Browse Definitions :
Definition

AC-3 (Dolby Digital)

AC-3, also known as Dolby Digital , is a perceptual digital audio coding technique that reduces the amount of data needed to produce high-quality sound. Perceptual digital audio coding takes advantage of the fact that the human ear screens out a certain amount of sound that is perceived as noise. Reducing, eliminating, or masking this noise significantly reduces the amount of data that needs to be provided. Dolby Laboratories developed two other perceptual coding systems, AC-1 and AC-2. Building upon Dolby's two previous coding systems, AC-3 was the first coding system designed specifically for multichannel digital audio. AC-3 is the sound format for digital television ( DTV ), digital versatile discs ( DVD s), high definition television ( HDTV ), and digital cable and satellite transmissions.

AC-3 is a 5.1 format, which means that it provides five full-bandwidth channels, front left, front right, center, surround left, and surround right. A low-frequency effect (LFE) channel is included for the sound needed for special effects and action sequences in movies. The LFE channel is one-tenth of the bandwidth of the other channels and is sometimes erroneously called the subwoofer channel. AC-3 also has a downmixing feature that ensures compatibility with devices that do not support the 5.1 format.

This was last updated in January 2011

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

What is the difference between Dolby D and Dolby E?
Cancel
The LFE channel is more normally referred to as "low-frequency extension."
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close