Dissecting Files. Endianness. So Many Bytes. Big Endian vs. Little Endian. Example Number. The "proper" order of things. Week 6
|
|
- Alannah Anderson
- 5 years ago
- Views:
Transcription
1 Dissecting Files Endianness Week 6 The "proper" order of things So Many Bytes So Many Bytes On a 32-bit system, each word consists of 4 bytes So, when any 32-bit value is stored in memory, each of those 4 bytes must be stored However, question remains: What order do we store them? Do we store the least-significant byte first, or the most-significant? As long as a system always follows the same format, then there are no problems but different system use different approaches 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Big Endian vs. Little Endian Example Number Big-Endian approach store the most significant byte (largest value) first used by Motorola, PowerPC Little-Endian approach store the least significant byte (smallest value) first used by Intel appears "backwards" in editors Most significant Byte 2,309,737, AB CD EF Least significant Byte 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer
2 Big Endian vs. Little Endian No "End" to Problems Big Endian AB 2 CD 3 EF 89 AB CD EF There is a problem... if two Little Endian EF CD AB 89 systems use different formats, data will be interpreted wrong! For example: a little-endian system reads a value stored in big-endian a big-endian system reads a value stored in little-endian 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Endianness in File Formats So who is correct? Adobe Photoshop - Big Endian Windows Bitmap (.BMP) - Little Endian GIF - Little Endian JPEG - Big Endian Is the Intel Pentium (little endian) or the PowerPC (big endian) correct? In reality neither side is correct both formats are equally correct 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Gulliver's Travels File Headers Knowing the file by its meaty guts 7/28/2018 Sacramento State - Cook - CSc Summer
3 File Signatures File Signatures A filename is a vital helps identify both the name (and thus contents) of the file Windows and the Internet, use the file extension to identify the type of file If the extension is changed or the file name is lost, Windows can't identify the file type & automatically open it 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer File Signatures File Signatures Fortunately, a file can often be identified by looking its binary contents Most file types contain a header the start of the file is used to store metadata - information about the file s contents e.g. width of an image, color palette, etc simpler files (such as plain text files) do not have a header but most do Often the header of a file contains the actual name of the file type in ASCII text! which makes it identifiable by looking at the raw bytes The header (plus any bytes in the file s body) that be used to uniquely identify the file type is referred to as the file signature 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Analyzing Files Unallocated Files To analyze the raw contents of a file, you need a hex editor This tool displays the bytes in hexadecimal format allowing you to see every byte Often the tools can help you interpret the raw data, but this varies greatly between tools When investigating a hard drive, understanding file signatures is vital If the file is found in a hard drive s unallocated space, there might be vital information missing the original name of the file good luck. the file type the size of the file how many bytes are there? The file s signature can be used to interpret the data and make it recoverable 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer
4 JPEG Very photogenic! JPEG Files JPEGs are stored using in the JPEG File Interchange Format (JFIF) The file header contains information about the density of the picture (pixels per inch/cm) It also can contain a embedded thumbnail it is stored as a true color uncompressed image so, all JPEGs can contain two images it can be used to hide steganographic data 7/28/2018 Sacramento State - Cook - CSc Summer JFIF Signature JFIF Signature JPEGs start with 4 bytes: FF D8 FF E0 Next, there are 2 bytes which will contain different values depending on the file The next 4 bytes contain the text JFIF JFIF Signature Signature Bytes FF D8 FF E A How it Appears ÿ Ø ÿ à J F I F 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer JFIF Header JFIF File Format Field Size Description Header marker 2 First two bytes are always FF D8 Application marker 2 Always FF E0 Length 2 Size of the header Identifier 5 JFIF" + a byte containing 00 Version 2 The first byte is the major version; second is minor Scale 1 Specifies whether inches or centimeters are used X density 2 Pixels per inch/centimeter Y density 2 Pixels per inch/centimeter Thumb width 1 Horizontal size of embedded thumbnail in pixels Thumb height 1 Vertical size of embedded thumbnail in pixels Thumb data varies Uncompressed 24 bit thumbnail Varies depending the size of the header JFIF Can contain steganographic data 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer
5 Exchangeable Image File format Exchangeable Image File format There are several extensions to the classic JFIF format - the most notable is the Exchangeable Image File format (EXIF) It is used to store considerable information about the image such If present, it is definitely of interest of investigator Some of the data that is stored: make and model of the digital camera time and date the picture was taken distance the camera was focused at GPS where the picture was taken (if applicable) serial numbers 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer GIF Files GIF Files A legend of the Internet GIFs were created by CompuServe in 1987 to use with its online software The format is popular today to create simple images and basic animation There are actually two versions of the file GIF 87 Original format, no animations GIF 89 Animation! 7/28/2018 Sacramento State - Cook - CSc Summer GIF Files GIF Signature The file format allows a number of features: multiple images (each can have its own palette) timing and placement control looping simple iteration, nothing fancy transparency comments! Comments are hidden often used to save information about the generating software can be used to hide a secret message remember Base64 GIF signature is easy to spot First six bytes contain the text GIF87a This is slightly different for GIF 89, which contains GIF89a GIF Signature Signature Bytes How it Appears G I F 8 7 a 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer
6 GIF Signature GIF Header Field Size Description Identifier 6 GIF87a or GIF89a Width 2 Total width of the image Height 2 Total height of the image Global Palette size colors Transparent Index 1 Index into the palette that will be transparent Aspect ratio 1 Always zero Global Palette varies Uncompressed 24 bit values 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer GIF Header Always the same 6 bytes for GIF87 or GIF89 PNG Files Contains a various items The bling-bling of pngs! 7/28/2018 Sacramento State - Cook - CSc Summer PNG Files PNG Files PNG (pronounced Ping ) is a relatively new file format It was designed to replace other bitmap file formats and work with the Internet It is also backwards and forwards compatible and easily extendable As a result, this format is designed to work forever PNGs support nearly all the features found in other graphics files with the exception of animation however, this can be added in the future Some features: True color or palette Supports translucency (not just transparency) Store unlimited meta-data about the image 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer
7 PNG Signature PNG Signature PNG headers contain bytes designed so computers will not mistake it for a text file After the initial byte, the header contains PNG This is followed by four control characters PNG Signature Signature Bytes E 47 0D 0A 1A 0A How it Appears P N G 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer PNG Chunks PNG File Format Following the first 8 bytes, a PNG file can contain any number of chunks Each chunk starts a 4 byte chunk length. So every chunk can contain up to 4,294,967,296 bytes contains a 4 byte ASCII identifier are backwards and forwards compatible. If a PNG reader does not understand a chunk identifier, it skips the section it also contains a CRC error check 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer PNG Chunks Critical Chunks Chunks are classified into 2 categories Critical Chunks are necessary to identify the image, set bounds and other items that must be included. Ancillary Chunks help the image, but are not required. They can be safely ignored though the image might not look correct if a chunk type is not recognized, it will be ignored Type IHDR PLTE IDAT IEND Contents The true header is contained in this chuck. This is required and is the first chunk If the image uses a palette, this chunk contains the table The image data This chunk marks the end of the file 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer
8 Ancillary Chunks Just a few Text Ancillary Chunks Type bkgb chrm gama sbit time trns Contents Default background color Chromaticity settings (for color correction) Gamma information Color accuracy Time stamp for the image Transparency information PNGs can contain a number of hidden text fields these are used to store comments, information about the image, or anything the user needs these can be used to store hidden data (Base64) Since unrecognized chunk types are ignored, fake chunks can be snuck into a file and used to store hidden data So, in addition to the least-significant bit method, there other ways to hide data in PNGs 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Ancillary Text Chunks Graphics File Signature Summary Type Contents itxt Unicode text. This can be compressed text Stores text with a key = value time format. This allows image attributes to be stored similar to how to INI values. The format uses a 00 byte rather than an equals ztxt Compressed version of text File Type Signature How it Looks JPEG FF D8 FF E A GIF GIF87a GIF89a ÿøÿà JFIF PNG E 47 0D 0A 1A 0A PNG BMP 42 4D BM 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer File Carving File Carving Do you want the light bytes or the dark bytes? Even, if the file is found partially on a hard disk, it can still be recovered using a process data carving or data salvaging Header can contain info about the total size of the file this is vital to know how many bytes to copy 7/28/2018 Sacramento State - Cook - CSc Summer
9 Review: Hard Disk Technology Review: How Data is Organized The data is stored in circles which we call tracks Each track is divided into small pieces called sectors. Most disks store 512 bytes to a sector Disks contain enormous numbers of sectors so a file system groups several into a cluster 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Hard Disk Clusters Unallocated Space Deleted File Header Signature Cluster Sector Deleted File 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Reconstructing Files Continuous File Basically, you need to find the all used clusters fortunately, these are usually continuous on the hard disk but not necessarily on nearlyfull volumes Then, export the clusters (in the correct order) and reconstruct them into a new file To restore the file, copy the used sectors and store it a new file The signatures (header and possibly one in the body) can be used to identify the type 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer
10 Fragmented File File Repair Finding the next cluster, for fragmented files, can be difficult Fortunately, often the file s body (depending on the type) can have signatures Using these signatures, you can find the next cluster Sadly, when cluster is overwritten the start of the cluster is overwritten first this is the beginning of the previous file so essentially the header is the first casualty First, try to open the file normally the software might compensate for the damage 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer File Repair File Repair However, this is not always the case You will need to reconstruct the file so it can be viewed So, you need to: recover more pieces of file if needed examine file header & repair it test the corrected file A new header, can be carefully created and combined with the partial file to create a new complete file This is called grafting, and is not easy 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Destroyed File Header A file may be partially overwritten You have to repair (graft) the missing sections! If the header is destroyed, you must rely on other signatures to identify the file 7/28/2018 Sacramento State - Cook - CSc Summer
Bytes are read Right to Left, so = 0x3412, = 0x
Practice - Quiz #5 CIST 2612 Computer Forensics Bitmap File Information Bytes are read Right to Left, so 12 34 = 0x3412, 12 34 56 70 = 0x70563412 Figure 1 - Bitmap File Header Figure 2 - Device Independent
More informationIntroduction. Collecting, Searching and Sorting evidence. File Storage
Collecting, Searching and Sorting evidence Introduction Recovering data is the first step in analyzing an investigation s data Recent studies: big volume of data Each suspect in a criminal case: 5 hard
More informationMultimedia Systems. Part 4. Mahdi Vasighi
Multimedia Systems Part 4 Mahdi Vasighi www.iasbs.ac.ir/~vasighi Department of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences, Zanjan, Iran Image Formats
More informationModel-Driven Engineering in Digital Forensics. Jeroen van den Bos with Tijs van der Storm and Leon Aronson
Model-Driven Engineering in Digital Forensics Jeroen van den Bos (jeroen@infuse.org) with Tijs van der Storm and Leon Aronson Contents Digital forensics MDE in forensics Domain-specific optimizations Conclusion
More informationData Storage JMU Computer Science Content Teaching Academy 2014
Data Storage JMU Computer Science Content Teaching Academy 2014 Florian Buchholz buchhofp@jmu.edu Abstraction layers to interpret data and information Physical layer Data is physically stored Device BIOS
More informationElementary Computing CSC 100. M. Cheng, Computer Science
Elementary Computing CSC 100 1 Graphics & Media Scalable Outline & Bit- mapped Fonts Binary Number Representation & Text Pixels, Colors and Resolution Sound & Digital Audio Film & Digital Video Data Compression
More informationBMP file format - Wikipedia
Page 1 of 3 Bitmap file header This block of bytes is at the start of the file and is used to identify the file. A typical application reads this block first to ensure that the file is actually a BMP file
More informationImage Compression. cs2: Computational Thinking for Scientists.
Image Compression cs2: Computational Thinking for Scientists Çetin Kaya Koç http://cs.ucsb.edu/~koc/cs2 koc@cs.ucsb.edu The course was developed with input from: Ömer Eǧecioǧlu (Computer Science), Maribel
More informationChapter 1 (Computer Forensics)
Final Study Guide Chapter 1 (Computer Forensics) CIST2612 Final will be given Sunday the 22 from 10:30 to 12:30 22 nd of May nd of Understanding Computer forensics {pages 2-3} Computer forensics involves
More informationCommon File Formats. Need a standard to store images Raster data Photos Synthetic renderings. Vector Graphic Illustrations Fonts
1 Image Files Common File Formats Need a standard to store images Raster data Photos Synthetic renderings Vector Graphic Illustrations Fonts Bitmap Format - Center for Graphics and Geometric Computing,
More informationThis is not yellow. Image Files - Center for Graphics and Geometric Computing, Technion 2
1 Image Files This is not yellow Image Files - Center for Graphics and Geometric Computing, Technion 2 Common File Formats Need a standard to store images Raster data Photos Synthetic renderings Vector
More informationIT153 Midterm Study Guide
IT153 Midterm Study Guide These are facts about the Adobe Dreamweaver CS4 Application. If you know these facts, you should be able to do well on your midterm. Dreamweaver users work in the Document window
More informationLecture 19 Media Formats
Revision IMS2603 Information Management in Organisations Lecture 19 Media Formats Last week s lectures looked at MARC as a specific instance of complex metadata representation and at Content Management
More informationStandard File Formats
Standard File Formats Introduction:... 2 Text: TXT and RTF... 4 Grapics: BMP, GIF, JPG and PNG... 5 Audio: WAV and MP3... 8 Video: AVI and MPG... 11 Page 1 Introduction You can store many different types
More informationIntroduction to carving File fragmentation Object validation Carving methods Conclusion
Simson L. Garfinkel Presented by Jevin Sweval Introduction to carving File fragmentation Object validation Carving methods Conclusion 1 Carving is the recovery of files from a raw dump of a storage device
More informationGraphics File Formats
1 Graphics File Formats Why have graphics file formats? What to look for when choosing a file format A sample tour of different file formats, including bitmap-based formats vector-based formats metafiles
More informationITP 101 Project 2 - Photoshop
ITP 101 Project 2 - Photoshop Project Objectives Learn how to use an image editing application to create digital images. We will use Adobe Photoshop for this project. Project Details To continue the development
More informationWATERMARK S ENSE User Guide. VeprIT.
WATERMARK S ENSE User Guide VeprIT http://veprit.com support@veprit.com Based on version 1.2.0. April 28, 2014 VeprIT - Watermark Sense User Guide Page 1 Contents 1 Main Concepts 3 2 User Interface Overview
More informationBMP file format. Contents. Pixel storage. The BMP file format, sometimes called bitmap. or DIB file format (for device-independent
1 of 7 BMP file format From Wikipedia, the free encyclopedia Windows Bitmap The BMP file format, sometimes called bitmap File extension:.bmp or.dib or DIB file format (for device-independent MIME type:
More informationSources of Evidence. CSF: Forensics Cyber-Security. Part I. Foundations of Digital Forensics. Fall 2015 Nuno Santos
Sources of Evidence Part I. Foundations of Digital Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary Reasoning about sources of evidence Data representation and interpretation Number
More information21st-Century Image and Data Exchange Standards
Course IN22-1 21st-Century Image and Data Exchange Standards Peter Sheerin Dec 3, 2003 02:00 PM 03:30 PM 1 2 Why do Formats Matter? Image quality Interoperability Capabilities/features Alpha channel/transparency
More informationChapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.
Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems
More informationJava Oriented Object Programming II Files II - Binary I/O Lesson 3
Java Oriented Object Programming II Files II - Binary I/O Lesson 3 The objectives in this lesson are: Convert Binary to Hexadecimals (vice versa) Understand Binary Code Use Hex Editors Explain how Streams
More informationBreeze User Guide. Breeze Multiple Stream Video Processors. Light and Standard Editions Version 5.3.2
Breeze User Guide Breeze Multiple Stream Video Processors Light and Standard Editions Version 5.3.2 Copyright 1989-2007 Discovery Scientific, LLC All rights reserved www.discoverybiz.net January 01, 2007
More informationCreating Web Pages with SeaMonkey Composer
1 of 26 6/13/2011 11:26 PM Creating Web Pages with SeaMonkey Composer SeaMonkey Composer lets you create your own web pages and publish them on the web. You don't have to know HTML to use Composer; it
More informationData Representation From 0s and 1s to images CPSC 101
Data Representation From 0s and 1s to images CPSC 101 Learning Goals After the Data Representation: Images unit, you will be able to: Recognize and translate between binary and decimal numbers Define bit,
More informationPSD to Mobile UI Tutorial
PSD to Mobile UI Tutorial Contents Planning for design... 4 Decide the support devices for the application... 4 Target Device for design... 4 Import Asset package... 5 Basic Setting... 5 Preparation for
More informationCP SC 4040/6040 Computer Graphics Images. Joshua Levine
CP SC 4040/6040 Computer Graphics Images Joshua Levine levinej@clemson.edu Lecture 03 File Formats Aug. 27, 2015 Agenda pa01 - Due Tues. 9/8 at 11:59pm More info: http://people.cs.clemson.edu/ ~levinej/courses/6040
More informationFrequently Asked Questions about Text and Graphics
1 Frequently Asked Questions about Text and Graphics 1. What is a font? A font is a set of printable or displayable text characters that are in a specific style and size. The type design for a set of fonts
More informationINFS 2150 / 7150 Intro to Web Development / HTML Programming
XP INFS 2150 / 7150 Intro to Web Development / HTML Programming Working with Graphics in a Web Page 1 Objectives Learn about different image formats Control the placement and appearance of images on a
More informationWeb graphics. Introduction
Web graphics Introduction Role of Web Graphics Role of Web Graphics Although web designers could build a site without graphics, most users would not readily recognize a collection of bare pages as a cohesive
More informationComputer Organization & Architecture M. A, El-dosuky
4.1-storage systems and technology Memory as a Linear Array Computer Organization & Architecture M. A, El-dosuky A byte-addressable memory with N bytes is the logical equivalent of a C++ array, declared
More informationImage creation with PHP
Image creation with PHP By Kore Nordmann PHP Unconference Hamburg 25.04.08 About me Kore Nordmann Studying computer science at the University Dortmund Working for ez systems on ez components Maintainer
More informationCreate a Contact Sheet of Your Images Design a Picture Package Customize Your Picture Package Layout Resample Your Image...
72 71 Create a Contact Sheet of Your Images................... 158 Design a Picture Package............ 160 73 Customize Your Picture Package Layout.... 162 74 Resample Your Image.................... 164
More informationCMPT 165 Graphics Part 2. Nov 3 rd, 2015
CMPT 165 Graphics Part 2 Nov 3 rd, 2015 Key concepts of Unit 5-Part 1 Image resolution Pixel, bits and bytes Colour info (intensity) vs. coordinates Colour-depth Color Dithering Compression Transparency
More informationRecover My Files Data Recovery Software English V3.98. The Options Button
Page 1 of 5 Recover My Files Data Recovery Software English V3.98 The Options Button To access the program options, click on the Options button on "Manually Set Options" in the search selection window
More informationOBJECTIVES After reading this chapter, the student should be able to:
Data Representation OBJECTIVES After reading this chapter, the student should be able to: Define data types. Visualize how data are stored inside a computer. Understand the differences between text, numbers,
More informationPurePNG Documentation
PurePNG Documentation Release 0.3.0 Pavel Zlatovratskii 2017-11-10 Contents 1 What is PurePNG? 3 1.1 Comparison to other PNG tools................................... 3 1.2 Installation..............................................
More informationChapter 1. Hardware. Introduction to Computers and Programming. Chapter 1.2
Chapter Introduction to Computers and Programming Hardware Chapter.2 Hardware Categories Input Devices Process Devices Output Devices Store Devices /2/27 Sacramento State - CSc A 3 Storage Devices Primary
More informationCIPA DC- 009-Translation- 2010
Standard of the Camera & Imaging Products Association CIPA DC- 009-Translation- 2010 Design rule for Camera File system: DCF Version 2.0 (Edition 2010) This translation has been made based on the original
More informationAdvanced High Graphics
VISUAL MEDIA FILE TYPES JPG/JPEG: (Joint photographic expert group) The JPEG is one of the most common raster file formats. It s a format often used by digital cameras as it was designed primarily for
More informationSoftware Requirements Specification BRIC. for. Requirements for Version Prepared by Panagiotis Vasileiadis
Software Requirements Specification for BRIC Requirements for Version 0.8.0 Prepared by Panagiotis Vasileiadis Introduction to Software Engineering, Aristotle University 01/04/2014 Software Requirements
More informationData Representation and Networking
Data Representation and Networking Instructor: Dmitri A. Gusev Spring 2007 CSC 120.02: Introduction to Computer Science Lecture 3, January 30, 2007 Data Representation Topics Covered in Lecture 2 (recap+)
More informationTechnical concepts. Some basics of computers today. Comp 399
Technical concepts Some basics of computers today. Comp 399 Admin Anyone new?. http://www.cnn.com/2013/07/12/tech/social-media http://tv.msnbc.com/2013/08/13/pre-trial-hearings- Locard's Exchange Principle
More informationImage Types Vector vs. Raster
Image Types Have you ever wondered when you should use a JPG instead of a PNG? Or maybe you are just trying to figure out which program opens an INDD? Unless you are a graphic designer by training (like
More informationPhotoshop tutorial: Final Product in Photoshop:
Disclaimer: There are many, many ways to approach web design. This tutorial is neither the most cutting-edge nor most efficient. Instead, this tutorial is set-up to show you as many functions in Photoshop
More information255, 255, 0 0, 255, 255 XHTML:
Colour Concepts How Colours are Displayed FIG-5.1 Have you looked closely at your television screen recently? It's in full colour, showing every colour and shade that your eye is capable of seeing. And
More informationReviewer s Guide. Morpheus Photo Warper. Screenshots. Tutorial. Included in the Reviewer s Guide: Loading Pictures
Morpheus Photo Warper Reviewer s Guide Morpheus Photo Warper is easy-to-use picture distortion software that warps and exaggerates portions of photos such as body parts! Have you ever wanted to distort
More informationFineReader Engine Overview & New Features in V10
FineReader Engine Overview & New Features in V10 Semyon Sergunin ABBYY Headquarters September 2010 Michael Fuchs ABBYY Europe GmbH September 2010 FineReader Engine Processing Steps Step 1: Image/Document
More informationImage Formats. Ioannis Rekleitis
Image Formats Ioannis Rekleitis JPEG/JFIF JPEG 2000 GIF PNG TIFF PPM, PGM, PBM, and PNM Exif BMP WebP HDR raster formats HEIF BAT BPG CSCE 590: Introduction to Image Processing https://en.wikipedia.org/wiki/image_file_formats
More informationNAME optipng optimize Portable Network Graphics files. SYNOPSIS optipng [? h help] optipng [options...] files...
NAME optipng optimize Portable Network Graphics files SYNOPSIS optipng [? h help] optipng [options...] files... DESCRIPTION OptiPNG shall attempt to optimize PNG files, i.e. reduce their size to a minimum,
More informationExample 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3
1.1.1 Binary systems In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different
More informationUnderstanding FAT12. Introduction to Computer Forensics. Kessler/Schirling
Understanding FAT12 Introduction to Computer Forensics Kessler/Schirling Fall 2002 EXP 248 Project #3 You have a floppy disk image file Examine floppy to find an address and a password, and verify MD5
More informationDERRIC. Model-Driven Engineering in Digital Forensics. Jeroen van den Bos
DERRIC Model-Driven Engineering in Digital Forensics Jeroen van den Bos jeroen@infuse.org DERRIC Model-Driven Engineering in Digital Forensics Experience: Jeroen van den Bos jeroen@infuse.org 1998: software
More informationRunning head: FTK IMAGER 1
Running head: FTK IMAGER 1 FTK Imager Jean-Raymond Ducasse CSOL-590 June 26, 2017 Thomas Plunkett FTK IMAGER 2 FTK Imager Outline Process for Adding Individual Files & Folders as Evidence Items Although
More informationImage Optimisation. Image Dimensions...1 Image File Formats...2 Adding Images...5 Thumbnails...13 Summary...15
Table of Contents Image Optimisation Image Dimensions...1 Image File Formats...2 Adding Images...5 Thumbnails...13 Summary...15 Introduction Images are placed on a website to enhance its appearance. However,
More informationExporting Images from Lightroom
Li kewhatyou see? Buyt hebookat t hefocalbookst or e AdobePhot oshop Li ght r oom 2 Huss& Pl ot ki n ISBN 9780240521336 Getting Your Photos into Lightroom Exporting Images from Lightroom Although Lightroom
More information7: Image Compression
7: Image Compression Mark Handley Image Compression GIF (Graphics Interchange Format) PNG (Portable Network Graphics) MNG (Multiple-image Network Graphics) JPEG (Join Picture Expert Group) 1 GIF (Graphics
More informationA Quick Introduction to IFF
A Quick Introduction to IFF Jerry Morrison, Electronic Arts 10-17-88 IFF is the Amiga-standard "Interchange File Format", designed to work across many machines. Why IFF? Did you ever have this happen to
More informationlesson 3 Transforming Data into Information
essential concepts lesson 3 Transforming Data into Information This lesson includes the following sections: How Computers Represent Data How Computers Process Data Factors Affecting Processing Speed Extending
More informationBricks'n'Tiles. Tutorial Creating a brick file and texturing a medieval tower. Easy Creation of Architectural Textures.
Bricks'n'Tiles Easy Creation of Architectural Textures www.bricksntiles.com Tutorial Creating a brick file and texturing a medieval tower 1 Introduction Welcome this this Bricks'n'Tiles Tutorial. Brick'n'Tiles
More informationError correction and Extensions from BasePac 6.04 to BasePac 7.00
Error correction and Extensions from BasePac 6.04 to BasePac 7.00 Common / Design management Design import from Explorer Load stitch data Search in folders Mouse wheel Save as ZSK Memory Slanting of modules
More informationMidterm Review. October 17
Midterm Review October 17 Midterm Layout Some multiple choice, matching, true/false Not much though Will mostly be short answer You will have to write/edit/sketch some HTML You will have to write/edit/sketch
More informationSocial Issues. spam Espionage forgery access to your data years from today destroying old records/ data
CS Concepts document formats interpreting bits ascii, jpg, mp3, meta data representing digital images modeling vs rendering ocr sampling rate cloud computing data compression spatial coherence temporal
More informationAdobe Photoshop CS2 Reference Guide For Windows
This program is located: Adobe Photoshop CS2 Reference Guide For Windows Start > All Programs > Photo Editing and Scanning >Adobe Photoshop CS2 General Keyboarding Tips: TAB Show/Hide Toolbox and Palettes
More informationBinary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example
The Basics Binary Numbers Part Bit of This and a Bit of That What is a Number? Base Number We use the Hindu-Arabic Number System positional grouping system each position represents a power of Binary numbers
More informationPublic comments on this W3C Recommendation are welcome. Please send them to the archived list
Portable Network Graphics (PNG) Specification (Second Edition) Information technology Computer graphics and image processing Portable Network Graphics (PNG): Functional specification. ISO/IEC 15948:2003
More informationINSTITUTO SUPERIOR TÉCNICO
INSTITUTO SUPERIOR TÉCNICO DEPARTAMENTO DE ENGENHARIA INFORMÁTICA FORENSICS CYBER-SECURITY MEIC, METI Lab Guide II Evidence Examination 2015/2016 nuno.m.santos@tecnico.ulisboa.pt 1 Introduction This guide
More informationPreview from Notesale.co.uk Page 2 of 88
Contents About this Guide Information for Students... Be Revise-Wise How to Use this Guide to Do Well in Your Exams... Revision Checklist... 4 1 Data and Quality of Data... 5 1.1 Encoding and Storing Data...7
More informationSpecification of the PFS File Format version 1.5
Specification of the PFS File Format version 1.5 October 14, 2008 1 Introduction This document contains a detailed specification of the pfs file format. PFS file format is intended to store in particular
More informationIntroduction. You might be interested in the system requirements, the installation, payment and registration procedures.
Introduction Contenta NEF Converter is a simple and powerful tool to convert your NEF photos. It does support a very wide range of Nikon cameras. It is simple to use because of its intuitive interface
More informationThis instruction manual may not be copied either in part or in its entirety without the prior permission of Minolta Co., Ltd Minolta Co., Ltd.
This instruction manual does not provide instructions for the basic operation of the personal computers, or the basic operation of Windows or Mac OS operating systems. Please refer to the manual that came
More informationThe bmpsize package. Heiko Oberdiek <heiko.oberdiek at googl .com> 2016/05/16 v1.7
The bmpsize package Heiko Oberdiek 2016/05/16 v1.7 Abstract Package bmpsize analyzes bitmap images to extract size and resolution data. It adds this feature to the graphics
More informationcolor bit depth dithered
EPS The EPS (Encapsulated PostScript) format is widely accepted by the graphic arts industry for saving images that will be placed into programs such as Adobe Illustrator and QuarkXPress. It is used on
More informationData Maintenance Tool
DT700 Series Data Maintenance Tool User's Guide A50-017029-001 Ver. 1.2 June 2009 Notice (1) Information in this guide is subject to change without notice. (2) If you find any unclear or incorrect description
More informationImage rescue Quick Start Guide
Image rescue Quick Start Guide Image Recovery - Recovers lost or deleted image files (JPEG, TIFF and RAW), from your memory card, even if you have erased them, reformatted the card, or your card has become
More informationFormat Type Support Thru. vector (with embedded bitmaps)
1. Overview of Graphics Support The table below summarizes the theoretical support for graphical formats within FOP. In other words, within the constraints of the limitations listed here, these formats
More informationCS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng.
CS 265 Computer Architecture Wei Lu, Ph.D., P.Eng. 1 Part 1: Data Representation Our goal: revisit and re-establish fundamental of mathematics for the computer architecture course Overview: what are bits
More informationWhat you will learn 2. Converting to PDF Format 15 Converting to PS Format 16 Converting to HTML format 17 Saving and Updating documents 19
What you will learn 2 Creating Text 3 Inserting a CAD Graphic 5 Inserting images from CorelDraw or Designer 8 Inserting Photos or Scanned pages 10 Inserting Objects from Excel or Project 11 Cropping or
More informationGuide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems
Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic
More informationTools Menu (Frequently Used Features)
Tools Menu (Frequently Used Features) Exit VoxelCalc Shop for features Show VoxelCalc User Guide (right click on oither icons shows user guide for that function) Region of Interest (ROI) tool with beam
More informationOperating Systems. Operating Systems Professor Sina Meraji U of T
Operating Systems Operating Systems Professor Sina Meraji U of T How are file systems implemented? File system implementation Files and directories live on secondary storage Anything outside of primary
More informationSketchUp Fundamentals 2
KU Design Group llc SketchUp Fundamentals 2 Led by: Mark-o Kennelly Ullman May 3, 2012 A download of today s handout is available at: kudesigngroup.com/niketraining 2012 KU Design Group llc T (503) 583-2194
More informationPanasonic HD Writer AE File Formats. Herbert Oppmann
Panasonic HD Writer AE File Formats Herbert Oppmann herby@memotech.franken.de http://www.memotech.franken.de/fileformats/ 2018-01-01 Content Panasonic HD Writer AE File Formats...3 Content (*.cont) File
More informationMedia Types. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of
Contents Media Types Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information [http://creativecommons.org/licenses/by/3.0/]
More informationFile Systems Management and Examples
File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size
More informationDesign Tradeoffs for Developing Fragmented Video Carving Tools
DIGITAL FORENSIC RESEARCH CONFERENCE Design Tradeoffs for Developing Fragmented Video Carving Tools By Eoghan Casey and Rikkert Zoun Presented At The Digital Forensic Research Conference DFRWS 2014 USA
More informationINDESIGN AND PHOTOSHOP
NEIL MALEK, ACI With just a few basic tools, anyone can professionally polish photos in Photoshop and arrange them into a layout in InDesign. The incredible power and diverse tools can be intimidating,
More informationGCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three %
GCSE Computing Revision Pack TWO Data Representation Questions Name: /113 Attempt One % Attempt Two % Attempt Three % Areas of Strength Areas for Development 1. Explain how ASCII is used to represent text
More informationThis is not an official directory; it is for voluntary participation only and does not guarantee that someone will not use the same identifier.
Cover Sheet for the GIF89a Specification DEFERRED CLEAR CODE IN LZW COMPRESSION There has been confusion about where clear codes can be found in the data stream. As the specification says, they may appear
More informationLesson 3 Creating and Using Graphics
Lesson What you will learn: how to delete a sprite and import a new sprite how to draw using the pen feature of Scratch how to use the pen up and pen down feature how to change the colour of the pen how
More informationFireworks 3 Animation and Rollovers
Fireworks 3 Animation and Rollovers What is Fireworks Fireworks is Web graphics program designed by Macromedia. It enables users to create any sort of graphics as well as to import GIF, JPEG, PNG photos
More informationUnderstanding file formats
Understanding file formats When you save files from Elements, you need to pick a file format in the Format drop-down menu found in both the Save and Save As dialog boxes. When you choose from the different
More informationAfter the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning
After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive
More informationDigital Data. 10/11/2011 Prepared by: Khuzaima Jallad
Chapter 2 Digital Data Elements of Digital Data Digital Codes Files Digitization File Compression Advantages of Digital Information Challenges of Digital Information 2 Digital Data ELEMENTS OF DIGITAL
More informationRepresenting Graphical Data
Representing Graphical Data Chapman & Chapman, chapters 3,4,5 Richardson 1 Graphics in IT82 What does computer graphics cover? IT82 Input, output, and representation of graphical data Creation of graphics
More informationComputer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase
Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files
More informationDifferent File Types and their Use
Different File Types and their Use.DOC (Microsoft Word Document) Text Files A DOC file is a Word processing document created by Microsoft Word, a word processor included with all versions of Microsoft
More information1 ZoomBrowser EX Software User Guide 5.0
1 ZoomBrowser EX Software User Guide 5.0 Table of Contents (1/2) Chapter 1 Chapter 2 Chapter 3 What is ZoomBrowser EX? What Can ZoomBrowser EX Do?... 4 Guide to the ZoomBrowser EX Windows... 5 Task Buttons
More informationForce Open: Lightweight Black Box File Repair
Force Open: Lightweight Black Box File Repair Karl Wüst1, Petar Tsankov1, Saša Radomirovic 2, Mohammad Torabi Dashti1 1 ETH Zürich, 2 University of Dundee DFRWS EU 2017 Karl Wüst 2017-03-23 1 Motivation
More information