Browse Definitions :
Definition

interlaced scan

Contributor(s): Matthew Haughn

Interlaced scan is a display signal type in which one-half of the horizontal pixel rows are refreshed in one cycle and the other half in the next, meaning that two complete scans are required to display the screen image.

The i in a TV signal specification such as 1080i stands for interlaced scanning. The number indicates the number of horizontal lines in a raster. In an interlaced scan, alternating rows of pixels are refreshed in each cycle. This means that in a 60hz signal, alternating pixels rows are refreshed at 30hz each. Refreshing only half of the pixels per cycle reduces the bandwidth required for the display.

Bandwidth considerations like this were of greater concern for analog television and CRT, where bandwidth costs were high throughout the entire production. As the bandwidth in devices and Internet connections both increase, and people generally move toward higher image fidelity, progressive scan is generally preferable to interlaced display.

The main drawback of interlaced scanning is that images tend to flicker, and motion -- especially vertical motion -- appears jerky. LCD displays are natively progressive scan; displaying interlaced video requires conversion. Most LCD displays have converters, but for minimal quality loss, conversion requires ample visual processing power. Higher power graphics cards tend to include good quality de-interlacing as a feature. In some devices, de-interlacing leaves artifacts.

 

This was last updated in September 2013

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close