any or all of the circuits and/or functionality described herein as being associated with GPU could also be implemented in and performed by a suitably configured CPU.
Further, while embodiments described herein may make reference to a GPU, it is to be understood that the circuits and/or functionality described herein could also be implemented in other types of processors, such as general-purpose or other special-purpose coprocessors, or within a CPU.
Basic Computing System
Referring now to
Similarly, system 112 can be implemented as a handheld device (e.g., cellphone, etc.) or a set-top video game console device such as, for example, the Xbox®, available from Microsoft Corporation of Redmond, Wash., or the PlayStation3®, available from Sony Computer Entertainment Corporation of Tokyo, Japan. System 112 can also be implemented as a “system on a chip”, where the electronics (e.g., the components 101, 103, 105, 106, and the like) of a computing device are wholly contained within a single integrated circuit die. Examples include a hand-held instrument with a display, a car navigation system, a portable entertainment system, and the like.
Computer system 112 comprises an address/data bus 100 for communicating information, a central processor 101 coupled with bus 100 for processing information and instructions; a volatile memory unit 102 (e.g., random access memory [RAM], static RAM, dynamic RAM, etc.) coupled with bus 100 for storing information and instructions for central processor 101; and a non-volatile memory unit 103 (e.g., read only memory [ROM], programmable ROM, flash memory, etc.) coupled with bus 100 for storing static information and instructions for processor 101. Moreover, computer system 112 also comprises a data storage device 104 (e.g., hard disk drive) for storing information and instructions.
Computer system 112 also comprises an optional graphics subsystem 105, an optional alphanumeric input device 106, an optional cursor control or directing device 107, and signal communication interface (input/output device) 108. Optional alphanumeric input device 106 can communicate information and command selections to central processor 101. Optional cursor control or directing device 107 is coupled to bus 100 for communicating user input information and command selections to central processor 101. Signal communication interface (input/output device) 108, which is also coupled to bus 100, can be a serial port. Communication interface 108 may also include wireless communication mechanisms. Using communication interface 108, computer system 112 can be communicatively coupled to other computer systems over a communication network such as the Internet or an intranet (e.g., a local area network), or can receive data (e.g., a digital television signal). Computer system 112 may also comprise graphics subsystem 105 for presenting information to the computer user, e.g., by displaying information on an attached display device 110, connected by a video cable 111. In some embodiments, graphics subsystem 105 is incorporated into central processor 101. In other embodiments, graphics subsystem 105 is a separate, discrete component. In other embodiments, graphics subsystem 105 is incorporated into another component. In other embodiments, graphics subsystem 105 is included in system 112 in other ways.
Efficient VLC Handling in JPEG Applications
In the following embodiment, an approach is described for efficiently handling variable length coding (VLC), and particularly Huffman coding, in JPEG image viewing applications. In one embodiment, a method for processing Huffman codes in a JPEG image is described, which involves efficiently extracting a VLC symbol from a JPEG bitstream, and matching the VLC symbol with its corresponding symbol value.
Several of the embodiments described herein take advantage of several features of the JPEG file format, and its corresponding use of Huffman tables. First, the maximum length Huffman code allowed for a JPEG image is 16 bits. Second, every Huffman table used with JPEG image defines 16 Huffman groups, where a group is defined by the length of the symbols within the group; e.g., the first group consists of symbols one bit in length, the second group consists of symbols two bits in length, and so on, up to the 16th group, which consists of symbols 16 bits in length. Third, as noted previously, Huffman codes are prefix free codes. Fourth, within each Huffman group, code values are consecutive. Utilization of these features allows for an efficient approach to handling Huffman coding.
Exemplary Huffman Codes
While the JPEG standard allows for every image to have its own, uniquely calculated Huffman tables, several “typical” tables are provided by the JPEG committee. One such typical table is the DC luminance table specified by the arrays depicted below, in Table 1.
The first array, dc_luminance_bits[ ], specifies how the Huffman codes are assigned in the corresponding table, by indicating how many symbols are present in each of the 16 Huffman groups used by JPEG. In this table, only groups two through nine, corresponding to symbols between two and nine bits in length, have entries. Group 3, made up of symbols three bits in length, has five symbols; the remainder have one each. Groups 1 and 10-16 are defined as each having zero entries.
The second array, dc_luminance_val[ ], provides the values to be associated with the symbols, in the order they are to be assigned. In this table, 0 is associated with the first symbol, 1 with the second, and so on.
With reference now to
Jpeg File Format
With reference now to
Image data 320, as shown, consists of a bitstream of compressed symbol data. An exemplary excerpt of this bitstream data is shown as bitstream excerpt 325. Bitstream excerpt 325, in the depicted embodiment, is made up of several VLC symbols strung together, e.g., symbols 331, 333, and 335. Because the symbols are variable in length, it is necessary for a JPEG viewer to recognize each complete symbol, regardless of length.
Traditional Approaches
A common prior art approach to handling Huffman codes in JPEG image files involved reading in several bits from the bitstream, often three, and comparing those bits with a table stored in memory. If those bits constituted a complete symbol, the table would so indicate, and provide the value associated with the symbol. If those bits were not a complete symbol, the table would indicate that as well, and include a reference to another table. Further bits would be read from the bitstream, and the second table referenced, with the same potential results. This repeated looping cycle is inefficient, in terms of processing time, repeated memory accesses, and usage of memory to store multiple tables for all but the most trivial of cases.
The Base Table and the Secondary Table
The following embodiments describe an approach for more efficient Huffman decoding for JPEG images. One feature of this approach is more efficient utilization of memory, by limiting the usage of memory tables. For all but the most trivial of cases, the use of the base and secondary tables represents a substantial improvement in terms of memory usage.
With reference to
The threshold values depicted in base table 400 have been “padded” with zeroes, in order to fill them out to 16 bits in length. In some embodiments, as described in greater detail below, it is advantageous for the threshold values to be equally long, e.g., as long as the longest possible Huffman code.
With reference to
Decoding Huffman Values for Jpeg Images
With reference now to
As shown, step 610 involves scanning in 16 bits from the bitstream. In this embodiment, the maximum possible length of a VLC code is 16 bits. Accordingly, this single scan operation is certain to retrieve a complete symbol from the bitstream. In some embodiment, these bits are placed into a bitstream buffer.
Step 620, in the depicted embodiment, involves determining the appropriate Huffman group for the first symbol in the bitstream buffer. As discussed previously, Huffman codes are prefix free codes. As such, identifying the group in which a particular Huffman symbol belongs will indicate also how many bits long the symbol is. In one approach, the bitstream buffer is compared against 16 different threshold values, each associated with one of the 16 possible Huffman groups used in JPEG encoding. This comparison, which can happen in parallel and very quickly, makes determining the appropriate group, and then the symbol itself, straightforward.
With reference now to step 630, a base table is accessed, and symbol information is retrieved. In some embodiments, two tables are utilized in decoding Huffman symbols. The first table, or base table, contains information about the 16 Huffman groups used in JPEG encoding. In one such embodiment, a “base triplet” is used for each of these 16 groups. The triplet contains the length of entries in that group, e.g., in numbers of bits; a threshold value for that group, which may be used for the comparison performed in step 620; and a memory offset, pointing to a portion of a second memory table where entries for that group may begin. The second table contains symbol values for the various Huffman symbols encoded in the bitstream.
With reference now to step 640, a corresponding symbol value is retrieved. In some embodiments, the base table provides the appropriate offset information for accessing the secondary table. The symbol itself can then be used to provide an index, which, in combination with the offset, allows retrieving a particular symbol value from its location in the secondary table.
With reference now to
With reference to step 710, threshold information is retrieved for the VLC groups used during encoding. In some embodiments, this threshold information is obtained from a base table, such as described above with reference to
With reference to step 720, a bitstream is accessed, and a number of bits are obtained from the bitstream. For JPEG bitstreams, the maximum possible VLC symbol length is 16 bits; accordingly, during step 720, 16 bits are obtained from the bitstream, and stored in a bitstream buffer. In different embodiments, different approaches are utilized for obtaining bits. For example, in one embodiment, the bitstream is scanned initially to obtain these 16 bits, while in other embodiments, the bits may be read from the bitstream.
With reference now to step 730, the bitstream buffer is compared against the threshold information, to determine which VLC group the current symbol belongs to. In different embodiments, this step is performed in different ways. In one embodiment, for example, the value stored in the bitstream buffer is compared against the threshold value for each group; if the bitstream buffer is greater than the threshold value for a particular group, the comparison returns “true.” Adding up the number of true results will give the group number for the current symbol. In some embodiments, the threshold value for the first VLC group need not be compared against the bitstream buffer; in such an embodiment, every possible value of the bitstream buffer will be equal or greater than the threshold for the first VLC group.
With reference now to step 740, the group number is used to retrieve group information. In some embodiments, the group number serves as an index to the base table. The base table, in turn, contains information regarding the number of bits in length a symbol in a particular group will be, a threshold value corresponding to the smallest entry in that particular group, and a memory offset for a location in a secondary table, where the symbol values for entries in that group are stored.
With reference now to step 750, the current symbol is extracted from the bitstream. In some embodiments, this step is performed by reading the number of bits indicated by the base table from the bitstream. In other embodiments, e.g., where step 720 involves a “read” operation instead of a “scan” operation, this step may be performed by reading a number of bits indicated by the base table from the bitstream buffer.
With reference now to step 760, the symbol value corresponding to the current symbol is obtained. In some embodiments, the symbol values are stored in a secondary table. In one such embodiment, an index to the secondary table is calculated by using the current symbol, the threshold value for their group, and the offset value for the group. An example of such a calculation is depicted below, in Table 2.
Exemplary VLC Decoding
With reference to
As shown in
The contents of buffer 845 are then compared with a number of threshold values, e.g., the threshold values depicted in base table 400: threshold values 432 through 439. Every comparison where buffer 845 is greater than or equal to the threshold value returns 1 (true). Note that in the depicted embodiment, as previously described, it is not necessary to compare the buffer against the threshold for group 1; in this embodiment, every possible value of buffer 845 is greater than the threshold for group 1, and so this comparison is automatically treated as 1.
The sum of these true results indicates the VLC group for the current symbol. In the embodiment depicted in
The VLC group is used to address the base table, e.g., base table 400, and retrieve the appropriate base triplet; in the depicted embodiment, the base triplet is made up of nbit value 423, threshold 433, and offset 443.
As shown in
Symbol 831, in combination with threshold value 433 and offset 443, is used to address secondary table 500. Offset 443 indicates the starting position within secondary table 500 for entries in group 3; symbol 831, in combination with threshold value 433, provides an index value. In the depicted embodiment, symbol 831 corresponds to the first entry in group 3, and its symbol value is stored at memory position <T2addr+1>. The symbol value for symbol 831 is 1.
As shown in
System for Jpeg Decoding
With reference now to
System 900 is shown as incorporating storage element 910. Storage element 910 may take different forms, in different embodiments. For example, in one embodiment, storage element 910 is a magnetic hard disk drive. In the depicted embodiment, storage element 910 is shown as storing JPEG file 915. JPEG file 915, as shown, incorporates both header 916, and bitstream 918.
System 900 is also shown as including memory 920. In different embodiments, memory 920 may take different forms. Memory 920, in the depicted embodiment, is used to store base table 922, and secondary table 924.
System 900 is also shown as including JPEG decoding engine 950. In the depicted embodiment, JPEG decoding engine 950 incorporates JPEG controller module 951, Huffman table generator 952, bitstream buffer 954, a plurality of threshold comparators 956, symbol buffer 958, and symbol value buffer 959.
Operation of system 900, according to the depicted embodiment, involves passing JPEG file 915 to JPEG decoding engine 950, where it is received by JPEG controller module 951. Header 916 is passed to Huffman table generator 952, which uses information contained in header 916, e.g., Huffman table information encoded as part of JPEG file 915, to generate base table 922 and secondary table 924. JPEG controller module 951 accesses base table 922, and obtains threshold information for each Huffman group described therein. This threshold information is loaded into the plurality of threshold comparators 956.
A portion of bitstream 918, e.g., the first 16 bits, is loaded into bitstream buffer 954. The contents of bitstream buffer 954 are then compared with each threshold comparator 956; the results of these comparisons will identify the Huffman group of the current symbol. Once the appropriate Huffman group has been determined, group information can be obtained from base table 922. This group information, in turn, allows for the extraction of the current symbol from bitstream 918; the symbol is stored in symbol buffer 958.
The combination of the group information and the symbol is used to access secondary table 924 and extract the symbol value for the current symbol, which can then be stored in symbol value buffer 959.
Embodiments of the present invention are thus described. While the present invention has been described in particular embodiments, it should be appreciated that the present invention should not be construed as limited by such embodiments, but rather construed according to the following claims.
Number | Name | Date | Kind |
---|---|---|---|
5163136 | Richmond | Nov 1992 | A |
5189671 | Cheng | Feb 1993 | A |
5289548 | Wilson et al. | Feb 1994 | A |
5585931 | Juri et al. | Dec 1996 | A |
5774206 | Wasserman et al. | Jun 1998 | A |
5796743 | Bunting et al. | Aug 1998 | A |
5818529 | Asamura et al. | Oct 1998 | A |
5821886 | Son | Oct 1998 | A |
5881176 | Keith et al. | Mar 1999 | A |
5969750 | Hsieh et al. | Oct 1999 | A |
5990812 | Bakhmutsky | Nov 1999 | A |
6008745 | Zandi et al. | Dec 1999 | A |
6009203 | Liu et al. | Dec 1999 | A |
6023088 | Son | Feb 2000 | A |
6041403 | Parker et al. | Mar 2000 | A |
6047357 | Bannon et al. | Apr 2000 | A |
6144322 | Sato | Nov 2000 | A |
6157741 | Abe et al. | Dec 2000 | A |
6161531 | Hamburg et al. | Dec 2000 | A |
6246347 | Bakhmutsky | Jun 2001 | B1 |
6298370 | Tang et al. | Oct 2001 | B1 |
6317063 | Matsubara | Nov 2001 | B1 |
6339658 | Moccagatta et al. | Jan 2002 | B1 |
6441757 | Hirano | Aug 2002 | B1 |
6456340 | Margulis | Sep 2002 | B1 |
6462744 | Mochida et al. | Oct 2002 | B1 |
6480489 | Muller et al. | Nov 2002 | B1 |
6507614 | Li | Jan 2003 | B1 |
6543023 | Bessios | Apr 2003 | B2 |
6552673 | Webb | Apr 2003 | B2 |
6563440 | Kangas | May 2003 | B1 |
6563441 | Gold | May 2003 | B1 |
6577681 | Kimura | Jun 2003 | B1 |
6587057 | Scheuermann | Jul 2003 | B2 |
6654539 | Duruz et al. | Nov 2003 | B1 |
6675282 | Hum et al. | Jan 2004 | B2 |
6696992 | Chu | Feb 2004 | B1 |
6738522 | Hsu et al. | May 2004 | B1 |
6757437 | Keith et al. | Jun 2004 | B1 |
6795503 | Nakao et al. | Sep 2004 | B2 |
6839624 | Beesley et al. | Jan 2005 | B1 |
6891976 | Zheltov et al. | May 2005 | B2 |
6981073 | Wang et al. | Dec 2005 | B2 |
7016547 | Smirnov | Mar 2006 | B1 |
7051123 | Baker et al. | May 2006 | B1 |
7068407 | Sakai et al. | Jun 2006 | B2 |
7068919 | Ando et al. | Jun 2006 | B2 |
7069407 | Vasudevan et al. | Jun 2006 | B1 |
7074153 | Usoro et al. | Jul 2006 | B2 |
7113115 | Partiwala et al. | Sep 2006 | B2 |
7113546 | Kovacevic et al. | Sep 2006 | B1 |
7119813 | Hollis et al. | Oct 2006 | B1 |
7129862 | Shirdhonkar et al. | Oct 2006 | B1 |
7132963 | Pearlstein et al. | Nov 2006 | B2 |
7158539 | Zhang et al. | Jan 2007 | B2 |
7209636 | Imahashi et al. | Apr 2007 | B2 |
7230986 | Wise et al. | Jun 2007 | B2 |
7248740 | Sullivan | Jul 2007 | B2 |
7286543 | Bass et al. | Oct 2007 | B2 |
7289047 | Nagori | Oct 2007 | B2 |
7324026 | Puri et al. | Jan 2008 | B2 |
7327378 | Han et al. | Feb 2008 | B2 |
7366240 | Chiang Wei Yin et al. | Apr 2008 | B2 |
7372378 | Sriram | May 2008 | B2 |
7372379 | Jia et al. | May 2008 | B1 |
7404645 | Margulis | Jul 2008 | B2 |
7432835 | Ohashi et al. | Oct 2008 | B2 |
7496234 | Li | Feb 2009 | B2 |
7606313 | Raman et al. | Oct 2009 | B2 |
7627042 | Raman et al. | Dec 2009 | B2 |
7660352 | Yamane et al. | Feb 2010 | B2 |
7724827 | Liang et al. | May 2010 | B2 |
7765320 | Vehse et al. | Jul 2010 | B2 |
8502709 | Jia | Aug 2013 | B2 |
20010010755 | Ando et al. | Aug 2001 | A1 |
20010026585 | Kumaki | Oct 2001 | A1 |
20020063807 | Margulis | May 2002 | A1 |
20020094031 | Ngai et al. | Jul 2002 | A1 |
20020135683 | Tamama et al. | Sep 2002 | A1 |
20030043919 | Haddad | Mar 2003 | A1 |
20030067977 | Chu et al. | Apr 2003 | A1 |
20030142105 | Lavelle et al. | Jul 2003 | A1 |
20030156652 | Wise et al. | Aug 2003 | A1 |
20030179706 | Goetzinger et al. | Sep 2003 | A1 |
20030191788 | Auyeung et al. | Oct 2003 | A1 |
20030196040 | Hosogi et al. | Oct 2003 | A1 |
20040028142 | Kim | Feb 2004 | A1 |
20040056787 | Bossen | Mar 2004 | A1 |
20040059770 | Bossen | Mar 2004 | A1 |
20040067043 | Duruoz et al. | Apr 2004 | A1 |
20040081245 | Deeley et al. | Apr 2004 | A1 |
20040096002 | Zdepski et al. | May 2004 | A1 |
20040130553 | Ushida et al. | Jul 2004 | A1 |
20040145677 | Raman et al. | Jul 2004 | A1 |
20040158719 | Lee et al. | Aug 2004 | A1 |
20050008331 | Nishimura et al. | Jan 2005 | A1 |
20050123274 | Crinon et al. | Jun 2005 | A1 |
20050147375 | Kadono | Jul 2005 | A1 |
20050182778 | Heuer et al. | Aug 2005 | A1 |
20050207497 | Rovati et al. | Sep 2005 | A1 |
20060013321 | Sekiguchi et al. | Jan 2006 | A1 |
20060067582 | Bi et al. | Mar 2006 | A1 |
20060083306 | Hsu | Apr 2006 | A1 |
20060133500 | Lee et al. | Jun 2006 | A1 |
20060176960 | Lu et al. | Aug 2006 | A1 |
20060215916 | Kimura | Sep 2006 | A1 |
20060256120 | Ushida et al. | Nov 2006 | A1 |
20070006060 | Walker | Jan 2007 | A1 |
20070288971 | Cragun et al. | Dec 2007 | A1 |
20080162860 | Sabbatini et al. | Jul 2008 | A1 |
20080317138 | Jia | Dec 2008 | A1 |
20090196356 | Houki | Aug 2009 | A1 |
Number | Date | Country |
---|---|---|
101017574 | Feb 2007 | CN |
06276394 | Sep 1994 | JP |
09261647 | Oct 1997 | JP |
2000049621 | Feb 2000 | JP |
1020030016859 | Mar 2003 | KR |
200428879 | Nov 2004 | TW |
200520535 | Dec 2009 | TW |
0124425 | Apr 2001 | WO |
Entry |
---|
English Translation of Office Action for Chinese Patent Application No. 200810212373.X, Entitled: Decoding Variable Length Codes in JPEG Applications. |
Non Final Office Action, Mail Date Jul. 20, 2009; U.S. Appl. No. 11/901,484. |
English Translation of Office Action for Chinese Patent Application No. 200810212373.X, Entitled: Decoding Variable Length Codes in JPEG Applications Mar. 10, 2010. |
Miska Hannuksela, Picture Decoding Method, USPTO Provisional Application filed Feb. 18, 2003; U.S. Appl. No. 60/448,189. |
Ting-Kun Yeh et al., Video Decoder, USPTO Provisional Application filed Dec. 3, 2003; U.S. Appl. No. 60/526,294. |
Number | Date | Country | |
---|---|---|---|
20090074314 A1 | Mar 2009 | US |