Untitled Document
   
You are from : ( )  
     
Untitled Document
Untitled Document
 

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

JPEG files are the most popular image format that is commonly analysed in image forensics research areas. The compositions of these files are prominent to help accomplish the problem of source identification, content classification, forgery detection, steganography, encryption, and file recovery. The purpose of this paper is to present the overview of JPEG file format, as well as identifying important characteristics of its content, which are related to signature and compression features. For analysis purposes, we used about 80 JPEG files produced from several digital devices to examine their contents. The results show that it is possible to differentiate images among JPEG files and from other file types, by examining specific content of JPEG files. .

Keywords :

: JPEG file; signature; compression

References :

  1. JEIDA, "Digital Still Camera Image File Format Standard (Exif) Version 1.0," 1995.
  2. J. Miano, Compressed Image File Formats: JPEG, PNG, GIF, XBM, BMP: Association for Computing Machinery, Inc. (ACM), 1999.
  3. M. I. Cohen, "Title," unpublished|.
  4. H. T. Sencar and N. Memon, "Identification and Recovery of JPEG Files with Missing Fragments," presented at the Digital Forensic Research Workshop, 2009.
  5. M. Xu and S. Dong. 2009, Reassembling the Fragmented JPEG Images Based on Sequential Pixel Prediction.
  6. J. v. d. Bos and T. v. d. Storm, "Bringing Domain-Specific Languages to Digital Forensics," ICSE ’11, 2011.
  7. reportlinker.com. 2012, Market Research Reports. Available: http://www.reportlinker.com/ci02061/Camera.html
  8. K. Medaris and R. Mislan. 2008, Expert: Digital evidence just as important as dna in solving crimes. Available: http://news.uns.purdue.edu/x/2008a/080425T-MislanPhones.html
  9. E. Hamilton, "JPEG File Interchange Format Version 1.02 " 1992.
  10. D. A. Huffman, "A Method for the Construction of Minimum-Redundancy Codes," Proceedings of the I.R.E, pp. 1098–1102, 1952.
  11. K. M. Mohamad and M. M. Deris, "Visualization of JPEG Metadata," IVIC 2009, LNCS 5857, pp. 543–550, 2009.
  12. M. M. Deris, et al., "Carving JPEG Images and Thumbnails Using Image Pattern Matching," 2011 IEEE Symposium on Computers & Informatics, pp. 78-83, 2011.
  13. About.com. 2013, Graphics Software. Available: http://graphicssoft.about.com/od/exifsoftware/EXIF_IPTC_XMP
  14. K. M. Mohamad and M. M. Deris, "Single-byte-marker for Detecting JPEG JFIF Header using FORIMAGE-JPEG," 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 1693-1698, 2009.
  15. K. M. Mohamad, et al., "Dual-Byte-Marker Algorithm for Detecting JFIF Header," ISA 2010, CCIS 76, pp. 17 – 26, 2010.
  16. K. M. Mohamad, et al., "Detecting JFIF Header using FORHEADER," International Journal of Security and Its Applications, vol. 5, pp. 23-36, 2011.
  17. X.-W. S. T. AG, "WinHex," 2012.
  18. M. Horz, "Hexeditor," 2009.
  19. C. Hass. 2012, JPEGsnoop. Available: www.impulseadventure.com/photo/
  20. C. Hass. 2008, Comparing JPEG Quality. Available: http://www.impulseadventure.com/photo/jpeg-quality.html
  21. N. Krawetz. 2005, jpegquality.c. Available: http://www.hackerfactor.com/src/jpegquality.c
  22. B. Carrier. 2005, Digital Forensics Tool Testing Images Available: http://dftt.sourceforge.net/
  23. K. M. Mohamad and M. M. Deris. 2009, Fragmentation Point Detection of JPEG Images at DHT Using Validator. 173-180.
  24. M. Karresand and N. Shahmehri, "Reassembly of Fragmented JPEG Images Containing Restart Markers," presented at the European Conference on Computer Network Defense, 2008.

Untitled Document
     
Untitled Document
   
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.