Team Fortress 2 Source Code as on 22/4/2020
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

945 lines
50 KiB

  1. IJG JPEG LIBRARY: SYSTEM ARCHITECTURE
  2. Copyright (C) 1991-2009, Thomas G. Lane, Guido Vollbeding.
  3. This file is part of the Independent JPEG Group's software.
  4. For conditions of distribution and use, see the accompanying README file.
  5. This file provides an overview of the architecture of the IJG JPEG software;
  6. that is, the functions of the various modules in the system and the interfaces
  7. between modules. For more precise details about any data structure or calling
  8. convention, see the include files and comments in the source code.
  9. We assume that the reader is already somewhat familiar with the JPEG standard.
  10. The README file includes references for learning about JPEG. The file
  11. libjpeg.txt describes the library from the viewpoint of an application
  12. programmer using the library; it's best to read that file before this one.
  13. Also, the file coderules.txt describes the coding style conventions we use.
  14. In this document, JPEG-specific terminology follows the JPEG standard:
  15. A "component" means a color channel, e.g., Red or Luminance.
  16. A "sample" is a single component value (i.e., one number in the image data).
  17. A "coefficient" is a frequency coefficient (a DCT transform output number).
  18. A "block" is an 8x8 group of samples or coefficients.
  19. An "MCU" (minimum coded unit) is an interleaved set of blocks of size
  20. determined by the sampling factors, or a single block in a
  21. noninterleaved scan.
  22. We do not use the terms "pixel" and "sample" interchangeably. When we say
  23. pixel, we mean an element of the full-size image, while a sample is an element
  24. of the downsampled image. Thus the number of samples may vary across
  25. components while the number of pixels does not. (This terminology is not used
  26. rigorously throughout the code, but it is used in places where confusion would
  27. otherwise result.)
  28. *** System features ***
  29. The IJG distribution contains two parts:
  30. * A subroutine library for JPEG compression and decompression.
  31. * cjpeg/djpeg, two sample applications that use the library to transform
  32. JFIF JPEG files to and from several other image formats.
  33. cjpeg/djpeg are of no great intellectual complexity: they merely add a simple
  34. command-line user interface and I/O routines for several uncompressed image
  35. formats. This document concentrates on the library itself.
  36. We desire the library to be capable of supporting all JPEG baseline, extended
  37. sequential, and progressive DCT processes. Hierarchical processes are not
  38. supported.
  39. The library does not support the lossless (spatial) JPEG process. Lossless
  40. JPEG shares little or no code with lossy JPEG, and would normally be used
  41. without the extensive pre- and post-processing provided by this library.
  42. We feel that lossless JPEG is better handled by a separate library.
  43. Within these limits, any set of compression parameters allowed by the JPEG
  44. spec should be readable for decompression. (We can be more restrictive about
  45. what formats we can generate.) Although the system design allows for all
  46. parameter values, some uncommon settings are not yet implemented and may
  47. never be; nonintegral sampling ratios are the prime example. Furthermore,
  48. we treat 8-bit vs. 12-bit data precision as a compile-time switch, not a
  49. run-time option, because most machines can store 8-bit pixels much more
  50. compactly than 12-bit.
  51. By itself, the library handles only interchange JPEG datastreams --- in
  52. particular the widely used JFIF file format. The library can be used by
  53. surrounding code to process interchange or abbreviated JPEG datastreams that
  54. are embedded in more complex file formats. (For example, libtiff uses this
  55. library to implement JPEG compression within the TIFF file format.)
  56. The library includes a substantial amount of code that is not covered by the
  57. JPEG standard but is necessary for typical applications of JPEG. These
  58. functions preprocess the image before JPEG compression or postprocess it after
  59. decompression. They include colorspace conversion, downsampling/upsampling,
  60. and color quantization. This code can be omitted if not needed.
  61. A wide range of quality vs. speed tradeoffs are possible in JPEG processing,
  62. and even more so in decompression postprocessing. The decompression library
  63. provides multiple implementations that cover most of the useful tradeoffs,
  64. ranging from very-high-quality down to fast-preview operation. On the
  65. compression side we have generally not provided low-quality choices, since
  66. compression is normally less time-critical. It should be understood that the
  67. low-quality modes may not meet the JPEG standard's accuracy requirements;
  68. nonetheless, they are useful for viewers.
  69. *** Portability issues ***
  70. Portability is an essential requirement for the library. The key portability
  71. issues that show up at the level of system architecture are:
  72. 1. Memory usage. We want the code to be able to run on PC-class machines
  73. with limited memory. Images should therefore be processed sequentially (in
  74. strips), to avoid holding the whole image in memory at once. Where a
  75. full-image buffer is necessary, we should be able to use either virtual memory
  76. or temporary files.
  77. 2. Near/far pointer distinction. To run efficiently on 80x86 machines, the
  78. code should distinguish "small" objects (kept in near data space) from
  79. "large" ones (kept in far data space). This is an annoying restriction, but
  80. fortunately it does not impact code quality for less brain-damaged machines,
  81. and the source code clutter turns out to be minimal with sufficient use of
  82. pointer typedefs.
  83. 3. Data precision. We assume that "char" is at least 8 bits, "short" and
  84. "int" at least 16, "long" at least 32. The code will work fine with larger
  85. data sizes, although memory may be used inefficiently in some cases. However,
  86. the JPEG compressed datastream must ultimately appear on external storage as a
  87. sequence of 8-bit bytes if it is to conform to the standard. This may pose a
  88. problem on machines where char is wider than 8 bits. The library represents
  89. compressed data as an array of values of typedef JOCTET. If no data type
  90. exactly 8 bits wide is available, custom data source and data destination
  91. modules must be written to unpack and pack the chosen JOCTET datatype into
  92. 8-bit external representation.
  93. *** System overview ***
  94. The compressor and decompressor are each divided into two main sections:
  95. the JPEG compressor or decompressor proper, and the preprocessing or
  96. postprocessing functions. The interface between these two sections is the
  97. image data that the official JPEG spec regards as its input or output: this
  98. data is in the colorspace to be used for compression, and it is downsampled
  99. to the sampling factors to be used. The preprocessing and postprocessing
  100. steps are responsible for converting a normal image representation to or from
  101. this form. (Those few applications that want to deal with YCbCr downsampled
  102. data can skip the preprocessing or postprocessing step.)
  103. Looking more closely, the compressor library contains the following main
  104. elements:
  105. Preprocessing:
  106. * Color space conversion (e.g., RGB to YCbCr).
  107. * Edge expansion and downsampling. Optionally, this step can do simple
  108. smoothing --- this is often helpful for low-quality source data.
  109. JPEG proper:
  110. * MCU assembly, DCT, quantization.
  111. * Entropy coding (sequential or progressive, Huffman or arithmetic).
  112. In addition to these modules we need overall control, marker generation,
  113. and support code (memory management & error handling). There is also a
  114. module responsible for physically writing the output data --- typically
  115. this is just an interface to fwrite(), but some applications may need to
  116. do something else with the data.
  117. The decompressor library contains the following main elements:
  118. JPEG proper:
  119. * Entropy decoding (sequential or progressive, Huffman or arithmetic).
  120. * Dequantization, inverse DCT, MCU disassembly.
  121. Postprocessing:
  122. * Upsampling. Optionally, this step may be able to do more general
  123. rescaling of the image.
  124. * Color space conversion (e.g., YCbCr to RGB). This step may also
  125. provide gamma adjustment [ currently it does not ].
  126. * Optional color quantization (e.g., reduction to 256 colors).
  127. * Optional color precision reduction (e.g., 24-bit to 15-bit color).
  128. [This feature is not currently implemented.]
  129. We also need overall control, marker parsing, and a data source module.
  130. The support code (memory management & error handling) can be shared with
  131. the compression half of the library.
  132. There may be several implementations of each of these elements, particularly
  133. in the decompressor, where a wide range of speed/quality tradeoffs is very
  134. useful. It must be understood that some of the best speedups involve
  135. merging adjacent steps in the pipeline. For example, upsampling, color space
  136. conversion, and color quantization might all be done at once when using a
  137. low-quality ordered-dither technique. The system architecture is designed to
  138. allow such merging where appropriate.
  139. Note: it is convenient to regard edge expansion (padding to block boundaries)
  140. as a preprocessing/postprocessing function, even though the JPEG spec includes
  141. it in compression/decompression. We do this because downsampling/upsampling
  142. can be simplified a little if they work on padded data: it's not necessary to
  143. have special cases at the right and bottom edges. Therefore the interface
  144. buffer is always an integral number of blocks wide and high, and we expect
  145. compression preprocessing to pad the source data properly. Padding will occur
  146. only to the next block (8-sample) boundary. In an interleaved-scan situation,
  147. additional dummy blocks may be used to fill out MCUs, but the MCU assembly and
  148. disassembly logic will create or discard these blocks internally. (This is
  149. advantageous for speed reasons, since we avoid DCTing the dummy blocks.
  150. It also permits a small reduction in file size, because the compressor can
  151. choose dummy block contents so as to minimize their size in compressed form.
  152. Finally, it makes the interface buffer specification independent of whether
  153. the file is actually interleaved or not.) Applications that wish to deal
  154. directly with the downsampled data must provide similar buffering and padding
  155. for odd-sized images.
  156. *** Poor man's object-oriented programming ***
  157. It should be clear by now that we have a lot of quasi-independent processing
  158. steps, many of which have several possible behaviors. To avoid cluttering the
  159. code with lots of switch statements, we use a simple form of object-style
  160. programming to separate out the different possibilities.
  161. For example, two different color quantization algorithms could be implemented
  162. as two separate modules that present the same external interface; at runtime,
  163. the calling code will access the proper module indirectly through an "object".
  164. We can get the limited features we need while staying within portable C.
  165. The basic tool is a function pointer. An "object" is just a struct
  166. containing one or more function pointer fields, each of which corresponds to
  167. a method name in real object-oriented languages. During initialization we
  168. fill in the function pointers with references to whichever module we have
  169. determined we need to use in this run. Then invocation of the module is done
  170. by indirecting through a function pointer; on most machines this is no more
  171. expensive than a switch statement, which would be the only other way of
  172. making the required run-time choice. The really significant benefit, of
  173. course, is keeping the source code clean and well structured.
  174. We can also arrange to have private storage that varies between different
  175. implementations of the same kind of object. We do this by making all the
  176. module-specific object structs be separately allocated entities, which will
  177. be accessed via pointers in the master compression or decompression struct.
  178. The "public" fields or methods for a given kind of object are specified by
  179. a commonly known struct. But a module's initialization code can allocate
  180. a larger struct that contains the common struct as its first member, plus
  181. additional private fields. With appropriate pointer casting, the module's
  182. internal functions can access these private fields. (For a simple example,
  183. see jdatadst.c, which implements the external interface specified by struct
  184. jpeg_destination_mgr, but adds extra fields.)
  185. (Of course this would all be a lot easier if we were using C++, but we are
  186. not yet prepared to assume that everyone has a C++ compiler.)
  187. An important benefit of this scheme is that it is easy to provide multiple
  188. versions of any method, each tuned to a particular case. While a lot of
  189. precalculation might be done to select an optimal implementation of a method,
  190. the cost per invocation is constant. For example, the upsampling step might
  191. have a "generic" method, plus one or more "hardwired" methods for the most
  192. popular sampling factors; the hardwired methods would be faster because they'd
  193. use straight-line code instead of for-loops. The cost to determine which
  194. method to use is paid only once, at startup, and the selection criteria are
  195. hidden from the callers of the method.
  196. This plan differs a little bit from usual object-oriented structures, in that
  197. only one instance of each object class will exist during execution. The
  198. reason for having the class structure is that on different runs we may create
  199. different instances (choose to execute different modules). You can think of
  200. the term "method" as denoting the common interface presented by a particular
  201. set of interchangeable functions, and "object" as denoting a group of related
  202. methods, or the total shared interface behavior of a group of modules.
  203. *** Overall control structure ***
  204. We previously mentioned the need for overall control logic in the compression
  205. and decompression libraries. In IJG implementations prior to v5, overall
  206. control was mostly provided by "pipeline control" modules, which proved to be
  207. large, unwieldy, and hard to understand. To improve the situation, the
  208. control logic has been subdivided into multiple modules. The control modules
  209. consist of:
  210. 1. Master control for module selection and initialization. This has two
  211. responsibilities:
  212. 1A. Startup initialization at the beginning of image processing.
  213. The individual processing modules to be used in this run are selected
  214. and given initialization calls.
  215. 1B. Per-pass control. This determines how many passes will be performed
  216. and calls each active processing module to configure itself
  217. appropriately at the beginning of each pass. End-of-pass processing,
  218. where necessary, is also invoked from the master control module.
  219. Method selection is partially distributed, in that a particular processing
  220. module may contain several possible implementations of a particular method,
  221. which it will select among when given its initialization call. The master
  222. control code need only be concerned with decisions that affect more than
  223. one module.
  224. 2. Data buffering control. A separate control module exists for each
  225. inter-processing-step data buffer. This module is responsible for
  226. invoking the processing steps that write or read that data buffer.
  227. Each buffer controller sees the world as follows:
  228. input data => processing step A => buffer => processing step B => output data
  229. | | |
  230. ------------------ controller ------------------
  231. The controller knows the dataflow requirements of steps A and B: how much data
  232. they want to accept in one chunk and how much they output in one chunk. Its
  233. function is to manage its buffer and call A and B at the proper times.
  234. A data buffer control module may itself be viewed as a processing step by a
  235. higher-level control module; thus the control modules form a binary tree with
  236. elementary processing steps at the leaves of the tree.
  237. The control modules are objects. A considerable amount of flexibility can
  238. be had by replacing implementations of a control module. For example:
  239. * Merging of adjacent steps in the pipeline is done by replacing a control
  240. module and its pair of processing-step modules with a single processing-
  241. step module. (Hence the possible merges are determined by the tree of
  242. control modules.)
  243. * In some processing modes, a given interstep buffer need only be a "strip"
  244. buffer large enough to accommodate the desired data chunk sizes. In other
  245. modes, a full-image buffer is needed and several passes are required.
  246. The control module determines which kind of buffer is used and manipulates
  247. virtual array buffers as needed. One or both processing steps may be
  248. unaware of the multi-pass behavior.
  249. In theory, we might be able to make all of the data buffer controllers
  250. interchangeable and provide just one set of implementations for all. In
  251. practice, each one contains considerable special-case processing for its
  252. particular job. The buffer controller concept should be regarded as an
  253. overall system structuring principle, not as a complete description of the
  254. task performed by any one controller.
  255. *** Compression object structure ***
  256. Here is a sketch of the logical structure of the JPEG compression library:
  257. |-- Colorspace conversion
  258. |-- Preprocessing controller --|
  259. | |-- Downsampling
  260. Main controller --|
  261. | |-- Forward DCT, quantize
  262. |-- Coefficient controller --|
  263. |-- Entropy encoding
  264. This sketch also describes the flow of control (subroutine calls) during
  265. typical image data processing. Each of the components shown in the diagram is
  266. an "object" which may have several different implementations available. One
  267. or more source code files contain the actual implementation(s) of each object.
  268. The objects shown above are:
  269. * Main controller: buffer controller for the subsampled-data buffer, which
  270. holds the preprocessed input data. This controller invokes preprocessing to
  271. fill the subsampled-data buffer, and JPEG compression to empty it. There is
  272. usually no need for a full-image buffer here; a strip buffer is adequate.
  273. * Preprocessing controller: buffer controller for the downsampling input data
  274. buffer, which lies between colorspace conversion and downsampling. Note
  275. that a unified conversion/downsampling module would probably replace this
  276. controller entirely.
  277. * Colorspace conversion: converts application image data into the desired
  278. JPEG color space; also changes the data from pixel-interleaved layout to
  279. separate component planes. Processes one pixel row at a time.
  280. * Downsampling: performs reduction of chroma components as required.
  281. Optionally may perform pixel-level smoothing as well. Processes a "row
  282. group" at a time, where a row group is defined as Vmax pixel rows of each
  283. component before downsampling, and Vk sample rows afterwards (remember Vk
  284. differs across components). Some downsampling or smoothing algorithms may
  285. require context rows above and below the current row group; the
  286. preprocessing controller is responsible for supplying these rows via proper
  287. buffering. The downsampler is responsible for edge expansion at the right
  288. edge (i.e., extending each sample row to a multiple of 8 samples); but the
  289. preprocessing controller is responsible for vertical edge expansion (i.e.,
  290. duplicating the bottom sample row as needed to make a multiple of 8 rows).
  291. * Coefficient controller: buffer controller for the DCT-coefficient data.
  292. This controller handles MCU assembly, including insertion of dummy DCT
  293. blocks when needed at the right or bottom edge. When performing
  294. Huffman-code optimization or emitting a multiscan JPEG file, this
  295. controller is responsible for buffering the full image. The equivalent of
  296. one fully interleaved MCU row of subsampled data is processed per call,
  297. even when the JPEG file is noninterleaved.
  298. * Forward DCT and quantization: Perform DCT, quantize, and emit coefficients.
  299. Works on one or more DCT blocks at a time. (Note: the coefficients are now
  300. emitted in normal array order, which the entropy encoder is expected to
  301. convert to zigzag order as necessary. Prior versions of the IJG code did
  302. the conversion to zigzag order within the quantization step.)
  303. * Entropy encoding: Perform Huffman or arithmetic entropy coding and emit the
  304. coded data to the data destination module. Works on one MCU per call.
  305. For progressive JPEG, the same DCT blocks are fed to the entropy coder
  306. during each pass, and the coder must emit the appropriate subset of
  307. coefficients.
  308. In addition to the above objects, the compression library includes these
  309. objects:
  310. * Master control: determines the number of passes required, controls overall
  311. and per-pass initialization of the other modules.
  312. * Marker writing: generates JPEG markers (except for RSTn, which is emitted
  313. by the entropy encoder when needed).
  314. * Data destination manager: writes the output JPEG datastream to its final
  315. destination (e.g., a file). The destination manager supplied with the
  316. library knows how to write to a stdio stream; for other behaviors, the
  317. surrounding application may provide its own destination manager.
  318. * Memory manager: allocates and releases memory, controls virtual arrays
  319. (with backing store management, where required).
  320. * Error handler: performs formatting and output of error and trace messages;
  321. determines handling of nonfatal errors. The surrounding application may
  322. override some or all of this object's methods to change error handling.
  323. * Progress monitor: supports output of "percent-done" progress reports.
  324. This object represents an optional callback to the surrounding application:
  325. if wanted, it must be supplied by the application.
  326. The error handler, destination manager, and progress monitor objects are
  327. defined as separate objects in order to simplify application-specific
  328. customization of the JPEG library. A surrounding application may override
  329. individual methods or supply its own all-new implementation of one of these
  330. objects. The object interfaces for these objects are therefore treated as
  331. part of the application interface of the library, whereas the other objects
  332. are internal to the library.
  333. The error handler and memory manager are shared by JPEG compression and
  334. decompression; the progress monitor, if used, may be shared as well.
  335. *** Decompression object structure ***
  336. Here is a sketch of the logical structure of the JPEG decompression library:
  337. |-- Entropy decoding
  338. |-- Coefficient controller --|
  339. | |-- Dequantize, Inverse DCT
  340. Main controller --|
  341. | |-- Upsampling
  342. |-- Postprocessing controller --| |-- Colorspace conversion
  343. |-- Color quantization
  344. |-- Color precision reduction
  345. As before, this diagram also represents typical control flow. The objects
  346. shown are:
  347. * Main controller: buffer controller for the subsampled-data buffer, which
  348. holds the output of JPEG decompression proper. This controller's primary
  349. task is to feed the postprocessing procedure. Some upsampling algorithms
  350. may require context rows above and below the current row group; when this
  351. is true, the main controller is responsible for managing its buffer so as
  352. to make context rows available. In the current design, the main buffer is
  353. always a strip buffer; a full-image buffer is never required.
  354. * Coefficient controller: buffer controller for the DCT-coefficient data.
  355. This controller handles MCU disassembly, including deletion of any dummy
  356. DCT blocks at the right or bottom edge. When reading a multiscan JPEG
  357. file, this controller is responsible for buffering the full image.
  358. (Buffering DCT coefficients, rather than samples, is necessary to support
  359. progressive JPEG.) The equivalent of one fully interleaved MCU row of
  360. subsampled data is processed per call, even when the source JPEG file is
  361. noninterleaved.
  362. * Entropy decoding: Read coded data from the data source module and perform
  363. Huffman or arithmetic entropy decoding. Works on one MCU per call.
  364. For progressive JPEG decoding, the coefficient controller supplies the prior
  365. coefficients of each MCU (initially all zeroes), which the entropy decoder
  366. modifies in each scan.
  367. * Dequantization and inverse DCT: like it says. Note that the coefficients
  368. buffered by the coefficient controller have NOT been dequantized; we
  369. merge dequantization and inverse DCT into a single step for speed reasons.
  370. When scaled-down output is asked for, simplified DCT algorithms may be used
  371. that need fewer coefficients and emit fewer samples per DCT block, not the
  372. full 8x8. Works on one DCT block at a time.
  373. * Postprocessing controller: buffer controller for the color quantization
  374. input buffer, when quantization is in use. (Without quantization, this
  375. controller just calls the upsampler.) For two-pass quantization, this
  376. controller is responsible for buffering the full-image data.
  377. * Upsampling: restores chroma components to full size. (May support more
  378. general output rescaling, too. Note that if undersized DCT outputs have
  379. been emitted by the DCT module, this module must adjust so that properly
  380. sized outputs are created.) Works on one row group at a time. This module
  381. also calls the color conversion module, so its top level is effectively a
  382. buffer controller for the upsampling->color conversion buffer. However, in
  383. all but the highest-quality operating modes, upsampling and color
  384. conversion are likely to be merged into a single step.
  385. * Colorspace conversion: convert from JPEG color space to output color space,
  386. and change data layout from separate component planes to pixel-interleaved.
  387. Works on one pixel row at a time.
  388. * Color quantization: reduce the data to colormapped form, using either an
  389. externally specified colormap or an internally generated one. This module
  390. is not used for full-color output. Works on one pixel row at a time; may
  391. require two passes to generate a color map. Note that the output will
  392. always be a single component representing colormap indexes. In the current
  393. design, the output values are JSAMPLEs, so an 8-bit compilation cannot
  394. quantize to more than 256 colors. This is unlikely to be a problem in
  395. practice.
  396. * Color reduction: this module handles color precision reduction, e.g.,
  397. generating 15-bit color (5 bits/primary) from JPEG's 24-bit output.
  398. Not quite clear yet how this should be handled... should we merge it with
  399. colorspace conversion???
  400. Note that some high-speed operating modes might condense the entire
  401. postprocessing sequence to a single module (upsample, color convert, and
  402. quantize in one step).
  403. In addition to the above objects, the decompression library includes these
  404. objects:
  405. * Master control: determines the number of passes required, controls overall
  406. and per-pass initialization of the other modules. This is subdivided into
  407. input and output control: jdinput.c controls only input-side processing,
  408. while jdmaster.c handles overall initialization and output-side control.
  409. * Marker reading: decodes JPEG markers (except for RSTn).
  410. * Data source manager: supplies the input JPEG datastream. The source
  411. manager supplied with the library knows how to read from a stdio stream;
  412. for other behaviors, the surrounding application may provide its own source
  413. manager.
  414. * Memory manager: same as for compression library.
  415. * Error handler: same as for compression library.
  416. * Progress monitor: same as for compression library.
  417. As with compression, the data source manager, error handler, and progress
  418. monitor are candidates for replacement by a surrounding application.
  419. *** Decompression input and output separation ***
  420. To support efficient incremental display of progressive JPEG files, the
  421. decompressor is divided into two sections that can run independently:
  422. 1. Data input includes marker parsing, entropy decoding, and input into the
  423. coefficient controller's DCT coefficient buffer. Note that this
  424. processing is relatively cheap and fast.
  425. 2. Data output reads from the DCT coefficient buffer and performs the IDCT
  426. and all postprocessing steps.
  427. For a progressive JPEG file, the data input processing is allowed to get
  428. arbitrarily far ahead of the data output processing. (This occurs only
  429. if the application calls jpeg_consume_input(); otherwise input and output
  430. run in lockstep, since the input section is called only when the output
  431. section needs more data.) In this way the application can avoid making
  432. extra display passes when data is arriving faster than the display pass
  433. can run. Furthermore, it is possible to abort an output pass without
  434. losing anything, since the coefficient buffer is read-only as far as the
  435. output section is concerned. See libjpeg.txt for more detail.
  436. A full-image coefficient array is only created if the JPEG file has multiple
  437. scans (or if the application specifies buffered-image mode anyway). When
  438. reading a single-scan file, the coefficient controller normally creates only
  439. a one-MCU buffer, so input and output processing must run in lockstep in this
  440. case. jpeg_consume_input() is effectively a no-op in this situation.
  441. The main impact of dividing the decompressor in this fashion is that we must
  442. be very careful with shared variables in the cinfo data structure. Each
  443. variable that can change during the course of decompression must be
  444. classified as belonging to data input or data output, and each section must
  445. look only at its own variables. For example, the data output section may not
  446. depend on any of the variables that describe the current scan in the JPEG
  447. file, because these may change as the data input section advances into a new
  448. scan.
  449. The progress monitor is (somewhat arbitrarily) defined to treat input of the
  450. file as one pass when buffered-image mode is not used, and to ignore data
  451. input work completely when buffered-image mode is used. Note that the
  452. library has no reliable way to predict the number of passes when dealing
  453. with a progressive JPEG file, nor can it predict the number of output passes
  454. in buffered-image mode. So the work estimate is inherently bogus anyway.
  455. No comparable division is currently made in the compression library, because
  456. there isn't any real need for it.
  457. *** Data formats ***
  458. Arrays of pixel sample values use the following data structure:
  459. typedef something JSAMPLE; a pixel component value, 0..MAXJSAMPLE
  460. typedef JSAMPLE *JSAMPROW; ptr to a row of samples
  461. typedef JSAMPROW *JSAMPARRAY; ptr to a list of rows
  462. typedef JSAMPARRAY *JSAMPIMAGE; ptr to a list of color-component arrays
  463. The basic element type JSAMPLE will typically be one of unsigned char,
  464. (signed) char, or short. Short will be used if samples wider than 8 bits are
  465. to be supported (this is a compile-time option). Otherwise, unsigned char is
  466. used if possible. If the compiler only supports signed chars, then it is
  467. necessary to mask off the value when reading. Thus, all reads of JSAMPLE
  468. values must be coded as "GETJSAMPLE(value)", where the macro will be defined
  469. as "((value) & 0xFF)" on signed-char machines and "((int) (value))" elsewhere.
  470. With these conventions, JSAMPLE values can be assumed to be >= 0. This helps
  471. simplify correct rounding during downsampling, etc. The JPEG standard's
  472. specification that sample values run from -128..127 is accommodated by
  473. subtracting 128 from the sample value in the DCT step. Similarly, during
  474. decompression the output of the IDCT step will be immediately shifted back to
  475. 0..255. (NB: different values are required when 12-bit samples are in use.
  476. The code is written in terms of MAXJSAMPLE and CENTERJSAMPLE, which will be
  477. defined as 255 and 128 respectively in an 8-bit implementation, and as 4095
  478. and 2048 in a 12-bit implementation.)
  479. We use a pointer per row, rather than a two-dimensional JSAMPLE array. This
  480. choice costs only a small amount of memory and has several benefits:
  481. * Code using the data structure doesn't need to know the allocated width of
  482. the rows. This simplifies edge expansion/compression, since we can work
  483. in an array that's wider than the logical picture width.
  484. * Indexing doesn't require multiplication; this is a performance win on many
  485. machines.
  486. * Arrays with more than 64K total elements can be supported even on machines
  487. where malloc() cannot allocate chunks larger than 64K.
  488. * The rows forming a component array may be allocated at different times
  489. without extra copying. This trick allows some speedups in smoothing steps
  490. that need access to the previous and next rows.
  491. Note that each color component is stored in a separate array; we don't use the
  492. traditional layout in which the components of a pixel are stored together.
  493. This simplifies coding of modules that work on each component independently,
  494. because they don't need to know how many components there are. Furthermore,
  495. we can read or write each component to a temporary file independently, which
  496. is helpful when dealing with noninterleaved JPEG files.
  497. In general, a specific sample value is accessed by code such as
  498. GETJSAMPLE(image[colorcomponent][row][col])
  499. where col is measured from the image left edge, but row is measured from the
  500. first sample row currently in memory. Either of the first two indexings can
  501. be precomputed by copying the relevant pointer.
  502. Since most image-processing applications prefer to work on images in which
  503. the components of a pixel are stored together, the data passed to or from the
  504. surrounding application uses the traditional convention: a single pixel is
  505. represented by N consecutive JSAMPLE values, and an image row is an array of
  506. (# of color components)*(image width) JSAMPLEs. One or more rows of data can
  507. be represented by a pointer of type JSAMPARRAY in this scheme. This scheme is
  508. converted to component-wise storage inside the JPEG library. (Applications
  509. that want to skip JPEG preprocessing or postprocessing will have to contend
  510. with component-wise storage.)
  511. Arrays of DCT-coefficient values use the following data structure:
  512. typedef short JCOEF; a 16-bit signed integer
  513. typedef JCOEF JBLOCK[DCTSIZE2]; an 8x8 block of coefficients
  514. typedef JBLOCK *JBLOCKROW; ptr to one horizontal row of 8x8 blocks
  515. typedef JBLOCKROW *JBLOCKARRAY; ptr to a list of such rows
  516. typedef JBLOCKARRAY *JBLOCKIMAGE; ptr to a list of color component arrays
  517. The underlying type is at least a 16-bit signed integer; while "short" is big
  518. enough on all machines of interest, on some machines it is preferable to use
  519. "int" for speed reasons, despite the storage cost. Coefficients are grouped
  520. into 8x8 blocks (but we always use #defines DCTSIZE and DCTSIZE2 rather than
  521. "8" and "64").
  522. The contents of a coefficient block may be in either "natural" or zigzagged
  523. order, and may be true values or divided by the quantization coefficients,
  524. depending on where the block is in the processing pipeline. In the current
  525. library, coefficient blocks are kept in natural order everywhere; the entropy
  526. codecs zigzag or dezigzag the data as it is written or read. The blocks
  527. contain quantized coefficients everywhere outside the DCT/IDCT subsystems.
  528. (This latter decision may need to be revisited to support variable
  529. quantization a la JPEG Part 3.)
  530. Notice that the allocation unit is now a row of 8x8 blocks, corresponding to
  531. eight rows of samples. Otherwise the structure is much the same as for
  532. samples, and for the same reasons.
  533. On machines where malloc() can't handle a request bigger than 64Kb, this data
  534. structure limits us to rows of less than 512 JBLOCKs, or a picture width of
  535. 4000+ pixels. This seems an acceptable restriction.
  536. On 80x86 machines, the bottom-level pointer types (JSAMPROW and JBLOCKROW)
  537. must be declared as "far" pointers, but the upper levels can be "near"
  538. (implying that the pointer lists are allocated in the DS segment).
  539. We use a #define symbol FAR, which expands to the "far" keyword when
  540. compiling on 80x86 machines and to nothing elsewhere.
  541. *** Suspendable processing ***
  542. In some applications it is desirable to use the JPEG library as an
  543. incremental, memory-to-memory filter. In this situation the data source or
  544. destination may be a limited-size buffer, and we can't rely on being able to
  545. empty or refill the buffer at arbitrary times. Instead the application would
  546. like to have control return from the library at buffer overflow/underrun, and
  547. then resume compression or decompression at a later time.
  548. This scenario is supported for simple cases. (For anything more complex, we
  549. recommend that the application "bite the bullet" and develop real multitasking
  550. capability.) The libjpeg.txt file goes into more detail about the usage and
  551. limitations of this capability; here we address the implications for library
  552. structure.
  553. The essence of the problem is that the entropy codec (coder or decoder) must
  554. be prepared to stop at arbitrary times. In turn, the controllers that call
  555. the entropy codec must be able to stop before having produced or consumed all
  556. the data that they normally would handle in one call. That part is reasonably
  557. straightforward: we make the controller call interfaces include "progress
  558. counters" which indicate the number of data chunks successfully processed, and
  559. we require callers to test the counter rather than just assume all of the data
  560. was processed.
  561. Rather than trying to restart at an arbitrary point, the current Huffman
  562. codecs are designed to restart at the beginning of the current MCU after a
  563. suspension due to buffer overflow/underrun. At the start of each call, the
  564. codec's internal state is loaded from permanent storage (in the JPEG object
  565. structures) into local variables. On successful completion of the MCU, the
  566. permanent state is updated. (This copying is not very expensive, and may even
  567. lead to *improved* performance if the local variables can be registerized.)
  568. If a suspension occurs, the codec simply returns without updating the state,
  569. thus effectively reverting to the start of the MCU. Note that this implies
  570. leaving some data unprocessed in the source/destination buffer (ie, the
  571. compressed partial MCU). The data source/destination module interfaces are
  572. specified so as to make this possible. This also implies that the data buffer
  573. must be large enough to hold a worst-case compressed MCU; a couple thousand
  574. bytes should be enough.
  575. In a successive-approximation AC refinement scan, the progressive Huffman
  576. decoder has to be able to undo assignments of newly nonzero coefficients if it
  577. suspends before the MCU is complete, since decoding requires distinguishing
  578. previously-zero and previously-nonzero coefficients. This is a bit tedious
  579. but probably won't have much effect on performance. Other variants of Huffman
  580. decoding need not worry about this, since they will just store the same values
  581. again if forced to repeat the MCU.
  582. This approach would probably not work for an arithmetic codec, since its
  583. modifiable state is quite large and couldn't be copied cheaply. Instead it
  584. would have to suspend and resume exactly at the point of the buffer end.
  585. The JPEG marker reader is designed to cope with suspension at an arbitrary
  586. point. It does so by backing up to the start of the marker parameter segment,
  587. so the data buffer must be big enough to hold the largest marker of interest.
  588. Again, a couple KB should be adequate. (A special "skip" convention is used
  589. to bypass COM and APPn markers, so these can be larger than the buffer size
  590. without causing problems; otherwise a 64K buffer would be needed in the worst
  591. case.)
  592. The JPEG marker writer currently does *not* cope with suspension.
  593. We feel that this is not necessary; it is much easier simply to require
  594. the application to ensure there is enough buffer space before starting. (An
  595. empty 2K buffer is more than sufficient for the header markers; and ensuring
  596. there are a dozen or two bytes available before calling jpeg_finish_compress()
  597. will suffice for the trailer.) This would not work for writing multi-scan
  598. JPEG files, but we simply do not intend to support that capability with
  599. suspension.
  600. *** Memory manager services ***
  601. The JPEG library's memory manager controls allocation and deallocation of
  602. memory, and it manages large "virtual" data arrays on machines where the
  603. operating system does not provide virtual memory. Note that the same
  604. memory manager serves both compression and decompression operations.
  605. In all cases, allocated objects are tied to a particular compression or
  606. decompression master record, and they will be released when that master
  607. record is destroyed.
  608. The memory manager does not provide explicit deallocation of objects.
  609. Instead, objects are created in "pools" of free storage, and a whole pool
  610. can be freed at once. This approach helps prevent storage-leak bugs, and
  611. it speeds up operations whenever malloc/free are slow (as they often are).
  612. The pools can be regarded as lifetime identifiers for objects. Two
  613. pools/lifetimes are defined:
  614. * JPOOL_PERMANENT lasts until master record is destroyed
  615. * JPOOL_IMAGE lasts until done with image (JPEG datastream)
  616. Permanent lifetime is used for parameters and tables that should be carried
  617. across from one datastream to another; this includes all application-visible
  618. parameters. Image lifetime is used for everything else. (A third lifetime,
  619. JPOOL_PASS = one processing pass, was originally planned. However it was
  620. dropped as not being worthwhile. The actual usage patterns are such that the
  621. peak memory usage would be about the same anyway; and having per-pass storage
  622. substantially complicates the virtual memory allocation rules --- see below.)
  623. The memory manager deals with three kinds of object:
  624. 1. "Small" objects. Typically these require no more than 10K-20K total.
  625. 2. "Large" objects. These may require tens to hundreds of K depending on
  626. image size. Semantically they behave the same as small objects, but we
  627. distinguish them for two reasons:
  628. * On MS-DOS machines, large objects are referenced by FAR pointers,
  629. small objects by NEAR pointers.
  630. * Pool allocation heuristics may differ for large and small objects.
  631. Note that individual "large" objects cannot exceed the size allowed by
  632. type size_t, which may be 64K or less on some machines.
  633. 3. "Virtual" objects. These are large 2-D arrays of JSAMPLEs or JBLOCKs
  634. (typically large enough for the entire image being processed). The
  635. memory manager provides stripwise access to these arrays. On machines
  636. without virtual memory, the rest of the array may be swapped out to a
  637. temporary file.
  638. (Note: JSAMPARRAY and JBLOCKARRAY data structures are a combination of large
  639. objects for the data proper and small objects for the row pointers. For
  640. convenience and speed, the memory manager provides single routines to create
  641. these structures. Similarly, virtual arrays include a small control block
  642. and a JSAMPARRAY or JBLOCKARRAY working buffer, all created with one call.)
  643. In the present implementation, virtual arrays are only permitted to have image
  644. lifespan. (Permanent lifespan would not be reasonable, and pass lifespan is
  645. not very useful since a virtual array's raison d'etre is to store data for
  646. multiple passes through the image.) We also expect that only "small" objects
  647. will be given permanent lifespan, though this restriction is not required by
  648. the memory manager.
  649. In a non-virtual-memory machine, some performance benefit can be gained by
  650. making the in-memory buffers for virtual arrays be as large as possible.
  651. (For small images, the buffers might fit entirely in memory, so blind
  652. swapping would be very wasteful.) The memory manager will adjust the height
  653. of the buffers to fit within a prespecified maximum memory usage. In order
  654. to do this in a reasonably optimal fashion, the manager needs to allocate all
  655. of the virtual arrays at once. Therefore, there isn't a one-step allocation
  656. routine for virtual arrays; instead, there is a "request" routine that simply
  657. allocates the control block, and a "realize" routine (called just once) that
  658. determines space allocation and creates all of the actual buffers. The
  659. realize routine must allow for space occupied by non-virtual large objects.
  660. (We don't bother to factor in the space needed for small objects, on the
  661. grounds that it isn't worth the trouble.)
  662. To support all this, we establish the following protocol for doing business
  663. with the memory manager:
  664. 1. Modules must request virtual arrays (which may have only image lifespan)
  665. during the initial setup phase, i.e., in their jinit_xxx routines.
  666. 2. All "large" objects (including JSAMPARRAYs and JBLOCKARRAYs) must also be
  667. allocated during initial setup.
  668. 3. realize_virt_arrays will be called at the completion of initial setup.
  669. The above conventions ensure that sufficient information is available
  670. for it to choose a good size for virtual array buffers.
  671. Small objects of any lifespan may be allocated at any time. We expect that
  672. the total space used for small objects will be small enough to be negligible
  673. in the realize_virt_arrays computation.
  674. In a virtual-memory machine, we simply pretend that the available space is
  675. infinite, thus causing realize_virt_arrays to decide that it can allocate all
  676. the virtual arrays as full-size in-memory buffers. The overhead of the
  677. virtual-array access protocol is very small when no swapping occurs.
  678. A virtual array can be specified to be "pre-zeroed"; when this flag is set,
  679. never-yet-written sections of the array are set to zero before being made
  680. available to the caller. If this flag is not set, never-written sections
  681. of the array contain garbage. (This feature exists primarily because the
  682. equivalent logic would otherwise be needed in jdcoefct.c for progressive
  683. JPEG mode; we may as well make it available for possible other uses.)
  684. The first write pass on a virtual array is required to occur in top-to-bottom
  685. order; read passes, as well as any write passes after the first one, may
  686. access the array in any order. This restriction exists partly to simplify
  687. the virtual array control logic, and partly because some file systems may not
  688. support seeking beyond the current end-of-file in a temporary file. The main
  689. implication of this restriction is that rearrangement of rows (such as
  690. converting top-to-bottom data order to bottom-to-top) must be handled while
  691. reading data out of the virtual array, not while putting it in.
  692. *** Memory manager internal structure ***
  693. To isolate system dependencies as much as possible, we have broken the
  694. memory manager into two parts. There is a reasonably system-independent
  695. "front end" (jmemmgr.c) and a "back end" that contains only the code
  696. likely to change across systems. All of the memory management methods
  697. outlined above are implemented by the front end. The back end provides
  698. the following routines for use by the front end (none of these routines
  699. are known to the rest of the JPEG code):
  700. jpeg_mem_init, jpeg_mem_term system-dependent initialization/shutdown
  701. jpeg_get_small, jpeg_free_small interface to malloc and free library routines
  702. (or their equivalents)
  703. jpeg_get_large, jpeg_free_large interface to FAR malloc/free in MSDOS machines;
  704. else usually the same as
  705. jpeg_get_small/jpeg_free_small
  706. jpeg_mem_available estimate available memory
  707. jpeg_open_backing_store create a backing-store object
  708. read_backing_store, manipulate a backing-store object
  709. write_backing_store,
  710. close_backing_store
  711. On some systems there will be more than one type of backing-store object
  712. (specifically, in MS-DOS a backing store file might be an area of extended
  713. memory as well as a disk file). jpeg_open_backing_store is responsible for
  714. choosing how to implement a given object. The read/write/close routines
  715. are method pointers in the structure that describes a given object; this
  716. lets them be different for different object types.
  717. It may be necessary to ensure that backing store objects are explicitly
  718. released upon abnormal program termination. For example, MS-DOS won't free
  719. extended memory by itself. To support this, we will expect the main program
  720. or surrounding application to arrange to call self_destruct (typically via
  721. jpeg_destroy) upon abnormal termination. This may require a SIGINT signal
  722. handler or equivalent. We don't want to have the back end module install its
  723. own signal handler, because that would pre-empt the surrounding application's
  724. ability to control signal handling.
  725. The IJG distribution includes several memory manager back end implementations.
  726. Usually the same back end should be suitable for all applications on a given
  727. system, but it is possible for an application to supply its own back end at
  728. need.
  729. *** Implications of DNL marker ***
  730. Some JPEG files may use a DNL marker to postpone definition of the image
  731. height (this would be useful for a fax-like scanner's output, for instance).
  732. In these files the SOF marker claims the image height is 0, and you only
  733. find out the true image height at the end of the first scan.
  734. We could read these files as follows:
  735. 1. Upon seeing zero image height, replace it by 65535 (the maximum allowed).
  736. 2. When the DNL is found, update the image height in the global image
  737. descriptor.
  738. This implies that control modules must avoid making copies of the image
  739. height, and must re-test for termination after each MCU row. This would
  740. be easy enough to do.
  741. In cases where image-size data structures are allocated, this approach will
  742. result in very inefficient use of virtual memory or much-larger-than-necessary
  743. temporary files. This seems acceptable for something that probably won't be a
  744. mainstream usage. People might have to forgo use of memory-hogging options
  745. (such as two-pass color quantization or noninterleaved JPEG files) if they
  746. want efficient conversion of such files. (One could improve efficiency by
  747. demanding a user-supplied upper bound for the height, less than 65536; in most
  748. cases it could be much less.)
  749. The standard also permits the SOF marker to overestimate the image height,
  750. with a DNL to give the true, smaller height at the end of the first scan.
  751. This would solve the space problems if the overestimate wasn't too great.
  752. However, it implies that you don't even know whether DNL will be used.
  753. This leads to a couple of very serious objections:
  754. 1. Testing for a DNL marker must occur in the inner loop of the decompressor's
  755. Huffman decoder; this implies a speed penalty whether the feature is used
  756. or not.
  757. 2. There is no way to hide the last-minute change in image height from an
  758. application using the decoder. Thus *every* application using the IJG
  759. library would suffer a complexity penalty whether it cared about DNL or
  760. not.
  761. We currently do not support DNL because of these problems.
  762. A different approach is to insist that DNL-using files be preprocessed by a
  763. separate program that reads ahead to the DNL, then goes back and fixes the SOF
  764. marker. This is a much simpler solution and is probably far more efficient.
  765. Even if one wants piped input, buffering the first scan of the JPEG file needs
  766. a lot smaller temp file than is implied by the maximum-height method. For
  767. this approach we'd simply treat DNL as a no-op in the decompressor (at most,
  768. check that it matches the SOF image height).
  769. We will not worry about making the compressor capable of outputting DNL.
  770. Something similar to the first scheme above could be applied if anyone ever
  771. wants to make that work.