Solved

What is Compression Gain?

Posted on 2004-04-05
1
283 Views
Last Modified: 2010-04-03
Can someone please tell me what is meant by compression gain.
I have compressed a text string with LZW, the efficiency before compression is 99.5% and after compression 92.3% using:
(Entropy / Av Codeword Length) * 100
It takes 50 bits to encode the data before compression and 60 bits after (so its not really worth compressing with this method).

So is the compression gain simply a bit value (ie 10 bits) or is it related to the efficiency (ie 99.5 - 92.3)

Thanks In Advance

Rick
0
Comment
Question by:jondow
1 Comment
 
LVL 1

Accepted Solution

by:
juliangkeller earned 50 total points
ID: 10760190
I don't know if this helps:

http://www.dogma.net/markn/articles/lzw/lzw.htm

It does refer to bits because it is compressing data. In some cases it is possibly to acheive 30% gain (i.e 100 bits to 70 bits) but is not for all data as you seen yourself that it can raise the bits and lower the percentage.  

You can see about that here:

http://64.233.167.104/search?q=cache:fd9kx-VFXPMJ:biron.usc.edu/~sagetong/Project_3.doc+LZW+compression+gain&hl=en&ie=UTF-8

http://66.102.7.104/search?q=cache:6UG4nkjb6ZUJ:www.cms.livjm.ac.uk/pgnet2003/submissions/Paper-13.Pdf+LZW+compression+gain&hl=en&ie=UTF-8

PAGE 4 ON THE RIGHT
most people don't use LZW because of this unless it is a large file and some in Unix because PKzip is not useful.

I hope this helps.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Finding original email is quite difficult due to their duplicates. From this article, you will come to know why multiple duplicates of same emails appear and how to delete duplicate emails from Outlook securely and instantly while vital emails remai…
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question