全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

头部缺失的JPEG文件碎片恢复

DOI: 10.11834/jig.20130103

Keywords: 数据恢复,JPEG碎片,重启标记,重构,解码

Full-Text   Cite this paper   Add to My Lib

Abstract:

JPEG碎片恢复和修复一直是数字取证领域中的一个难点和热点问题,特别是在遇到JPEG文件的头部缺失或者损坏而导致其数据无法正常解码和显示时。提出一种头部缺失且无重启标记的JPEG文件碎片解码与显示问题的解决方法。首先提出了基于JPEG碎片数据的各种解码参数(哈夫曼表、图像宽度、量化表和采样因子等)的估算方法;其次对显示时出现的位置错位和颜色偏移问题提出了相应的调整算法。实验结果表明,本文方法能够正确有效地解码并显示没有头部与重启标记的JPEG文件碎片。

References

[1]  Kornblum J D. Using JPEG quantization tables to identify imagery processed by software [J]. Digital Investigation, 2008, 5(s):21-25.
[2]  Fridrich J, Doljan M, Du R. Steganalysis based on JPEG compatibility [C]//Proceedings of the SPIE Multimedia Systems and Applications.Washington DC: SPIE Press, 2001:275-280.
[3]  Ye S, Sun Q, Chang E C. Detecting digital image forgeries by measuring inconsistencies of blocking artifact [C]//Proceedings of the IEEE International Conference on Multimedia and Expo. Beijing,China: IEEE Press, 2007:12-15.
[4]  Wortley R, Smallbone S. Child pornography on the internet [EB/OL]. (2006-05-01)[2011-12-30]. http://www.cops.usdoj.gov/Publications/ e04062000.pdf.
[5]  Ruscitti J. Child porn fight merits police resources [EB/OL]. (2008-03-14)[2011-12-30]. http://www.crime-research.org/news/16. 02.2008/3201/.
[6]  Karresand M, Shahmehri N. Oscar-?le type identi?cation of binary data in disk clusters and RAM pages [C]//Proceedings of the IFIP International Information Security Conference: Security and Privacy in Dynamic Environments. Berlin: Springer Verlag, 2006: 413-424.
[7]  Garfinkel S. Carving contiguous and fragmented files with fast object validation [J]. Digital Investigation, 2007, 4(s): 2-12.
[8]  Digital Assembly LLC. SmartCarving [EB/OL]. [2010-06-30]. http://digital-assembly.com/products/adroit-photo-forensics/features/smartcarving.html.
[9]  Mikus N. An analysis of disc carving techniques [D]. Monterey, California, USA: Naval Postgraduate School, 2005.
[10]  Golden G R Ⅲ, Vassil R. Scalpel: A frugal, high performance file carver [C]//Proceedings of the 2005 Digital Forensic Research Workshop. New Orleans: Elsevier Press, 2005: 1-10.
[11]  Pal A, Shanmugasundaram K, Menmon N. Automated reassembling images fragments [C]//Proceedings of the IEEE Interna-tional Conference on Acoustics, Speech, and Signal Processing. New York: IEEE Press, 2003: 732-735.
[12]  Pal A, Sencar H T, Memon N. Detecting file fragmentation point using sequential hypothesis testing [J]. Digital Investigation, 2008, 5(s): 2-13.
[13]  Memon N, Pal A. Automated reassembly of file fragmented images using greedy algorithms [J]. IEEE Transactions on Image Processing, 2006, 15(2): 385-393.
[14]  Karresand M, Shahmehri N. Reassembly of fragmented JPEG images containing restart markers [C]//Proceedings of the European Conference on Computer Network Defense. Washington DC: IEEE Press, 2008: 25-32.
[15]  Sencar H T, Memon N. Identification and recovery of JPEG files with missing fragments [J]. Digital Investigation, 2009, 6(s):88-98.
[16]  Xu Y, Xu M. Width extraction of JPEG fragment via frequency coefficients scale similarity measuring[C]//Proceedings of the 2nd International Conference on Future Computer and Communication.Wuhan,China: IEEE Press, 2010: 513-517.
[17]  Huffman D A. A method for the construction of minimum redundancy codes [J]. Proceedings of the IRE, 1952, 40(9): 1098-1101.
[18]  Ferguson T, Rabinowitz J H. Self-synchronizing Huffman codes [J]. IEEE Transactions on Information Theory, 1984, 30(4): 687-693.
[19]  Klein S T, Wiseman Y. Parallel Huffman decoding with applications to JPEG files [J]. The Computer Journal, 2003, 46(5):487-497.
[20]  Wallace G K. The JPEG still picture compression standard [J]. IEEE Transactions on Consumer Electronics, 1991, 34(4): 30-44.
[21]  Lu Y, Wong T T, Heng P A. Digital photo similarity analysis in frequency domain and photo album compression [C]//Procee-dings of the 3rd international conference on Mobile and ubiquitous multimedia. New York: ACM, 2004: 237-244.
[22]  Popovici I, Withers W D. Locating edges and removing ringing artifacts in JPEG images by frequency-domain analysis [J]. IEEE Transactions on Image Processing, 2007, 16(5): 1470-1474.
[23]  Lin Z C, He J F, Tang X O, et al. Fast, automatic and fine-grained tampered JPEG iamge detection via coefficient analysis [J]. Pattern Recognition, 2009, 42(11): 2492-2501.
[24]  更多...
[25]  Calvin H. JPEG compression quality from quantization tables [EB/OL]. (2006-01-01)[2011-12-30].http://www.impulseadventure.com/photo/jpeg-quantization.html.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133