structure.txt 50 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943
  1. IJG JPEG LIBRARY: SYSTEM ARCHITECTURE
  2. Copyright (C) 1991-2013, Thomas G. Lane, Guido Vollbeding.
  3. This file is part of the Independent JPEG Group's software.
  4. For conditions of distribution and use, see the accompanying README file.
  5. This file provides an overview of the architecture of the IJG JPEG software;
  6. that is, the functions of the various modules in the system and the interfaces
  7. between modules. For more precise details about any data structure or calling
  8. convention, see the include files and comments in the source code.
  9. We assume that the reader is already somewhat familiar with the JPEG standard.
  10. The README file includes references for learning about JPEG. The file
  11. libjpeg.txt describes the library from the viewpoint of an application
  12. programmer using the library; it's best to read that file before this one.
  13. Also, the file coderules.txt describes the coding style conventions we use.
  14. In this document, JPEG-specific terminology follows the JPEG standard:
  15. A "component" means a color channel, e.g., Red or Luminance.
  16. A "sample" is a single component value (i.e., one number in the image data).
  17. A "coefficient" is a frequency coefficient (a DCT transform output number).
  18. A "block" is an array of samples or coefficients.
  19. An "MCU" (minimum coded unit) is an interleaved set of blocks of size
  20. determined by the sampling factors, or a single block in a
  21. noninterleaved scan.
  22. We do not use the terms "pixel" and "sample" interchangeably. When we say
  23. pixel, we mean an element of the full-size image, while a sample is an element
  24. of the downsampled image. Thus the number of samples may vary across
  25. components while the number of pixels does not. (This terminology is not used
  26. rigorously throughout the code, but it is used in places where confusion would
  27. otherwise result.)
  28. *** System features ***
  29. The IJG distribution contains two parts:
  30. * A subroutine library for JPEG compression and decompression.
  31. * cjpeg/djpeg, two sample applications that use the library to transform
  32. JFIF JPEG files to and from several other image formats.
  33. cjpeg/djpeg are of no great intellectual complexity: they merely add a simple
  34. command-line user interface and I/O routines for several uncompressed image
  35. formats. This document concentrates on the library itself.
  36. We desire the library to be capable of supporting all JPEG baseline, extended
  37. sequential, and progressive DCT processes. The library does not support the
  38. hierarchical or lossless processes defined in the standard.
  39. Within these limits, any set of compression parameters allowed by the JPEG
  40. spec should be readable for decompression. (We can be more restrictive about
  41. what formats we can generate.) Although the system design allows for all
  42. parameter values, some uncommon settings are not yet implemented and may
  43. never be; nonintegral sampling ratios are the prime example. Furthermore,
  44. we treat 8-bit vs. 12-bit data precision as a compile-time switch, not a
  45. run-time option, because most machines can store 8-bit pixels much more
  46. compactly than 12-bit.
  47. By itself, the library handles only interchange JPEG datastreams --- in
  48. particular the widely used JFIF file format. The library can be used by
  49. surrounding code to process interchange or abbreviated JPEG datastreams that
  50. are embedded in more complex file formats. (For example, libtiff uses this
  51. library to implement JPEG compression within the TIFF file format.)
  52. The library includes a substantial amount of code that is not covered by the
  53. JPEG standard but is necessary for typical applications of JPEG. These
  54. functions preprocess the image before JPEG compression or postprocess it after
  55. decompression. They include colorspace conversion, downsampling/upsampling,
  56. and color quantization. This code can be omitted if not needed.
  57. A wide range of quality vs. speed tradeoffs are possible in JPEG processing,
  58. and even more so in decompression postprocessing. The decompression library
  59. provides multiple implementations that cover most of the useful tradeoffs,
  60. ranging from very-high-quality down to fast-preview operation. On the
  61. compression side we have generally not provided low-quality choices, since
  62. compression is normally less time-critical. It should be understood that the
  63. low-quality modes may not meet the JPEG standard's accuracy requirements;
  64. nonetheless, they are useful for viewers.
  65. *** Portability issues ***
  66. Portability is an essential requirement for the library. The key portability
  67. issues that show up at the level of system architecture are:
  68. 1. Memory usage. We want the code to be able to run on PC-class machines
  69. with limited memory. Images should therefore be processed sequentially (in
  70. strips), to avoid holding the whole image in memory at once. Where a
  71. full-image buffer is necessary, we should be able to use either virtual memory
  72. or temporary files.
  73. 2. Near/far pointer distinction. To run efficiently on 80x86 machines, the
  74. code should distinguish "small" objects (kept in near data space) from
  75. "large" ones (kept in far data space). This is an annoying restriction, but
  76. fortunately it does not impact code quality for less brain-damaged machines,
  77. and the source code clutter turns out to be minimal with sufficient use of
  78. pointer typedefs.
  79. 3. Data precision. We assume that "char" is at least 8 bits, "short" and
  80. "int" at least 16, "long" at least 32. The code will work fine with larger
  81. data sizes, although memory may be used inefficiently in some cases. However,
  82. the JPEG compressed datastream must ultimately appear on external storage as a
  83. sequence of 8-bit bytes if it is to conform to the standard. This may pose a
  84. problem on machines where char is wider than 8 bits. The library represents
  85. compressed data as an array of values of typedef JOCTET. If no data type
  86. exactly 8 bits wide is available, custom data source and data destination
  87. modules must be written to unpack and pack the chosen JOCTET datatype into
  88. 8-bit external representation.
  89. *** System overview ***
  90. The compressor and decompressor are each divided into two main sections:
  91. the JPEG compressor or decompressor proper, and the preprocessing or
  92. postprocessing functions. The interface between these two sections is the
  93. image data that the official JPEG spec regards as its input or output: this
  94. data is in the colorspace to be used for compression, and it is downsampled
  95. to the sampling factors to be used. The preprocessing and postprocessing
  96. steps are responsible for converting a normal image representation to or from
  97. this form. (Those few applications that want to deal with YCbCr downsampled
  98. data can skip the preprocessing or postprocessing step.)
  99. Looking more closely, the compressor library contains the following main
  100. elements:
  101. Preprocessing:
  102. * Color space conversion (e.g., RGB to YCbCr).
  103. * Edge expansion and downsampling. Optionally, this step can do simple
  104. smoothing --- this is often helpful for low-quality source data.
  105. JPEG proper:
  106. * MCU assembly, DCT, quantization.
  107. * Entropy coding (sequential or progressive, Huffman or arithmetic).
  108. In addition to these modules we need overall control, marker generation,
  109. and support code (memory management & error handling). There is also a
  110. module responsible for physically writing the output data --- typically
  111. this is just an interface to fwrite(), but some applications may need to
  112. do something else with the data.
  113. The decompressor library contains the following main elements:
  114. JPEG proper:
  115. * Entropy decoding (sequential or progressive, Huffman or arithmetic).
  116. * Dequantization, inverse DCT, MCU disassembly.
  117. Postprocessing:
  118. * Upsampling. Optionally, this step may be able to do more general
  119. rescaling of the image.
  120. * Color space conversion (e.g., YCbCr to RGB). This step may also
  121. provide gamma adjustment [ currently it does not ].
  122. * Optional color quantization (e.g., reduction to 256 colors).
  123. * Optional color precision reduction (e.g., 24-bit to 15-bit color).
  124. [This feature is not currently implemented.]
  125. We also need overall control, marker parsing, and a data source module.
  126. The support code (memory management & error handling) can be shared with
  127. the compression half of the library.
  128. There may be several implementations of each of these elements, particularly
  129. in the decompressor, where a wide range of speed/quality tradeoffs is very
  130. useful. It must be understood that some of the best speedups involve
  131. merging adjacent steps in the pipeline. For example, upsampling, color space
  132. conversion, and color quantization might all be done at once when using a
  133. low-quality ordered-dither technique. The system architecture is designed to
  134. allow such merging where appropriate.
  135. Note: it is convenient to regard edge expansion (padding to block boundaries)
  136. as a preprocessing/postprocessing function, even though the JPEG spec includes
  137. it in compression/decompression. We do this because downsampling/upsampling
  138. can be simplified a little if they work on padded data: it's not necessary to
  139. have special cases at the right and bottom edges. Therefore the interface
  140. buffer is always an integral number of blocks wide and high, and we expect
  141. compression preprocessing to pad the source data properly. Padding will occur
  142. only to the next block (block_size-sample) boundary. In an interleaved-scan
  143. situation, additional dummy blocks may be used to fill out MCUs, but the MCU
  144. assembly and disassembly logic will create or discard these blocks internally.
  145. (This is advantageous for speed reasons, since we avoid DCTing the dummy
  146. blocks. It also permits a small reduction in file size, because the
  147. compressor can choose dummy block contents so as to minimize their size
  148. in compressed form. Finally, it makes the interface buffer specification
  149. independent of whether the file is actually interleaved or not.)
  150. Applications that wish to deal directly with the downsampled data must
  151. provide similar buffering and padding for odd-sized images.
  152. *** Poor man's object-oriented programming ***
  153. It should be clear by now that we have a lot of quasi-independent processing
  154. steps, many of which have several possible behaviors. To avoid cluttering the
  155. code with lots of switch statements, we use a simple form of object-style
  156. programming to separate out the different possibilities.
  157. For example, two different color quantization algorithms could be implemented
  158. as two separate modules that present the same external interface; at runtime,
  159. the calling code will access the proper module indirectly through an "object".
  160. We can get the limited features we need while staying within portable C.
  161. The basic tool is a function pointer. An "object" is just a struct
  162. containing one or more function pointer fields, each of which corresponds to
  163. a method name in real object-oriented languages. During initialization we
  164. fill in the function pointers with references to whichever module we have
  165. determined we need to use in this run. Then invocation of the module is done
  166. by indirecting through a function pointer; on most machines this is no more
  167. expensive than a switch statement, which would be the only other way of
  168. making the required run-time choice. The really significant benefit, of
  169. course, is keeping the source code clean and well structured.
  170. We can also arrange to have private storage that varies between different
  171. implementations of the same kind of object. We do this by making all the
  172. module-specific object structs be separately allocated entities, which will
  173. be accessed via pointers in the master compression or decompression struct.
  174. The "public" fields or methods for a given kind of object are specified by
  175. a commonly known struct. But a module's initialization code can allocate
  176. a larger struct that contains the common struct as its first member, plus
  177. additional private fields. With appropriate pointer casting, the module's
  178. internal functions can access these private fields. (For a simple example,
  179. see jdatadst.c, which implements the external interface specified by struct
  180. jpeg_destination_mgr, but adds extra fields.)
  181. (Of course this would all be a lot easier if we were using C++, but we are
  182. not yet prepared to assume that everyone has a C++ compiler.)
  183. An important benefit of this scheme is that it is easy to provide multiple
  184. versions of any method, each tuned to a particular case. While a lot of
  185. precalculation might be done to select an optimal implementation of a method,
  186. the cost per invocation is constant. For example, the upsampling step might
  187. have a "generic" method, plus one or more "hardwired" methods for the most
  188. popular sampling factors; the hardwired methods would be faster because they'd
  189. use straight-line code instead of for-loops. The cost to determine which
  190. method to use is paid only once, at startup, and the selection criteria are
  191. hidden from the callers of the method.
  192. This plan differs a little bit from usual object-oriented structures, in that
  193. only one instance of each object class will exist during execution. The
  194. reason for having the class structure is that on different runs we may create
  195. different instances (choose to execute different modules). You can think of
  196. the term "method" as denoting the common interface presented by a particular
  197. set of interchangeable functions, and "object" as denoting a group of related
  198. methods, or the total shared interface behavior of a group of modules.
  199. *** Overall control structure ***
  200. We previously mentioned the need for overall control logic in the compression
  201. and decompression libraries. In IJG implementations prior to v5, overall
  202. control was mostly provided by "pipeline control" modules, which proved to be
  203. large, unwieldy, and hard to understand. To improve the situation, the
  204. control logic has been subdivided into multiple modules. The control modules
  205. consist of:
  206. 1. Master control for module selection and initialization. This has two
  207. responsibilities:
  208. 1A. Startup initialization at the beginning of image processing.
  209. The individual processing modules to be used in this run are selected
  210. and given initialization calls.
  211. 1B. Per-pass control. This determines how many passes will be performed
  212. and calls each active processing module to configure itself
  213. appropriately at the beginning of each pass. End-of-pass processing,
  214. where necessary, is also invoked from the master control module.
  215. Method selection is partially distributed, in that a particular processing
  216. module may contain several possible implementations of a particular method,
  217. which it will select among when given its initialization call. The master
  218. control code need only be concerned with decisions that affect more than
  219. one module.
  220. 2. Data buffering control. A separate control module exists for each
  221. inter-processing-step data buffer. This module is responsible for
  222. invoking the processing steps that write or read that data buffer.
  223. Each buffer controller sees the world as follows:
  224. input data => processing step A => buffer => processing step B => output data
  225. | | |
  226. ------------------ controller ------------------
  227. The controller knows the dataflow requirements of steps A and B: how much data
  228. they want to accept in one chunk and how much they output in one chunk. Its
  229. function is to manage its buffer and call A and B at the proper times.
  230. A data buffer control module may itself be viewed as a processing step by a
  231. higher-level control module; thus the control modules form a binary tree with
  232. elementary processing steps at the leaves of the tree.
  233. The control modules are objects. A considerable amount of flexibility can
  234. be had by replacing implementations of a control module. For example:
  235. * Merging of adjacent steps in the pipeline is done by replacing a control
  236. module and its pair of processing-step modules with a single processing-
  237. step module. (Hence the possible merges are determined by the tree of
  238. control modules.)
  239. * In some processing modes, a given interstep buffer need only be a "strip"
  240. buffer large enough to accommodate the desired data chunk sizes. In other
  241. modes, a full-image buffer is needed and several passes are required.
  242. The control module determines which kind of buffer is used and manipulates
  243. virtual array buffers as needed. One or both processing steps may be
  244. unaware of the multi-pass behavior.
  245. In theory, we might be able to make all of the data buffer controllers
  246. interchangeable and provide just one set of implementations for all. In
  247. practice, each one contains considerable special-case processing for its
  248. particular job. The buffer controller concept should be regarded as an
  249. overall system structuring principle, not as a complete description of the
  250. task performed by any one controller.
  251. *** Compression object structure ***
  252. Here is a sketch of the logical structure of the JPEG compression library:
  253. |-- Colorspace conversion
  254. |-- Preprocessing controller --|
  255. | |-- Downsampling
  256. Main controller --|
  257. | |-- Forward DCT, quantize
  258. |-- Coefficient controller --|
  259. |-- Entropy encoding
  260. This sketch also describes the flow of control (subroutine calls) during
  261. typical image data processing. Each of the components shown in the diagram is
  262. an "object" which may have several different implementations available. One
  263. or more source code files contain the actual implementation(s) of each object.
  264. The objects shown above are:
  265. * Main controller: buffer controller for the subsampled-data buffer, which
  266. holds the preprocessed input data. This controller invokes preprocessing to
  267. fill the subsampled-data buffer, and JPEG compression to empty it. There is
  268. usually no need for a full-image buffer here; a strip buffer is adequate.
  269. * Preprocessing controller: buffer controller for the downsampling input data
  270. buffer, which lies between colorspace conversion and downsampling. Note
  271. that a unified conversion/downsampling module would probably replace this
  272. controller entirely.
  273. * Colorspace conversion: converts application image data into the desired
  274. JPEG color space; also changes the data from pixel-interleaved layout to
  275. separate component planes. Processes one pixel row at a time.
  276. * Downsampling: performs reduction of chroma components as required.
  277. Optionally may perform pixel-level smoothing as well. Processes a "row
  278. group" at a time, where a row group is defined as Vmax pixel rows of each
  279. component before downsampling, and Vk sample rows afterwards (remember Vk
  280. differs across components). Some downsampling or smoothing algorithms may
  281. require context rows above and below the current row group; the
  282. preprocessing controller is responsible for supplying these rows via proper
  283. buffering. The downsampler is responsible for edge expansion at the right
  284. edge (i.e., extending each sample row to a multiple of block_size samples);
  285. but the preprocessing controller is responsible for vertical edge expansion
  286. (i.e., duplicating the bottom sample row as needed to make a multiple of
  287. block_size rows).
  288. * Coefficient controller: buffer controller for the DCT-coefficient data.
  289. This controller handles MCU assembly, including insertion of dummy DCT
  290. blocks when needed at the right or bottom edge. When performing
  291. Huffman-code optimization or emitting a multiscan JPEG file, this
  292. controller is responsible for buffering the full image. The equivalent of
  293. one fully interleaved MCU row of subsampled data is processed per call,
  294. even when the JPEG file is noninterleaved.
  295. * Forward DCT and quantization: Perform DCT, quantize, and emit coefficients.
  296. Works on one or more DCT blocks at a time. (Note: the coefficients are now
  297. emitted in normal array order, which the entropy encoder is expected to
  298. convert to zigzag order as necessary. Prior versions of the IJG code did
  299. the conversion to zigzag order within the quantization step.)
  300. * Entropy encoding: Perform Huffman or arithmetic entropy coding and emit the
  301. coded data to the data destination module. Works on one MCU per call.
  302. For progressive JPEG, the same DCT blocks are fed to the entropy coder
  303. during each pass, and the coder must emit the appropriate subset of
  304. coefficients.
  305. In addition to the above objects, the compression library includes these
  306. objects:
  307. * Master control: determines the number of passes required, controls overall
  308. and per-pass initialization of the other modules.
  309. * Marker writing: generates JPEG markers (except for RSTn, which is emitted
  310. by the entropy encoder when needed).
  311. * Data destination manager: writes the output JPEG datastream to its final
  312. destination (e.g., a file). The destination manager supplied with the
  313. library knows how to write to a stdio stream or to a memory buffer;
  314. for other behaviors, the surrounding application may provide its own
  315. destination manager.
  316. * Memory manager: allocates and releases memory, controls virtual arrays
  317. (with backing store management, where required).
  318. * Error handler: performs formatting and output of error and trace messages;
  319. determines handling of nonfatal errors. The surrounding application may
  320. override some or all of this object's methods to change error handling.
  321. * Progress monitor: supports output of "percent-done" progress reports.
  322. This object represents an optional callback to the surrounding application:
  323. if wanted, it must be supplied by the application.
  324. The error handler, destination manager, and progress monitor objects are
  325. defined as separate objects in order to simplify application-specific
  326. customization of the JPEG library. A surrounding application may override
  327. individual methods or supply its own all-new implementation of one of these
  328. objects. The object interfaces for these objects are therefore treated as
  329. part of the application interface of the library, whereas the other objects
  330. are internal to the library.
  331. The error handler and memory manager are shared by JPEG compression and
  332. decompression; the progress monitor, if used, may be shared as well.
  333. *** Decompression object structure ***
  334. Here is a sketch of the logical structure of the JPEG decompression library:
  335. |-- Entropy decoding
  336. |-- Coefficient controller --|
  337. | |-- Dequantize, Inverse DCT
  338. Main controller --|
  339. | |-- Upsampling
  340. |-- Postprocessing controller --| |-- Colorspace conversion
  341. |-- Color quantization
  342. |-- Color precision reduction
  343. As before, this diagram also represents typical control flow. The objects
  344. shown are:
  345. * Main controller: buffer controller for the subsampled-data buffer, which
  346. holds the output of JPEG decompression proper. This controller's primary
  347. task is to feed the postprocessing procedure. Some upsampling algorithms
  348. may require context rows above and below the current row group; when this
  349. is true, the main controller is responsible for managing its buffer so as
  350. to make context rows available. In the current design, the main buffer is
  351. always a strip buffer; a full-image buffer is never required.
  352. * Coefficient controller: buffer controller for the DCT-coefficient data.
  353. This controller handles MCU disassembly, including deletion of any dummy
  354. DCT blocks at the right or bottom edge. When reading a multiscan JPEG
  355. file, this controller is responsible for buffering the full image.
  356. (Buffering DCT coefficients, rather than samples, is necessary to support
  357. progressive JPEG.) The equivalent of one fully interleaved MCU row of
  358. subsampled data is processed per call, even when the source JPEG file is
  359. noninterleaved.
  360. * Entropy decoding: Read coded data from the data source module and perform
  361. Huffman or arithmetic entropy decoding. Works on one MCU per call.
  362. For progressive JPEG decoding, the coefficient controller supplies the prior
  363. coefficients of each MCU (initially all zeroes), which the entropy decoder
  364. modifies in each scan.
  365. * Dequantization and inverse DCT: like it says. Note that the coefficients
  366. buffered by the coefficient controller have NOT been dequantized; we
  367. merge dequantization and inverse DCT into a single step for speed reasons.
  368. When scaled-down output is asked for, simplified DCT algorithms may be used
  369. that need fewer coefficients and emit fewer samples per DCT block, not the
  370. full 8x8. Works on one DCT block at a time.
  371. * Postprocessing controller: buffer controller for the color quantization
  372. input buffer, when quantization is in use. (Without quantization, this
  373. controller just calls the upsampler.) For two-pass quantization, this
  374. controller is responsible for buffering the full-image data.
  375. * Upsampling: restores chroma components to full size. (May support more
  376. general output rescaling, too. Note that if undersized DCT outputs have
  377. been emitted by the DCT module, this module must adjust so that properly
  378. sized outputs are created.) Works on one row group at a time. This module
  379. also calls the color conversion module, so its top level is effectively a
  380. buffer controller for the upsampling->color conversion buffer. However, in
  381. all but the highest-quality operating modes, upsampling and color
  382. conversion are likely to be merged into a single step.
  383. * Colorspace conversion: convert from JPEG color space to output color space,
  384. and change data layout from separate component planes to pixel-interleaved.
  385. Works on one pixel row at a time.
  386. * Color quantization: reduce the data to colormapped form, using either an
  387. externally specified colormap or an internally generated one. This module
  388. is not used for full-color output. Works on one pixel row at a time; may
  389. require two passes to generate a color map. Note that the output will
  390. always be a single component representing colormap indexes. In the current
  391. design, the output values are JSAMPLEs, so an 8-bit compilation cannot
  392. quantize to more than 256 colors. This is unlikely to be a problem in
  393. practice.
  394. * Color reduction: this module handles color precision reduction, e.g.,
  395. generating 15-bit color (5 bits/primary) from JPEG's 24-bit output.
  396. Not quite clear yet how this should be handled... should we merge it with
  397. colorspace conversion???
  398. Note that some high-speed operating modes might condense the entire
  399. postprocessing sequence to a single module (upsample, color convert, and
  400. quantize in one step).
  401. In addition to the above objects, the decompression library includes these
  402. objects:
  403. * Master control: determines the number of passes required, controls overall
  404. and per-pass initialization of the other modules. This is subdivided into
  405. input and output control: jdinput.c controls only input-side processing,
  406. while jdmaster.c handles overall initialization and output-side control.
  407. * Marker reading: decodes JPEG markers (except for RSTn).
  408. * Data source manager: supplies the input JPEG datastream. The source
  409. manager supplied with the library knows how to read from a stdio stream
  410. or from a memory buffer; for other behaviors, the surrounding application
  411. may provide its own source manager.
  412. * Memory manager: same as for compression library.
  413. * Error handler: same as for compression library.
  414. * Progress monitor: same as for compression library.
  415. As with compression, the data source manager, error handler, and progress
  416. monitor are candidates for replacement by a surrounding application.
  417. *** Decompression input and output separation ***
  418. To support efficient incremental display of progressive JPEG files, the
  419. decompressor is divided into two sections that can run independently:
  420. 1. Data input includes marker parsing, entropy decoding, and input into the
  421. coefficient controller's DCT coefficient buffer. Note that this
  422. processing is relatively cheap and fast.
  423. 2. Data output reads from the DCT coefficient buffer and performs the IDCT
  424. and all postprocessing steps.
  425. For a progressive JPEG file, the data input processing is allowed to get
  426. arbitrarily far ahead of the data output processing. (This occurs only
  427. if the application calls jpeg_consume_input(); otherwise input and output
  428. run in lockstep, since the input section is called only when the output
  429. section needs more data.) In this way the application can avoid making
  430. extra display passes when data is arriving faster than the display pass
  431. can run. Furthermore, it is possible to abort an output pass without
  432. losing anything, since the coefficient buffer is read-only as far as the
  433. output section is concerned. See libjpeg.txt for more detail.
  434. A full-image coefficient array is only created if the JPEG file has multiple
  435. scans (or if the application specifies buffered-image mode anyway). When
  436. reading a single-scan file, the coefficient controller normally creates only
  437. a one-MCU buffer, so input and output processing must run in lockstep in this
  438. case. jpeg_consume_input() is effectively a no-op in this situation.
  439. The main impact of dividing the decompressor in this fashion is that we must
  440. be very careful with shared variables in the cinfo data structure. Each
  441. variable that can change during the course of decompression must be
  442. classified as belonging to data input or data output, and each section must
  443. look only at its own variables. For example, the data output section may not
  444. depend on any of the variables that describe the current scan in the JPEG
  445. file, because these may change as the data input section advances into a new
  446. scan.
  447. The progress monitor is (somewhat arbitrarily) defined to treat input of the
  448. file as one pass when buffered-image mode is not used, and to ignore data
  449. input work completely when buffered-image mode is used. Note that the
  450. library has no reliable way to predict the number of passes when dealing
  451. with a progressive JPEG file, nor can it predict the number of output passes
  452. in buffered-image mode. So the work estimate is inherently bogus anyway.
  453. No comparable division is currently made in the compression library, because
  454. there isn't any real need for it.
  455. *** Data formats ***
  456. Arrays of pixel sample values use the following data structure:
  457. typedef something JSAMPLE; a pixel component value, 0..MAXJSAMPLE
  458. typedef JSAMPLE *JSAMPROW; ptr to a row of samples
  459. typedef JSAMPROW *JSAMPARRAY; ptr to a list of rows
  460. typedef JSAMPARRAY *JSAMPIMAGE; ptr to a list of color-component arrays
  461. The basic element type JSAMPLE will typically be one of unsigned char,
  462. (signed) char, or short. Short will be used if samples wider than 8 bits are
  463. to be supported (this is a compile-time option). Otherwise, unsigned char is
  464. used if possible. If the compiler only supports signed chars, then it is
  465. necessary to mask off the value when reading. Thus, all reads of JSAMPLE
  466. values must be coded as "GETJSAMPLE(value)", where the macro will be defined
  467. as "((value) & 0xFF)" on signed-char machines and "((int) (value))" elsewhere.
  468. With these conventions, JSAMPLE values can be assumed to be >= 0. This helps
  469. simplify correct rounding during downsampling, etc. The JPEG standard's
  470. specification that sample values run from -128..127 is accommodated by
  471. subtracting 128 from the sample value in the DCT step. Similarly, during
  472. decompression the output of the IDCT step will be immediately shifted back to
  473. 0..255. (NB: different values are required when 12-bit samples are in use.
  474. The code is written in terms of MAXJSAMPLE and CENTERJSAMPLE, which will be
  475. defined as 255 and 128 respectively in an 8-bit implementation, and as 4095
  476. and 2048 in a 12-bit implementation.)
  477. We use a pointer per row, rather than a two-dimensional JSAMPLE array. This
  478. choice costs only a small amount of memory and has several benefits:
  479. * Code using the data structure doesn't need to know the allocated width of
  480. the rows. This simplifies edge expansion/compression, since we can work
  481. in an array that's wider than the logical picture width.
  482. * Indexing doesn't require multiplication; this is a performance win on many
  483. machines.
  484. * Arrays with more than 64K total elements can be supported even on machines
  485. where malloc() cannot allocate chunks larger than 64K.
  486. * The rows forming a component array may be allocated at different times
  487. without extra copying. This trick allows some speedups in smoothing steps
  488. that need access to the previous and next rows.
  489. Note that each color component is stored in a separate array; we don't use the
  490. traditional layout in which the components of a pixel are stored together.
  491. This simplifies coding of modules that work on each component independently,
  492. because they don't need to know how many components there are. Furthermore,
  493. we can read or write each component to a temporary file independently, which
  494. is helpful when dealing with noninterleaved JPEG files.
  495. In general, a specific sample value is accessed by code such as
  496. GETJSAMPLE(image[colorcomponent][row][col])
  497. where col is measured from the image left edge, but row is measured from the
  498. first sample row currently in memory. Either of the first two indexings can
  499. be precomputed by copying the relevant pointer.
  500. Since most image-processing applications prefer to work on images in which
  501. the components of a pixel are stored together, the data passed to or from the
  502. surrounding application uses the traditional convention: a single pixel is
  503. represented by N consecutive JSAMPLE values, and an image row is an array of
  504. (# of color components)*(image width) JSAMPLEs. One or more rows of data can
  505. be represented by a pointer of type JSAMPARRAY in this scheme. This scheme is
  506. converted to component-wise storage inside the JPEG library. (Applications
  507. that want to skip JPEG preprocessing or postprocessing will have to contend
  508. with component-wise storage.)
  509. Arrays of DCT-coefficient values use the following data structure:
  510. typedef short JCOEF; a 16-bit signed integer
  511. typedef JCOEF JBLOCK[DCTSIZE2]; an 8x8 block of coefficients
  512. typedef JBLOCK *JBLOCKROW; ptr to one horizontal row of 8x8 blocks
  513. typedef JBLOCKROW *JBLOCKARRAY; ptr to a list of such rows
  514. typedef JBLOCKARRAY *JBLOCKIMAGE; ptr to a list of color component arrays
  515. The underlying type is at least a 16-bit signed integer; while "short" is big
  516. enough on all machines of interest, on some machines it is preferable to use
  517. "int" for speed reasons, despite the storage cost. Coefficients are grouped
  518. into 8x8 blocks (but we always use #defines DCTSIZE and DCTSIZE2 rather than
  519. "8" and "64").
  520. The contents of a coefficient block may be in either "natural" or zigzagged
  521. order, and may be true values or divided by the quantization coefficients,
  522. depending on where the block is in the processing pipeline. In the current
  523. library, coefficient blocks are kept in natural order everywhere; the entropy
  524. codecs zigzag or dezigzag the data as it is written or read. The blocks
  525. contain quantized coefficients everywhere outside the DCT/IDCT subsystems.
  526. (This latter decision may need to be revisited to support variable
  527. quantization a la JPEG Part 3.)
  528. Notice that the allocation unit is now a row of 8x8 coefficient blocks,
  529. corresponding to block_size rows of samples. Otherwise the structure
  530. is much the same as for samples, and for the same reasons.
  531. On machines where malloc() can't handle a request bigger than 64Kb, this data
  532. structure limits us to rows of less than 512 JBLOCKs, or a picture width of
  533. 4000+ pixels. This seems an acceptable restriction.
  534. On 80x86 machines, the bottom-level pointer types (JSAMPROW and JBLOCKROW)
  535. must be declared as "far" pointers, but the upper levels can be "near"
  536. (implying that the pointer lists are allocated in the DS segment).
  537. We use a #define symbol FAR, which expands to the "far" keyword when
  538. compiling on 80x86 machines and to nothing elsewhere.
  539. *** Suspendable processing ***
  540. In some applications it is desirable to use the JPEG library as an
  541. incremental, memory-to-memory filter. In this situation the data source or
  542. destination may be a limited-size buffer, and we can't rely on being able to
  543. empty or refill the buffer at arbitrary times. Instead the application would
  544. like to have control return from the library at buffer overflow/underrun, and
  545. then resume compression or decompression at a later time.
  546. This scenario is supported for simple cases. (For anything more complex, we
  547. recommend that the application "bite the bullet" and develop real multitasking
  548. capability.) The libjpeg.txt file goes into more detail about the usage and
  549. limitations of this capability; here we address the implications for library
  550. structure.
  551. The essence of the problem is that the entropy codec (coder or decoder) must
  552. be prepared to stop at arbitrary times. In turn, the controllers that call
  553. the entropy codec must be able to stop before having produced or consumed all
  554. the data that they normally would handle in one call. That part is reasonably
  555. straightforward: we make the controller call interfaces include "progress
  556. counters" which indicate the number of data chunks successfully processed, and
  557. we require callers to test the counter rather than just assume all of the data
  558. was processed.
  559. Rather than trying to restart at an arbitrary point, the current Huffman
  560. codecs are designed to restart at the beginning of the current MCU after a
  561. suspension due to buffer overflow/underrun. At the start of each call, the
  562. codec's internal state is loaded from permanent storage (in the JPEG object
  563. structures) into local variables. On successful completion of the MCU, the
  564. permanent state is updated. (This copying is not very expensive, and may even
  565. lead to *improved* performance if the local variables can be registerized.)
  566. If a suspension occurs, the codec simply returns without updating the state,
  567. thus effectively reverting to the start of the MCU. Note that this implies
  568. leaving some data unprocessed in the source/destination buffer (ie, the
  569. compressed partial MCU). The data source/destination module interfaces are
  570. specified so as to make this possible. This also implies that the data buffer
  571. must be large enough to hold a worst-case compressed MCU; a couple thousand
  572. bytes should be enough.
  573. In a successive-approximation AC refinement scan, the progressive Huffman
  574. decoder has to be able to undo assignments of newly nonzero coefficients if it
  575. suspends before the MCU is complete, since decoding requires distinguishing
  576. previously-zero and previously-nonzero coefficients. This is a bit tedious
  577. but probably won't have much effect on performance. Other variants of Huffman
  578. decoding need not worry about this, since they will just store the same values
  579. again if forced to repeat the MCU.
  580. This approach would probably not work for an arithmetic codec, since its
  581. modifiable state is quite large and couldn't be copied cheaply. Instead it
  582. would have to suspend and resume exactly at the point of the buffer end.
  583. The JPEG marker reader is designed to cope with suspension at an arbitrary
  584. point. It does so by backing up to the start of the marker parameter segment,
  585. so the data buffer must be big enough to hold the largest marker of interest.
  586. Again, a couple KB should be adequate. (A special "skip" convention is used
  587. to bypass COM and APPn markers, so these can be larger than the buffer size
  588. without causing problems; otherwise a 64K buffer would be needed in the worst
  589. case.)
  590. The JPEG marker writer currently does *not* cope with suspension.
  591. We feel that this is not necessary; it is much easier simply to require
  592. the application to ensure there is enough buffer space before starting. (An
  593. empty 2K buffer is more than sufficient for the header markers; and ensuring
  594. there are a dozen or two bytes available before calling jpeg_finish_compress()
  595. will suffice for the trailer.) This would not work for writing multi-scan
  596. JPEG files, but we simply do not intend to support that capability with
  597. suspension.
  598. *** Memory manager services ***
  599. The JPEG library's memory manager controls allocation and deallocation of
  600. memory, and it manages large "virtual" data arrays on machines where the
  601. operating system does not provide virtual memory. Note that the same
  602. memory manager serves both compression and decompression operations.
  603. In all cases, allocated objects are tied to a particular compression or
  604. decompression master record, and they will be released when that master
  605. record is destroyed.
  606. The memory manager does not provide explicit deallocation of objects.
  607. Instead, objects are created in "pools" of free storage, and a whole pool
  608. can be freed at once. This approach helps prevent storage-leak bugs, and
  609. it speeds up operations whenever malloc/free are slow (as they often are).
  610. The pools can be regarded as lifetime identifiers for objects. Two
  611. pools/lifetimes are defined:
  612. * JPOOL_PERMANENT lasts until master record is destroyed
  613. * JPOOL_IMAGE lasts until done with image (JPEG datastream)
  614. Permanent lifetime is used for parameters and tables that should be carried
  615. across from one datastream to another; this includes all application-visible
  616. parameters. Image lifetime is used for everything else. (A third lifetime,
  617. JPOOL_PASS = one processing pass, was originally planned. However it was
  618. dropped as not being worthwhile. The actual usage patterns are such that the
  619. peak memory usage would be about the same anyway; and having per-pass storage
  620. substantially complicates the virtual memory allocation rules --- see below.)
  621. The memory manager deals with three kinds of object:
  622. 1. "Small" objects. Typically these require no more than 10K-20K total.
  623. 2. "Large" objects. These may require tens to hundreds of K depending on
  624. image size. Semantically they behave the same as small objects, but we
  625. distinguish them for two reasons:
  626. * On MS-DOS machines, large objects are referenced by FAR pointers,
  627. small objects by NEAR pointers.
  628. * Pool allocation heuristics may differ for large and small objects.
  629. Note that individual "large" objects cannot exceed the size allowed by
  630. type size_t, which may be 64K or less on some machines.
  631. 3. "Virtual" objects. These are large 2-D arrays of JSAMPLEs or JBLOCKs
  632. (typically large enough for the entire image being processed). The
  633. memory manager provides stripwise access to these arrays. On machines
  634. without virtual memory, the rest of the array may be swapped out to a
  635. temporary file.
  636. (Note: JSAMPARRAY and JBLOCKARRAY data structures are a combination of large
  637. objects for the data proper and small objects for the row pointers. For
  638. convenience and speed, the memory manager provides single routines to create
  639. these structures. Similarly, virtual arrays include a small control block
  640. and a JSAMPARRAY or JBLOCKARRAY working buffer, all created with one call.)
  641. In the present implementation, virtual arrays are only permitted to have image
  642. lifespan. (Permanent lifespan would not be reasonable, and pass lifespan is
  643. not very useful since a virtual array's raison d'etre is to store data for
  644. multiple passes through the image.) We also expect that only "small" objects
  645. will be given permanent lifespan, though this restriction is not required by
  646. the memory manager.
  647. In a non-virtual-memory machine, some performance benefit can be gained by
  648. making the in-memory buffers for virtual arrays be as large as possible.
  649. (For small images, the buffers might fit entirely in memory, so blind
  650. swapping would be very wasteful.) The memory manager will adjust the height
  651. of the buffers to fit within a prespecified maximum memory usage. In order
  652. to do this in a reasonably optimal fashion, the manager needs to allocate all
  653. of the virtual arrays at once. Therefore, there isn't a one-step allocation
  654. routine for virtual arrays; instead, there is a "request" routine that simply
  655. allocates the control block, and a "realize" routine (called just once) that
  656. determines space allocation and creates all of the actual buffers. The
  657. realize routine must allow for space occupied by non-virtual large objects.
  658. (We don't bother to factor in the space needed for small objects, on the
  659. grounds that it isn't worth the trouble.)
  660. To support all this, we establish the following protocol for doing business
  661. with the memory manager:
  662. 1. Modules must request virtual arrays (which may have only image lifespan)
  663. during the initial setup phase, i.e., in their jinit_xxx routines.
  664. 2. All "large" objects (including JSAMPARRAYs and JBLOCKARRAYs) must also be
  665. allocated during initial setup.
  666. 3. realize_virt_arrays will be called at the completion of initial setup.
  667. The above conventions ensure that sufficient information is available
  668. for it to choose a good size for virtual array buffers.
  669. Small objects of any lifespan may be allocated at any time. We expect that
  670. the total space used for small objects will be small enough to be negligible
  671. in the realize_virt_arrays computation.
  672. In a virtual-memory machine, we simply pretend that the available space is
  673. infinite, thus causing realize_virt_arrays to decide that it can allocate all
  674. the virtual arrays as full-size in-memory buffers. The overhead of the
  675. virtual-array access protocol is very small when no swapping occurs.
  676. A virtual array can be specified to be "pre-zeroed"; when this flag is set,
  677. never-yet-written sections of the array are set to zero before being made
  678. available to the caller. If this flag is not set, never-written sections
  679. of the array contain garbage. (This feature exists primarily because the
  680. equivalent logic would otherwise be needed in jdcoefct.c for progressive
  681. JPEG mode; we may as well make it available for possible other uses.)
  682. The first write pass on a virtual array is required to occur in top-to-bottom
  683. order; read passes, as well as any write passes after the first one, may
  684. access the array in any order. This restriction exists partly to simplify
  685. the virtual array control logic, and partly because some file systems may not
  686. support seeking beyond the current end-of-file in a temporary file. The main
  687. implication of this restriction is that rearrangement of rows (such as
  688. converting top-to-bottom data order to bottom-to-top) must be handled while
  689. reading data out of the virtual array, not while putting it in.
  690. *** Memory manager internal structure ***
  691. To isolate system dependencies as much as possible, we have broken the
  692. memory manager into two parts. There is a reasonably system-independent
  693. "front end" (jmemmgr.c) and a "back end" that contains only the code
  694. likely to change across systems. All of the memory management methods
  695. outlined above are implemented by the front end. The back end provides
  696. the following routines for use by the front end (none of these routines
  697. are known to the rest of the JPEG code):
  698. jpeg_mem_init, jpeg_mem_term system-dependent initialization/shutdown
  699. jpeg_get_small, jpeg_free_small interface to malloc and free library routines
  700. (or their equivalents)
  701. jpeg_get_large, jpeg_free_large interface to FAR malloc/free in MSDOS machines;
  702. else usually the same as
  703. jpeg_get_small/jpeg_free_small
  704. jpeg_mem_available estimate available memory
  705. jpeg_open_backing_store create a backing-store object
  706. read_backing_store, manipulate a backing-store object
  707. write_backing_store,
  708. close_backing_store
  709. On some systems there will be more than one type of backing-store object
  710. (specifically, in MS-DOS a backing store file might be an area of extended
  711. memory as well as a disk file). jpeg_open_backing_store is responsible for
  712. choosing how to implement a given object. The read/write/close routines
  713. are method pointers in the structure that describes a given object; this
  714. lets them be different for different object types.
  715. It may be necessary to ensure that backing store objects are explicitly
  716. released upon abnormal program termination. For example, MS-DOS won't free
  717. extended memory by itself. To support this, we will expect the main program
  718. or surrounding application to arrange to call self_destruct (typically via
  719. jpeg_destroy) upon abnormal termination. This may require a SIGINT signal
  720. handler or equivalent. We don't want to have the back end module install its
  721. own signal handler, because that would pre-empt the surrounding application's
  722. ability to control signal handling.
  723. The IJG distribution includes several memory manager back end implementations.
  724. Usually the same back end should be suitable for all applications on a given
  725. system, but it is possible for an application to supply its own back end at
  726. need.
  727. *** Implications of DNL marker ***
  728. Some JPEG files may use a DNL marker to postpone definition of the image
  729. height (this would be useful for a fax-like scanner's output, for instance).
  730. In these files the SOF marker claims the image height is 0, and you only
  731. find out the true image height at the end of the first scan.
  732. We could read these files as follows:
  733. 1. Upon seeing zero image height, replace it by 65535 (the maximum allowed).
  734. 2. When the DNL is found, update the image height in the global image
  735. descriptor.
  736. This implies that control modules must avoid making copies of the image
  737. height, and must re-test for termination after each MCU row. This would
  738. be easy enough to do.
  739. In cases where image-size data structures are allocated, this approach will
  740. result in very inefficient use of virtual memory or much-larger-than-necessary
  741. temporary files. This seems acceptable for something that probably won't be a
  742. mainstream usage. People might have to forgo use of memory-hogging options
  743. (such as two-pass color quantization or noninterleaved JPEG files) if they
  744. want efficient conversion of such files. (One could improve efficiency by
  745. demanding a user-supplied upper bound for the height, less than 65536; in most
  746. cases it could be much less.)
  747. The standard also permits the SOF marker to overestimate the image height,
  748. with a DNL to give the true, smaller height at the end of the first scan.
  749. This would solve the space problems if the overestimate wasn't too great.
  750. However, it implies that you don't even know whether DNL will be used.
  751. This leads to a couple of very serious objections:
  752. 1. Testing for a DNL marker must occur in the inner loop of the decompressor's
  753. Huffman decoder; this implies a speed penalty whether the feature is used
  754. or not.
  755. 2. There is no way to hide the last-minute change in image height from an
  756. application using the decoder. Thus *every* application using the IJG
  757. library would suffer a complexity penalty whether it cared about DNL or
  758. not.
  759. We currently do not support DNL because of these problems.
  760. A different approach is to insist that DNL-using files be preprocessed by a
  761. separate program that reads ahead to the DNL, then goes back and fixes the SOF
  762. marker. This is a much simpler solution and is probably far more efficient.
  763. Even if one wants piped input, buffering the first scan of the JPEG file needs
  764. a lot smaller temp file than is implied by the maximum-height method. For
  765. this approach we'd simply treat DNL as a no-op in the decompressor (at most,
  766. check that it matches the SOF image height).
  767. We will not worry about making the compressor capable of outputting DNL.
  768. Something similar to the first scheme above could be applied if anyone ever
  769. wants to make that work.