Don't miss an insight. Subscribe to Techopedia for free.



Last updated: October 31, 2012

What Does Transcoding Mean?

Transcoding is the process of converting a file from one encoding format to another. This allows the conversion of incompatible data to a better-supported, more modern form of data. Transcoding is often performed if the target device does not support the format or has only limited storage capability.

Transcoding is widely used in mobile phone content adaptation as well as in multimedia message servicing. Transcoding technology is also implemented in home theater PC software, enabling disk space reduction.


Techopedia Explains Transcoding

Transcoding is often used to covert video formats. It allows graphics and HTML files to be used in mobile devices and other Web-enabled products with small screens, lower bandwidth and comparatively less memory. Transcoding is implemented using a proxy server, which receives a file and uses any particular format to change it according to the client.

The transcoding process changes the bit stream format of one file to another file without any other encoding and decoding processes. This is generally effective only if the source and destination formats are alike. The data file is decoded to an uncompressed format and further encoded into a target format.

There are three types of transcoding:

  1. Lossy to Lossy
  2. Lossless to Lossless
  3. Lossless to Lossy

Transcoding with a lossy encoder decreases quality. The drawback of this process is that the resultant quality is never regained. However, this method is still used to lower bit rate in portable players, where the listener is less concerned about sound quality than saving storage space.

Lossless to lossless transcoding is recommended to avoid quality disruption. Transcoding from a lossless source to a lossy target requires keeping the lossless source files. This allows for re-encoding if the lossy result is not adequate.


Share this Term

  • Facebook
  • LinkedIn
  • Twitter

Related Reading


CybersecurityStorageData ManagementNetwork Management

Trending Articles

Go back to top