draft-terriberry-codingtools.xml 40 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030
  1. <?xml version="1.0" encoding="utf-8"?>
  2. <!DOCTYPE rfc SYSTEM 'rfc2629.dtd'>
  3. <?rfc toc="yes" symrefs="yes" ?>
  4. <rfc ipr="trust200902" category="info" docName="draft-terriberry-codingtools-02">
  5. <front>
  6. <title abbrev="Coding Tools">Coding Tools for a Next Generation Video Codec</title>
  7. <author initials="T.B." surname="Terriberry" fullname="Timothy B. Terriberry">
  8. <organization>Mozilla Corporation</organization>
  9. <address>
  10. <postal>
  11. <street>331 E. Evelyn Avenue</street>
  12. <city>Mountain View</city>
  13. <region>CA</region>
  14. <code>94041</code>
  15. <country>USA</country>
  16. </postal>
  17. <phone>+1 650 903-0800</phone>
  18. <email>tterribe@xiph.org</email>
  19. </address>
  20. </author>
  21. <date day="9" month="March" year="2015"/>
  22. <area>RAI</area>
  23. <abstract>
  24. <t>
  25. This document proposes a number of coding tools that could be incorporated into
  26. a next-generation video codec.
  27. </t>
  28. </abstract>
  29. </front>
  30. <middle>
  31. <section anchor="intro" title="Introduction">
  32. <t>
  33. One of the biggest contributing factors to the success of the Internet is that
  34. the underlying protocols are implementable on a royalty-free basis.
  35. This allows them to be implemented widely and easily distributed by application
  36. developers, service operators, and end users, without asking for permission.
  37. In order to produce a next-generation video codec that is competitive with the
  38. best patent-encumbered standards, yet avoids patents which are not available
  39. on an open-source compatible, royalty-free basis, we must use old coding tools
  40. in new ways and develop new coding tools.
  41. This draft documents some of the tools we have been working on for inclusion in
  42. such a codec.
  43. This is early work, and the performance of some of these tools (especially in
  44. relation to other approaches) is not yet fully known.
  45. Nevertheless, it still serves to outline some possibilities an eventual working
  46. group, if formed, could consider.
  47. </t>
  48. </section>
  49. <section anchor="entropy_coding" title="Entropy Coding">
  50. <t>
  51. The basic theory of entropy coding was well-established by the late
  52. 1970's&nbsp;<xref target="Pas76"/>.
  53. Modern video codecs have focused on Huffman codes (or "Variable-Length
  54. Codes"/VLCs) and binary arithmetic coding.
  55. Huffman codes are limited in the amount of compression they can provide and the
  56. design flexibility they allow, but as each code word consists of an integer
  57. number of bits, their implementation complexity is very low, so they were
  58. provided at least as an option in every video codec up through H.264.
  59. Arithmetic coding, on the other hand, uses code words that can take up
  60. fractional parts of a bit, and are more complex to implement.
  61. However, the prevalence of cheap, H.264 High Profile hardware, which requires
  62. support for arithmetic coding, shows that it is no longer so expensive that a
  63. fallback VLC-based approach is required.
  64. Having a single entropy-coding method simplifies both up-front design costs and
  65. interoperability.
  66. </t>
  67. <t>
  68. However, the primary limitation of arithmetic coding is that it is an
  69. inherently serial operation.
  70. A given symbol cannot be decoded until the previous symbol is decoded, because
  71. the bits (if any) that are output depend on the exact state of the decoder at
  72. the time it is decoded.
  73. This means that a hardware implementation must run at a sufficiently high clock
  74. rate to be able to decode all of the symbols in a frame.
  75. Higher clock rates lead to increased power consumption, and in some cases the
  76. entropy coding is actually becoming the limiting factor in these designs.
  77. </t>
  78. <t>
  79. As fabrication processes improve, implementers are very willing to trade
  80. increased gate count for lower clock speeds.
  81. So far, most approaches to allowing parallel entropy coding have focused on
  82. splitting the encoded symbols into multiple streams that can be decoded
  83. independently.
  84. This "independence" requirement has a non-negligible impact on compression,
  85. parallelizability, or both.
  86. For example, H.264 can split frames into "slices" which might cover only a
  87. small subset of the blocks in the frame.
  88. In order to allow decoding these slices independently, they cannot use context
  89. information from blocks in other slices (harming compression).
  90. Those contexts must adapt rapidly to account for the generally small number of
  91. symbols available for learning probabilities (also harming compression).
  92. In some cases the number of contexts must be reduced to ensure enough symbols
  93. are coded in each context to usefully learn probabilities at all (once more,
  94. harming compression).
  95. Furthermore, an encoder must specially format the stream to use multiple slices
  96. per frame to allow any parallel entropy decoding at all.
  97. Encoders rarely have enough information to evaluate this "compression
  98. efficiency" vs. "parallelizability" trade-off, since they don't generally know
  99. the limitations of the decoders for which they are encoding.
  100. That means there will be many files or streams which could have been decoded if
  101. they were encoded with different options, but which a given decoder cannot
  102. decode because of bad choices made by the encoder (at least from the
  103. perspective of that decoder).
  104. The same set of drawbacks apply to the DCT token partitions in
  105. VP8&nbsp;<xref target="RFC6386"/>.
  106. </t>
  107. <section anchor="nonbinary_coding" title="Non-binary Arithmetic Coding">
  108. <t>
  109. Instead, we propose a very different approach: use non-binary arithmetic
  110. coding.
  111. In binary arithmetic coding, each decoded symbol has one of two possible
  112. values: 0 or 1.
  113. The original arithmetic coding algorithms allow a symbol to take on any number
  114. of possible values, and allow the size of that alphabet to change with each
  115. symbol coded.
  116. Reasonable values of N (for example, N&nbsp;&lt;=&nbsp;16) offer the potential
  117. for a decent throughput increase for a reasonable increase in gate count for
  118. hardware implementations.
  119. </t>
  120. <t>
  121. Binary coding allows a number of computational simplifications.
  122. For example, for each coded symbol, the set of valid code points is partitioned
  123. in two, and the decoded value is determined by finding the partition in which
  124. the actual code point that was received lies.
  125. This can be determined by computing a single partition value (in both the
  126. encoder and decoder) and (in the decoder) doing a single comparison.
  127. A non-binary arithmetic coder partitions the set of valid code points
  128. into multiple pieces (one for each possible value of the coded symbol).
  129. This requires the encoder to compute two partition values, in general (for both
  130. the upper and lower bound of the symbol to encode).
  131. The decoder, on the other hand, must search the partitions for the one that
  132. contains the received code point.
  133. This requires computing at least O(log&nbsp;N) partition values.
  134. </t>
  135. <t>
  136. However, coding a parameter with N possible values with a binary arithmetic
  137. coder requires O(log&nbsp;N) symbols in the worst case (the only case
  138. that matters for hardware design).
  139. Hence, this does not represent any actual savings (indeed, it represents an
  140. increase in the number of partition values computed by the encoder).
  141. In addition, there are a number of overheads that are per-symbol, rather than
  142. per-value.
  143. For example, renormalization (which enlarges the set of valid code points after
  144. partitioning has reduced it too much), carry propagation (to deal with the
  145. case where the high and low ends of a partition straddle a bit boundary),
  146. etc., are all performed on a symbol-by-symbol basis.
  147. Since a non-binary arithmetic coder codes a given set of values with fewer
  148. symbols than a binary one, it incurs these per-symbol overheads less often.
  149. This suggests that a non-binary arithmetic coder can actually be more efficient
  150. than a binary one.
  151. </t>
  152. </section>
  153. <section anchor="nonbinary_modeling" title="Non-binary Context Modeling">
  154. <t>
  155. The other aspect that binary coding simplifies is probability modeling.
  156. In arithmetic coding, the size of the sets the code points are partitioned into
  157. are (roughly) proportional to the probability of each possible symbol value.
  158. Estimating these probabilities is part of the coding process, though it can be
  159. cleanly separated from the task of actually producing the coded bits.
  160. In a binary arithmetic coder, this requires estimating the probability of only
  161. one of the two possible values (since the total probability is 1.0).
  162. This is often done with a simple table lookup that maps the old probability and
  163. the most recently decoded symbol to a new probability to use for the next
  164. symbol in the current context.
  165. The trade-off, of course, is that non-binary symbols must be "binarized" into
  166. a series of bits, and a context (with an associated probability) chosen for
  167. each one.
  168. </t>
  169. <t>
  170. In a non-binary arithmetic coder, the decoder must compute at least
  171. O(log&nbsp;N) cumulative probabilities (one for each partition value it
  172. needs).
  173. Because these probabilities are usually not estimated directly in "cumulative"
  174. form, this can require computing (N&nbsp;-&nbsp;1) non-cumulative probability
  175. values.
  176. Unless N is very small, these cannot be updated with a single table lookup.
  177. The normal approach is to use "frequency counts".
  178. Define the frequency of value k to be
  179. <figure align="center">
  180. <artwork align="center"><![CDATA[
  181. f[k] = A*<the number of times k has been observed> + B
  182. ]]></artwork>
  183. </figure>
  184. where A and B are parameters (usually A=2 and B=1 for a traditional
  185. Krichevsky-Trofimov estimator).
  186. The resulting probability, p[k], is given by
  187. <figure align="center">
  188. <artwork align="center"><![CDATA[
  189. N-1
  190. __
  191. ft = \ f[k]
  192. /_
  193. k=0
  194. f[k]
  195. p[k] = ----
  196. ft
  197. ]]></artwork>
  198. </figure>
  199. When ft grows too large, the frequencies are rescaled (e.g., halved, rounding
  200. up to prevent reduction of a probability to 0).
  201. </t>
  202. <t>
  203. When ft is not a power of two, partitioning the code points requires actual
  204. divisions (see <xref target="RFC6716"/> Section&nbsp;4.1 for one detailed
  205. example of exactly how this is done).
  206. These divisions are acceptable in an audio codec like
  207. Opus&nbsp;<xref target="RFC6716"/>, which only has to code a few hundreds of
  208. these symbols per second.
  209. But video requires hundreds of thousands of symbols per second, at a minimum,
  210. and divisions are still very expensive to implement in hardware.
  211. </t>
  212. <t>
  213. There are two possible approaches to this.
  214. One is to come up with a replacement for frequency counts that produces
  215. probabilities that sum to a power of two.
  216. Some possibilities, which can be applied individually or in combination:
  217. <list style="numbers">
  218. <t>
  219. Use probabilities that are fixed for the duration of a frame.
  220. This is the approach taken by VP8, for example, even though it uses a binary
  221. arithmetic coder.
  222. In fact, it is possible to convert many of VP8's existing binary-alphabet
  223. probabilities into probabilities for non-binary alphabets, an approach that is
  224. used in the experiment presented at the end of this section.
  225. </t>
  226. <t>
  227. Use parametric distributions.
  228. For example, DCT coefficient magnitudes usually have an approximately
  229. exponential distribution.
  230. This distribution can be characterized by a single parameter, e.g., the
  231. expected value.
  232. The expected value is trivial to update after decoding a coefficient.
  233. For example
  234. <figure align="center">
  235. <artwork align="center"><![CDATA[
  236. E[x[n+1]] = E[x[n]] + floor(C*(x[n] - E[x[n]]))
  237. ]]></artwork>
  238. </figure>
  239. produces an exponential moving average with a decay factor of
  240. (1&nbsp;-&nbsp;C).
  241. For a choice of C that is a negative power of two (e.g., 1/16 or 1/32 or
  242. similar), this can be implemented with two adds and a shift.
  243. Given this expected value, the actual distribution to use can be obtained from
  244. a small set of pre-computed distributions via a lookup table.
  245. Linear interpolation between these pre-computed values can improve accuracy, at
  246. the cost of O(N) computations, but if N is kept small this is trivially
  247. parallelizable, in SIMD or otherwise.
  248. </t>
  249. <t>
  250. Change the frequency count update mechanism so that ft is constant.
  251. For example, let
  252. <figure align="center">
  253. <artwork align="center"><![CDATA[
  254. k-1
  255. __
  256. fl[k] = \ f[i]
  257. /_
  258. i=0
  259. ]]></artwork>
  260. </figure>
  261. be the cumulative frequency of all symbol values less than k and
  262. <figure align="center">
  263. <artwork align="center"><![CDATA[
  264. ( 0, k <= i
  265. e[i][k] = <
  266. ( 1, k > i
  267. ]]></artwork>
  268. </figure>
  269. be the elementary change in the cumulative frequency count fl[k] caused by
  270. adding 1 to f[i].
  271. Then one possible update formula after decoding the value i is
  272. <figure align="center">
  273. <artwork align="center"><![CDATA[
  274. fl[k]' = fl[k] - floor(D*fl[k]) + k + F*e[i][k]
  275. ]]></artwork>
  276. </figure>
  277. where D is a negative power of two chosen such that
  278. floor(D*ft)&nbsp;==&nbsp;(N&nbsp;+&nbsp;F)&nbsp;.
  279. This ensures that ft&nbsp;==&nbsp;fl[N]&nbsp;==&nbsp;fl[N]' is a constant.
  280. This requires O(N) operations, but the arithmetic is very simple (given the
  281. freedom to choose D and F, and to some extent N), and trivially
  282. parallelizable, in SIMD or otherwise.
  283. The downside is the addition of the value k at each step.
  284. This is necessary to ensure that the probability of an individual symbol
  285. (fl[k+1]&nbsp;-&nbsp;fl[k]) is never reduced to zero.
  286. However it is equivalent to mixing in a uniform distribution with counts that
  287. are otherwise an exponential moving average.
  288. That means that ft and F must be sufficiently large, or there will be an
  289. adverse impact on coding efficiency.
  290. The upside is that F*e[i] may be replaced by any monotonically non-decreasing
  291. vector whose Nth element is F.
  292. That is, instead of just incrementing the probability of symbol i, it can
  293. increase the probability of values that are highly correlated with i.
  294. E.g., this allows decoding value i to apply a small probability increase
  295. to the neighboring values (i&nbsp;-&nbsp;1) and (i&nbsp;+&nbsp;1), in addition
  296. to a large probability increase to the value i.
  297. This may help, for example, in motion vector coding, and is much more sensible
  298. than the approach taken with binary context modeling, which often does things
  299. like "increase the probability of all even values when decoding a 6" because
  300. the same context is always used to code the least significant bit.
  301. </t>
  302. </list>
  303. </t>
  304. <t>
  305. The other approach is to change the function used to partition the set of valid
  306. code points so that it does not need a division, even when ft is not a power
  307. of two.
  308. Let the range of valid code points in the current arithmetic coder state be
  309. [L,&nbsp;L&nbsp;+&nbsp;R), where L is the lower bound of the range and R is
  310. the number of valid code points.
  311. Assume that ft&nbsp;&lt;=&nbsp;R&nbsp;&lt;&nbsp;2*ft (this is easy to enforce
  312. with the normal rescaling operations used with frequency counts).
  313. Then one possible partition function is
  314. <figure align="center">
  315. <artwork align="center"><![CDATA[
  316. r[k] = fl[k] + min(fl[k], R - ft)
  317. ]]></artwork>
  318. </figure>
  319. so that the new range after coding symbol k is
  320. [L&nbsp;+&nbsp;r[k],&nbsp;L&nbsp;+&nbsp;r[k+1]).
  321. </t>
  322. <t>
  323. This is a variation of the partition function proposed
  324. by&nbsp;<xref target="SM98"/>.
  325. The size of the new partition (r[k+1]&nbsp;-&nbsp;r[k]) is no longer truly
  326. proportional to R*p[k].
  327. It can be off by up to a factor of 2, implying a peak error as large as one bit
  328. per symbol.
  329. However, if the probabilities are accurate and the symbols being coded are
  330. independent, the average inefficiency introduced will be as low as
  331. log2(log2(e)*2/e)&nbsp;~=&nbsp;0.0861 bits per symbol.
  332. This error can, of course, be reduced by coding fewer symbols with larger
  333. alphabets.
  334. In practice the overhead is roughly equal to the overhead introduced by other
  335. approximate arithmetic coders like H.264's CABAC.
  336. </t>
  337. </section>
  338. <section anchor="entropy_experiment" title="Simple Experiment">
  339. <t>
  340. As a simple experiment to validate the non-binary approach, we compared a
  341. non-binary arithmetic coder to the VP8 (binary) entropy coder.
  342. This was done by instrumenting vp8_treed_read() in libvpx to dump out the
  343. symbol decoded and the associated probabilities used to decode it.
  344. This data only includes macroblock mode and motion vector information, as the
  345. DCT token data is decoded with custom inline functions, and not
  346. vp8_treed_read().
  347. This data is available at
  348. <eref target="https://people.xiph.org/~tterribe/daala/ec_test0/ec_tokens.txt"/>.
  349. It includes 1,019,670&nbsp;values encode using 2,125,995&nbsp;binary symbols
  350. (or 2.08&nbsp;symbols per value).
  351. We expect that with a conscious effort to group symbols during the codec
  352. design, this average could easily be increased.
  353. </t>
  354. <t>
  355. We then implemented both the regular VP8 entropy decoder (in plain C, using all
  356. of the optimizations available in libvpx at the time) and a multisymbol
  357. entropy decoder (also in plain C, using similar optimizations), which encodes
  358. each value with a single symbol.
  359. For the decoder partition search in the non-binary decoder, we used a simple
  360. for loop (O(N) worst-case), even though this could be made constant-time and
  361. branchless with a few SIMD instructions such as (on x86) PCMPGTW, PACKUSWB,
  362. and PMOVMASKB followed by BSR.
  363. The source code for both implementations is available at
  364. <eref target="https://people.xiph.org/~tterribe/daala/ec_test0/ec_test.c"/>
  365. (compile with -DEC_BINARY for the binary version and -DEC_MULTISYM for the
  366. non-binary version).
  367. </t>
  368. <t>
  369. The test simply loads the tokens, and then loops 1024 times encoding them using
  370. the probabilities provided, and then decoding them.
  371. The loop was added to reduce the impact of the overhead of loading the data,
  372. which is implemented very inefficiently.
  373. The total runtime on a Core i7 from 2010 is 53.735&nbsp;seconds for the binary
  374. version, and 27.937&nbsp;seconds for the non-binary version, or a 1.92x
  375. improvement.
  376. This is very nearly equal to the number of symbols per value in the binary
  377. coder, suggesting that the per-symbol overheads account for the vast majority
  378. of the computation time in this implementation.
  379. </t>
  380. </section>
  381. </section>
  382. <section anchor="reversible_integer_transforms"
  383. title="Reversible Integer Transforms">
  384. <t>
  385. Integer transforms in image and video coding date back to at least
  386. 1969&nbsp;<xref target="PKA69"/>.
  387. Although standards such as MPEG2 and MPEG4 Part&nbsp;2 allow some flexibility
  388. in the transform implementation, implementations were subject to drift and
  389. error accumulation, and encoders had to impose special macroblock refresh
  390. requirements to avoid these problems, not always successfully.
  391. As transforms in modern codecs only account for on the order of 10% of the
  392. total decoder complexity, and, with the use of weighted prediction with gains
  393. greater than unity and intra prediction, are far more susceptible to drift and
  394. error accumulation, it no longer makes sense to allow a non-exact transform
  395. specification.
  396. </t>
  397. <t>
  398. However, it is also possible to make such transforms "reversible", in the sense
  399. that applying the inverse transform to the result of the forward transform
  400. gives back the original input values, exactly.
  401. This gives a lossy codec, which normally quantizes the coefficients before
  402. feeding them into the inverse transform, the ability to scale all the way to
  403. lossless compression without requiring any new coding tools.
  404. This approach has been used successfully by JPEG XR, for
  405. example&nbsp;<xref target="TSSRM08"/>.
  406. </t>
  407. <t>
  408. Such reversible transforms can be constructed using "lifting steps", a series
  409. of shear operations that can represent any set of plane rotations, and thus
  410. any orthogonal transform.
  411. This approach dates back to at least 1992&nbsp;<xref target="BE92"/>, which
  412. used it to implement a four-point 1-D Discrete Cosine Transform (DCT).
  413. Their implementation requires 6&nbsp;multiplications, 10&nbsp;additions,
  414. 2&nbsp;shifts, and 2&nbsp;negations, and produces output that is a factor of
  415. sqrt(2) larger than the orthonormal version of the transform.
  416. The expansion of the dynamic range directly translates into more bits to code
  417. for lossless compression.
  418. Because the least significant bits are usually very nearly random noise, this
  419. scaling increases the coding cost by approximately half a bit per sample.
  420. </t>
  421. <section anchor="lifting_steps" title="Lifting Steps">
  422. <t>
  423. To demonstrate the idea of lifting steps, consider the two-point transform
  424. <figure align="center">
  425. <artwork align="center"><![CDATA[
  426. ___
  427. [ y0 ] / 1 [ 1 1 ] [ x0 ]
  428. [ ] = / --- [ ] [ ]
  429. [ y1 ] v 2 [ -1 1 ] [ x1 ]
  430. ]]></artwork>
  431. </figure>
  432. This can be implemented up to scale via
  433. <figure align="center">
  434. <artwork align="center"><![CDATA[
  435. y0 = x0 + x1
  436. y1 = 2*x1 - y0
  437. ]]></artwork>
  438. </figure>
  439. and reversed via
  440. <figure align="center">
  441. <artwork align="center"><![CDATA[
  442. x1 = (y0 + y1) >> 1
  443. x0 = y0 - x1
  444. ]]></artwork>
  445. </figure>
  446. </t>
  447. <t>
  448. Both y0 and y1 are too large by a factor of sqrt(2), however.
  449. </t>
  450. <t>
  451. It is also possible to implement any rotation by an angle t, including the
  452. orthonormal scale factor, by decomposing it into three steps:
  453. <figure align="center">
  454. <artwork align="center"><![CDATA[
  455. cos(t) - 1
  456. u0 = x0 + ---------- * x1
  457. sin(t)
  458. y1 = x1 + sin(t)*u0
  459. cos(t) - 1
  460. y0 = u0 + ---------- * y1
  461. sin(t)
  462. ]]></artwork>
  463. </figure>
  464. By letting t=-pi/4, we get an implementation of the first transform that
  465. includes the scaling factor.
  466. To get an integer approximation of this transform, we need only replace the
  467. transcendental constants by fixed-point approximations:
  468. <figure align="center">
  469. <artwork align="center"><![CDATA[
  470. u0 = x0 + ((27*x1 + 32) >> 6)
  471. y1 = x1 - ((45*u0 + 32) >> 6)
  472. y0 = u0 + ((27*y1 + 32) >> 6)
  473. ]]></artwork>
  474. </figure>
  475. This approximation is still perfectly reversible:
  476. <figure align="center">
  477. <artwork align="center"><![CDATA[
  478. u0 = y0 - ((27*y1 + 32) >> 6)
  479. x1 = y1 + ((45*u0 + 32) >> 6)
  480. x0 = u0 - ((27*x1 + 32) >> 6)
  481. ]]></artwork>
  482. </figure>
  483. Each of the three steps can be implemented using just two ARM instructions,
  484. with constants that have up to 14&nbsp;bits of precision (though using fewer
  485. bits allows more efficient hardware implementations, at a small cost in coding
  486. gain).
  487. However, it is still much more complex than the first approach.
  488. </t>
  489. <t>
  490. We can get a compromise with a slight modification:
  491. <figure align="center">
  492. <artwork align="center"><![CDATA[
  493. y0 = x0 + x1
  494. y1 = x1 - (y0 >> 1)
  495. ]]></artwork>
  496. </figure>
  497. This still only implements the original orthonormal transform up to scale.
  498. The y0 coefficient is too large by a factor of sqrt(2) as before, but y1 is now
  499. too small by a factor of sqrt(2).
  500. If our goal is simply to (optionally quantize) and code the result, this is
  501. good enough.
  502. The different scale factors can be incorporated into the quantization matrix in
  503. the lossy case, and the total expansion is roughly equivalent to that of the
  504. orthonormal transform in the lossless case.
  505. Plus, we can perform each step with just one ARM instruction.
  506. </t>
  507. <t>
  508. However, if instead we want to apply additional transformations to the data, or
  509. use the result to predict other data, it becomes much more convenient to have
  510. uniformly scaled outputs.
  511. For a two-point transform, there is little we can do to improve on the
  512. three-multiplications approach above.
  513. However, for a four-point transform, we can use the last approach and arrange
  514. multiple transform stages such that the "too large" and "too small" scaling
  515. factors cancel out, producing a result that has the true, uniform, orthonormal
  516. scaling.
  517. To do this, we need one more tool, which implements the following transform:
  518. <figure align="center">
  519. <artwork align="center"><![CDATA[
  520. ___
  521. [ y0 ] / 1 [ cos(t) -sin(t) ] [ 1 0 ] [ x0 ]
  522. [ ] = / --- [ ] [ ] [ ]
  523. [ y1 ] v 2 [ sin(t) cos(t) ] [ 0 2 ] [ x1 ]
  524. ]]></artwork>
  525. </figure>
  526. This takes unevenly scaled inputs, rescales them, and then rotates them.
  527. Like an ordinary rotation, it can be reduced to three lifting steps:
  528. <figure align="center">
  529. <artwork align="center"><![CDATA[
  530. _
  531. 2*cos(t) - v2
  532. u0 = x0 + ------------- * x1
  533. sin(t)
  534. ___
  535. / 1
  536. y1 = x1 + / --- * sin(t)*u0
  537. v 2
  538. _
  539. cos(t) - v2
  540. y0 = u0 + ----------- * y1
  541. sin(t)
  542. ]]></artwork>
  543. </figure>
  544. As before, the transcendental constants may be replaced by fixed-point
  545. approximations without harming the reversibility property.
  546. </t>
  547. </section>
  548. <section anchor="four_point_transform" title="4-Point Transform">
  549. <t>
  550. Using the tools from the previous section, we can design a reversible integer
  551. four-point DCT approximation with uniform, orthonormal scaling.
  552. This requires 3&nbsp;multiplies, 9&nbsp;additions, and 2&nbsp;shifts (not
  553. counting the shift and rounding offset used in the fixed-point multiplies, as
  554. these are built into the multiplier).
  555. This is significantly cheaper than the&nbsp;<xref target="BE92"/> approach, and
  556. the output scaling is smaller by a factor of sqrt(2), saving half a bit per
  557. sample in the lossless case.
  558. By comparison, the four-point forward DCT approximation used in VP9, which is
  559. not reversible, uses 6&nbsp;multiplies, 6&nbsp;additions, and 2 shifts
  560. (counting shifts and rounding offsets which cannot be merged into a single
  561. multiply instruction on ARM).
  562. Four of its multipliers also require 28-bit accumulators, whereas this proposal
  563. can use much smaller multipliers without giving up the reversibility property.
  564. The total dynamic range expansion is 1&nbsp;bit: inputs in the range [-256,255)
  565. produce transformed values in the range [-512,510).
  566. This is the smallest dynamic range expansion possible for any reversible
  567. transform constructed from mostly-linear operations.
  568. It is possible to make reversible orthogonal transforms with no dynamic range
  569. expansion by using "piecewise-linear" rotations&nbsp;<xref target="SLD04"/>,
  570. but each step requires a large number of operations in a software
  571. implementation.
  572. </t>
  573. <t>
  574. Pseudo-code for the forward transform follows:
  575. <figure align="left">
  576. <artwork align="left"><![CDATA[
  577. Input: x0, x1, x2, x3
  578. Output: y0, y1, y2, y3
  579. /* Rotate (x3, x0) by -pi/4, asymmetrically scaled output. */
  580. t3 = x0 - x3
  581. t0 = x0 - (t3 >> 1)
  582. /* Rotate (x1, x2) by pi/4, asymmetrically scaled output. */
  583. t2 = x1 + x2
  584. t2h = t2 >> 1
  585. t1 = t2h - x2
  586. /* Rotate (t2, t0) by -pi/4, asymmetrically scaled input. */
  587. y0 = t0 + t2h
  588. y2 = y0 - t2
  589. /* Rotate (t3, t1) by 3*pi/8, asymmetrically scaled input. */
  590. t3 = t3 - (45*t1 + 32 >> 6)
  591. y1 = t1 + (21*t3 + 16 >> 5)
  592. y3 = t3 - (71*y1 + 32 >> 6)
  593. ]]></artwork>
  594. </figure>
  595. Even though there are three asymmetrically scaled rotations by pi/4, by careful
  596. arrangement we can share one of the shift operations (to help software
  597. implementations: shifts by a constant are basically free in hardware).
  598. This technique can be used to even greater effect in larger transforms.
  599. </t>
  600. <t>
  601. The inverse transform is constructed by simply undoing each step in turn:
  602. <figure align="left">
  603. <artwork align="left"><![CDATA[
  604. Input: y0, y1, y2, y3
  605. Output: x0, x1, x2, x3
  606. /* Rotate (y3, y1) by -3*pi/8, asymmetrically scaled output. */
  607. t3 = y3 + (71*y1 + 32 >> 6)
  608. t1 = y1 - (21*t3 + 16 >> 5)
  609. t3 = t3 + (45*t1 + 32 >> 6)
  610. /* Rotate (y2, y0) by pi/4, asymmetrically scaled output. */
  611. t2 = y0 - y2
  612. t2h = t2 >> 1
  613. t0 = y0 - t2h
  614. /* Rotate (t1, t2) by -pi/4, asymmetrically scaled input. */
  615. x2 = t2h - t1
  616. x1 = t2 - x2
  617. /* Rotate (x3, x0) by pi/4, asymmetrically scaled input. */
  618. x0 = t0 - (t3 >> 1)
  619. x3 = x0 - t3
  620. ]]></artwork>
  621. </figure>
  622. </t>
  623. <t>
  624. Although the right shifts make this transform non-linear, we can compute
  625. "basis functions" for it by sending a vector through it with a single value
  626. set to a large constant (256 was used here), and the rest of the values set to
  627. zero.
  628. The true basis functions for a four-point DCT (up to five digits) are
  629. <figure align="left">
  630. <artwork align="left"><![CDATA[
  631. [ y0 ] [ 0.50000 0.50000 0.50000 0.50000 ] [ x0 ]
  632. [ y1 ] = [ 0.65625 0.26953 -0.26953 -0.65625 ] [ x1 ]
  633. [ y2 ] [ 0.50000 -0.50000 -0.50000 0.50000 ] [ x2 ]
  634. [ y3 ] [ 0.27344 -0.65234 0.65234 -0.27344 ] [ x3 ]
  635. ]]></artwork>
  636. </figure>
  637. The corresponding basis functions for our reversible, integer DCT, computed
  638. using the approximation described above, are
  639. <figure align="left">
  640. <artwork align="left"><![CDATA[
  641. [ y0 ] [ 0.50000 0.50000 0.50000 0.50000 ] [ x0 ]
  642. [ y1 ] = [ 0.65328 0.27060 -0.27060 -0.65328 ] [ x1 ]
  643. [ y2 ] [ 0.50000 -0.50000 -0.50000 0.50000 ] [ x2 ]
  644. [ y3 ] [ 0.27060 -0.65328 0.65328 -0.27060 ] [ x3 ]
  645. ]]></artwork>
  646. </figure>
  647. The mean squared error (MSE) of the output, compared to a true DCT, can be
  648. computed with some assumptions about the input signal.
  649. Let G be the true DCT basis and G' be the basis for our integer approximation
  650. (computed as described above).
  651. Then the error in the transformed results is
  652. <figure align="left">
  653. <artwork align="left"><![CDATA[
  654. e = G.x - G'.x = (G - G').x = D.x
  655. ]]></artwork>
  656. </figure>
  657. where D&nbsp;=&nbsp;(G&nbsp;-&nbsp;G')&nbsp;.
  658. The MSE is then&nbsp;<xref target="Que98"/>
  659. <figure align="left">
  660. <artwork align="left"><![CDATA[
  661. 1 1
  662. - * E[e^T.e] = - * E[x^T.D^T.D.x]
  663. N N
  664. 1
  665. = - * E[tr(D.x.x^T.D^T)]
  666. N
  667. 1
  668. = - * E[tr(D.Rxx.D^T)]
  669. N
  670. ]]></artwork>
  671. </figure>
  672. where Rxx is the autocorrelation matrix of the input signal.
  673. Assuming the input is a zero-mean, first-order autoregressive (AR(1)) process
  674. gives an autocorrelation matrix of
  675. <figure align="left">
  676. <artwork align="left"><![CDATA[
  677. |i - j|
  678. Rxx[i,j] = rho
  679. ]]></artwork>
  680. </figure>
  681. for some correlation coefficient rho.
  682. A value of rho&nbsp;=&nbsp;0.95 is typical for image compression applications.
  683. Smaller values are more normal for motion-compensated frame differences, but
  684. this makes surprisingly little difference in transform design.
  685. Using the above procedure, the theoretical MSE of this approximation is
  686. 1.230E-6, which is below the level of the truncation error introduced by the
  687. right shift operations.
  688. This suggests the dynamic range of the input would have to be more than
  689. 20&nbsp;bits before it became worthwhile to increase the precision of the
  690. constants used in the multiplications to improve accuracy, though it may be
  691. worth using more precision to reduce bias.
  692. </t>
  693. </section>
  694. <section anchor="larger_transforms" title="Larger Transforms">
  695. <t>
  696. The same techniques can be applied to construct a reversible eight-point DCT
  697. approximation with uniform, orthonormal scaling using 15&nbsp;multiplies,
  698. 31&nbsp;additions, and 5&nbsp;shifts.
  699. It is possible to reduce this to 11&nbsp;multiplies and 29&nbsp;additions,
  700. which is the minimum number of multiplies possible for an eight-point DCT with
  701. uniform scaling&nbsp;<xref target="LLM89"/>, by introducing a scaling factor
  702. of sqrt(2), but this harms lossless performance.
  703. The dynamic range expansion is 1.5&nbsp;bits (again the smallest possible), and
  704. the MSE is 1.592E-06.
  705. By comparison, the eight-point transform in VP9 uses 12&nbsp;multiplications,
  706. 32&nbsp;additions, and 6 shifts.
  707. </t>
  708. <t>
  709. Similarly, we have constructed a reversible sixteen-point DCT approximation
  710. with uniform, orthonormal scaling using 33&nbsp;multiplies, 83&nbsp;additions,
  711. and 16&nbsp;shifts.
  712. This is just 2&nbsp;multiplies and 2&nbsp;additions more than the
  713. (non-reversible, non-integer, but uniformly scaled) factorization
  714. in&nbsp;<xref target="LLM89"/>.
  715. By comparison, the sixteen-point transform in VP9 uses 44&nbsp;multiplies,
  716. 88&nbsp;additions, and 18&nbsp;shifts.
  717. The dynamic range expansion is only 2&nbsp;bits (again the smallest possible),
  718. and the MSE is 1.495E-5.
  719. </t>
  720. <t>
  721. We also have a reversible 32-point DCT approximation with uniform,
  722. orthonormal scaling using 87&nbsp;multiplies, 215&nbsp;additions, and
  723. 38&nbsp;shifts.
  724. By comparison, the 32-point transform in VP9 uses 116&nbsp;multiplies,
  725. 194&nbsp;additions, and 66&nbsp;shifts.
  726. Our dynamic range expansion is still the minimal 2.5&nbsp;bits, and the MSE is
  727. 8.006E-05
  728. </t>
  729. <t>
  730. Code for all of these transforms is available in the development repository
  731. listed in&nbsp;<xref target="development_repository"/>.
  732. </t>
  733. </section>
  734. <section anchor="hadamard_transforms" title="Walsh-Hadamard Transforms">
  735. <t>
  736. These techniques can also be applied to constructing Walsh-Hadamard
  737. Transforms, another useful transform family that is cheaper to implement than
  738. the DCT (since it requires no multiplications at all).
  739. The WHT has many applications as a cheap way to approximately change the time
  740. and frequency resolution of a set of data (either individual bands, as in the
  741. Opus audio codec, or whole blocks).
  742. VP9 uses it as a reversible transform with uniform, orthonormal scaling for
  743. lossless coding in place of its DCT, which does not have these properties.
  744. </t>
  745. <t>
  746. Applying a 2x2 WHT to a block of 2x2 inputs involves running a 2-point WHT on
  747. the rows, and then another 2-point WHT on the columns.
  748. The basis functions for the 2-point WHT are, up to scaling, [1,&nbsp;1] and
  749. [1,&nbsp;-1].
  750. The four variations of a two-step lifer given in
  751. <xref target="lifting_steps"/> are exactly the lifting steps needed to
  752. implement a 2x2 WHT: two stages that produce asymmetrically scaled outputs
  753. followed by two stages that consume asymmetrically scaled inputs.
  754. <figure align="left">
  755. <artwork align="left"><![CDATA[
  756. Input: x00, x01, x10, x11
  757. Output: y00, y01, y10, y11
  758. /* Transform rows */
  759. t1 = x00 - x01
  760. t0 = x00 - (t1 >> 1) /* == (x00 + x01)/2 */
  761. t2 = x10 + x11
  762. t3 = (t2 >> 1) - x11 /* == (x10 - x11)/2 */
  763. /* Transform columns */
  764. y00 = t0 + (t2 >> 1) /* == (x00 + x01 + x10 + x11)/2 */
  765. y10 = y00 - t2 /* == (x00 + x01 - x10 - x11)/2 */
  766. y11 = (t1 >> 1) - t3 /* == (x00 - x01 - x10 + x11)/2 */
  767. y01 = t1 - y11 /* == (x00 - x01 + x10 - x11)/2 */
  768. ]]></artwork>
  769. </figure>
  770. </t>
  771. <t>
  772. By simply re-ordering the operations, we can see that there are two shifts that
  773. may be shared between the two stages:
  774. <figure align="left">
  775. <artwork align="left"><![CDATA[
  776. Input: x00, x01, x10, x11
  777. Output: y00, y01, y10, y11
  778. t1 = x00 - x01
  779. t2 = x10 + x11
  780. t0 = x00 - (t1 >> 1) /* == (x00 + x01)/2 */
  781. y00 = t0 + (t2 >> 1) /* == (x00 + x01 + x10 + x11)/2 */
  782. t3 = (t2 >> 1) - x11 /* == (x10 - x11)/2 */
  783. y11 = (t1 >> 1) - t3 /* == (x00 - x01 - x10 + x11)/2 */
  784. y10 = y00 - t2 /* == (x00 + x01 - x10 - x11)/2 */
  785. y01 = t1 - y11 /* == (x00 - x01 + x10 - x11)/2 */
  786. ]]></artwork>
  787. </figure>
  788. </t>
  789. <t>
  790. By eliminating the double-negation of x11 and re-ordering the additions to it,
  791. we can see even more operations in common:
  792. <figure align="left">
  793. <artwork align="left"><![CDATA[
  794. Input: x00, x01, x10, x11
  795. Output: y00, y01, y10, y11
  796. t1 = x00 - x01
  797. t2 = x10 + x11
  798. t0 = x00 - (t1 >> 1) /* == (x00 + x01)/2 */
  799. y00 = t0 + (t2 >> 1) /* == (x00 + x01 + x10 + x11)/2 */
  800. t3 = x11 + (t1 >> 1) /* == x11 + (x00 - x01)/2 */
  801. y11 = t3 - (t2 >> 1) /* == (x00 - x01 - x10 + x11)/2 */
  802. y10 = y00 - t2 /* == (x00 + x01 - x10 - x11)/2 */
  803. y01 = t1 - y11 /* == (x00 - x01 + x10 - x11)/2 */
  804. ]]></artwork>
  805. </figure>
  806. </t>
  807. <t>
  808. Simplifying further, the whole transform may be computed with just
  809. 7&nbsp;additions and 1&nbsp;shift:
  810. <figure align="left">
  811. <artwork align="left"><![CDATA[
  812. Input: x00, x01, x10, x11
  813. Output: y00, y01, y10, y11
  814. t1 = x00 - x01
  815. t2 = x10 + x11
  816. t4 = (t2 - t1) >> 1 /* == (-x00 + x01 + x10 + x11)/2 */
  817. y00 = x00 + t4 /* == (x00 + x01 + x10 + x11)/2 */
  818. y11 = x11 - t4 /* == (x00 - x01 - x10 + x11)/2 */
  819. y10 = y00 - t2 /* == (x00 + x01 - x10 - x11)/2 */
  820. y01 = t1 - y11 /* == (x00 - x01 + x10 - x11)/2 */
  821. ]]></artwork>
  822. </figure>
  823. </t>
  824. <t>
  825. This is a significant savings over other approaches described in the
  826. literature, which require 8&nbsp;additions, 2&nbsp;shifts, and
  827. 1&nbsp;negation&nbsp;<xref target="FOIK99"/> (37.5%&nbsp;more operations), or
  828. 10&nbsp;additions, 1&nbsp;shift, and
  829. 2&nbsp;negations&nbsp;<xref target="TSSRM08"/> (62.5%&nbsp;more operations).
  830. The same operations can be applied to compute a 4-point WHT in one dimension.
  831. This implementation is used in this way in VP9's lossless mode.
  832. Since larger WHTs may be trivially factored into multiple smaller WHTs, the
  833. same approach can implement a reversible, orthonormally scaled WHT of any size
  834. (2**N)x(2**M), so long as (N&nbsp;+&nbsp;M) is even.
  835. </t>
  836. </section>
  837. </section>
  838. <section anchor="development_repository" title="Development Repository">
  839. <t>
  840. The tools presented here were developed as part of Xiph.Org's Daala project.
  841. They are available, along with many others in greater and lesser states of
  842. maturity, in the Daala git repository at
  843. <eref target="https://git.xiph.org/daala.git"/>.
  844. See <eref target="https://xiph.org/daala/"/> for more information.
  845. </t>
  846. </section>
  847. <section title="IANA Considerations">
  848. <t>
  849. This document has no actions for IANA.
  850. </t>
  851. </section>
  852. <section anchor="Acknowledgments" title="Acknowledgments">
  853. <t>
  854. Thanks to Nathan Egge, Gregory Maxwell, and Jean-Marc Valin for their
  855. assistance in the implementation and experimentation, and in preparing this
  856. draft.
  857. </t>
  858. </section>
  859. </middle>
  860. <back>
  861. <!--references title="Normative References">
  862. <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?>
  863. </references-->
  864. <references title="Informative References">
  865. <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6386.xml"?>
  866. <?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6716.xml"?>
  867. <reference anchor="BE92">
  868. <front>
  869. <title>New Networks for Perfect Inversion and Perfect Reconstruction</title>
  870. <author initials="F.A.M.L." surname="Bruekers"
  871. fullname="Fons A.M.L. Bruekers"/>
  872. <author initials="A.W.M." surname="van den Enden"
  873. fullname="Ad W.M. van den Enden"/>
  874. <date month="January" year="1992"/>
  875. </front>
  876. <seriesInfo name="IEEE Journal on Selected Areas in Communication"
  877. value="10(1):129--137"/>
  878. </reference>
  879. <reference anchor="FOIK99">
  880. <front>
  881. <title>Lossless 8-point Fast Discrete Cosine Transform Using Lossless
  882. Hadamard Transform</title>
  883. <author initials="S." surname="Fukuma" fullname="Shinji Fukuma"/>
  884. <author initials="K." surname="Oyama" fullname="Koichi Oyama"/>
  885. <author initials="M." surname="Iwahashi" fullname="Masahiro Iwahashi"/>
  886. <author initials="N." surname="Kambayashi" fullname="Noriyoshi Kambayashi"/>
  887. <date month="October" year="1999"/>
  888. </front>
  889. <seriesInfo name="Technical Report"
  890. value="The Institute of Electronics, Information, and Communication Engineers
  891. of Japan"/>
  892. </reference>
  893. <reference anchor="LLM89">
  894. <front>
  895. <title>Practical Fast 1-D DCT Algorithms with 11 Multiplications</title>
  896. <author initials="C." surname="Loeffler" fullname="Christoph Loeffler"/>
  897. <author initials="A." surname="Ligtenberg" fullname="Adriaan Ligtenberg"/>
  898. <author initials="G.S." surname="Moschytz" fullname="George S. Moschytz"/>
  899. <date month="May" year="1989"/>
  900. </front>
  901. <seriesInfo name="Proc. Acoustics, Speech, and Signal Processing (ICASSP'89)"
  902. value="vol. 2, pp. 988--991"/>
  903. </reference>
  904. <reference anchor="Pas76">
  905. <front>
  906. <title>Source Coding Algorithms for Fast Data Compression</title>
  907. <author initials="R.C." surname="Pasco" fullname="Richard C. Pasco"/>
  908. <date month="May" year="1976"/>
  909. </front>
  910. <seriesInfo name="Ph.D. Thesis"
  911. value="Dept. of Electrical Engineering, Stanford University"/>
  912. </reference>
  913. <reference anchor="PKA69">
  914. <front>
  915. <title>Hadamard Transform Image Coding</title>
  916. <author initials="W.K." surname="Pratt" fullname="W.K. Pratt"/>
  917. <author initials="J." surname="Kane" fullname="J. Kane"/>
  918. <author initials="H.C." surname="Andrews" fullname="H.C. Andrews"/>
  919. <date month="Jan" year="1969"/>
  920. </front>
  921. <seriesInfo name="Proc. IEEE" value="57(1):58--68"/>
  922. </reference>
  923. <reference anchor="Que98">
  924. <front>
  925. <title>On Unitary Transform Approximations</title>
  926. <author initials="R.L." surname="de Queiroz" fullname="Ricardo L. de Queiroz"/>
  927. <date month="Feb" year="1998"/>
  928. </front>
  929. <seriesInfo name="IEEE Signal Processing Letters" value="5(2):46--47"/>
  930. </reference>
  931. <reference anchor="SLD04">
  932. <front>
  933. <title>An Improved N-Bit to N-Bit Reversible Haar-Like Transform</title>
  934. <author initials="J.G." surname="Senecal" fullname="Joshua G. Senecal"/>
  935. <author initials="P." surname="Lindstrom" fullname="Peter Lindstrom"/>
  936. <author initials="M.A." surname="Duchaineau" fullname="Mark A. Duchaineau"/>
  937. <date month="October" year="2004"/>
  938. </front>
  939. <seriesInfo
  940. name="Proc. of the 12th Pacific Conference on Computer Graphics and Applications (PG'04)"
  941. value="pp. 371--380"/>
  942. </reference>
  943. <reference anchor="SM98">
  944. <front>
  945. <title>Piecewise Integer Mapping for Arithmetic Coding</title>
  946. <author initials="L." surname="Stuiver" fullname="Lang Stuiver"/>
  947. <author initials="A." surname="Moffat" fullname="Alistair Moffat"/>
  948. <date month="March/April" year="1998"/>
  949. </front>
  950. <seriesInfo name="Proc. of the 17th IEEE Data Compression Conference (DCC'98)"
  951. value="pp. 1--10"/>
  952. </reference>
  953. <reference anchor="TSSRM08">
  954. <front>
  955. <title>Low-complexity Hierarchical Lapped Transform for Lossy-to-Lossless
  956. Image Coding in JPEG XR/HD Photo</title>
  957. <author initials="C." surname="Tu" fullname="Chengjie Tu"/>
  958. <author initials="S." surname="Srinivasan" fullname="Sridhar Srinivasan"/>
  959. <author initials="G.J." surname="Sullivan" fullname="Gary J. Sullivan"/>
  960. <author initials="S." surname="Regunathan" fullname="Shankar Regunathan"/>
  961. <author initials="H.S." surname="Malvar" fullname="Henrique S. Malvar"/>
  962. <date month="August" year="2008"/>
  963. </front>
  964. <seriesInfo name="Applications of Digital Image Processing XXXI"
  965. value="vol 7073"/>
  966. </reference>
  967. </references>
  968. </back>
  969. </rfc>