Dissecting Files. Endianness. So Many Bytes. Big Endian vs. Little Endian. Example Number. The "proper" order of things. Week 6

Size: px
Start display at page:

Download "Dissecting Files. Endianness. So Many Bytes. Big Endian vs. Little Endian. Example Number. The "proper" order of things. Week 6"

Transcription

1 Dissecting Files Endianness Week 6 The "proper" order of things So Many Bytes So Many Bytes On a 32-bit system, each word consists of 4 bytes So, when any 32-bit value is stored in memory, each of those 4 bytes must be stored However, question remains: What order do we store them? Do we store the least-significant byte first, or the most-significant? As long as a system always follows the same format, then there are no problems but different system use different approaches 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Big Endian vs. Little Endian Example Number Big-Endian approach store the most significant byte (largest value) first used by Motorola, PowerPC Little-Endian approach store the least significant byte (smallest value) first used by Intel appears "backwards" in editors Most significant Byte 2,309,737, AB CD EF Least significant Byte 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer

2 Big Endian vs. Little Endian No "End" to Problems Big Endian AB 2 CD 3 EF 89 AB CD EF There is a problem... if two Little Endian EF CD AB 89 systems use different formats, data will be interpreted wrong! For example: a little-endian system reads a value stored in big-endian a big-endian system reads a value stored in little-endian 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Endianness in File Formats So who is correct? Adobe Photoshop - Big Endian Windows Bitmap (.BMP) - Little Endian GIF - Little Endian JPEG - Big Endian Is the Intel Pentium (little endian) or the PowerPC (big endian) correct? In reality neither side is correct both formats are equally correct 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Gulliver's Travels File Headers Knowing the file by its meaty guts 7/28/2018 Sacramento State - Cook - CSc Summer

3 File Signatures File Signatures A filename is a vital helps identify both the name (and thus contents) of the file Windows and the Internet, use the file extension to identify the type of file If the extension is changed or the file name is lost, Windows can't identify the file type & automatically open it 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer File Signatures File Signatures Fortunately, a file can often be identified by looking its binary contents Most file types contain a header the start of the file is used to store metadata - information about the file s contents e.g. width of an image, color palette, etc simpler files (such as plain text files) do not have a header but most do Often the header of a file contains the actual name of the file type in ASCII text! which makes it identifiable by looking at the raw bytes The header (plus any bytes in the file s body) that be used to uniquely identify the file type is referred to as the file signature 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Analyzing Files Unallocated Files To analyze the raw contents of a file, you need a hex editor This tool displays the bytes in hexadecimal format allowing you to see every byte Often the tools can help you interpret the raw data, but this varies greatly between tools When investigating a hard drive, understanding file signatures is vital If the file is found in a hard drive s unallocated space, there might be vital information missing the original name of the file good luck. the file type the size of the file how many bytes are there? The file s signature can be used to interpret the data and make it recoverable 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer

4 JPEG Very photogenic! JPEG Files JPEGs are stored using in the JPEG File Interchange Format (JFIF) The file header contains information about the density of the picture (pixels per inch/cm) It also can contain a embedded thumbnail it is stored as a true color uncompressed image so, all JPEGs can contain two images it can be used to hide steganographic data 7/28/2018 Sacramento State - Cook - CSc Summer JFIF Signature JFIF Signature JPEGs start with 4 bytes: FF D8 FF E0 Next, there are 2 bytes which will contain different values depending on the file The next 4 bytes contain the text JFIF JFIF Signature Signature Bytes FF D8 FF E A How it Appears ÿ Ø ÿ à J F I F 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer JFIF Header JFIF File Format Field Size Description Header marker 2 First two bytes are always FF D8 Application marker 2 Always FF E0 Length 2 Size of the header Identifier 5 JFIF" + a byte containing 00 Version 2 The first byte is the major version; second is minor Scale 1 Specifies whether inches or centimeters are used X density 2 Pixels per inch/centimeter Y density 2 Pixels per inch/centimeter Thumb width 1 Horizontal size of embedded thumbnail in pixels Thumb height 1 Vertical size of embedded thumbnail in pixels Thumb data varies Uncompressed 24 bit thumbnail Varies depending the size of the header JFIF Can contain steganographic data 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer

5 Exchangeable Image File format Exchangeable Image File format There are several extensions to the classic JFIF format - the most notable is the Exchangeable Image File format (EXIF) It is used to store considerable information about the image such If present, it is definitely of interest of investigator Some of the data that is stored: make and model of the digital camera time and date the picture was taken distance the camera was focused at GPS where the picture was taken (if applicable) serial numbers 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer GIF Files GIF Files A legend of the Internet GIFs were created by CompuServe in 1987 to use with its online software The format is popular today to create simple images and basic animation There are actually two versions of the file GIF 87 Original format, no animations GIF 89 Animation! 7/28/2018 Sacramento State - Cook - CSc Summer GIF Files GIF Signature The file format allows a number of features: multiple images (each can have its own palette) timing and placement control looping simple iteration, nothing fancy transparency comments! Comments are hidden often used to save information about the generating software can be used to hide a secret message remember Base64 GIF signature is easy to spot First six bytes contain the text GIF87a This is slightly different for GIF 89, which contains GIF89a GIF Signature Signature Bytes How it Appears G I F 8 7 a 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer

6 GIF Signature GIF Header Field Size Description Identifier 6 GIF87a or GIF89a Width 2 Total width of the image Height 2 Total height of the image Global Palette size colors Transparent Index 1 Index into the palette that will be transparent Aspect ratio 1 Always zero Global Palette varies Uncompressed 24 bit values 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer GIF Header Always the same 6 bytes for GIF87 or GIF89 PNG Files Contains a various items The bling-bling of pngs! 7/28/2018 Sacramento State - Cook - CSc Summer PNG Files PNG Files PNG (pronounced Ping ) is a relatively new file format It was designed to replace other bitmap file formats and work with the Internet It is also backwards and forwards compatible and easily extendable As a result, this format is designed to work forever PNGs support nearly all the features found in other graphics files with the exception of animation however, this can be added in the future Some features: True color or palette Supports translucency (not just transparency) Store unlimited meta-data about the image 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer

7 PNG Signature PNG Signature PNG headers contain bytes designed so computers will not mistake it for a text file After the initial byte, the header contains PNG This is followed by four control characters PNG Signature Signature Bytes E 47 0D 0A 1A 0A How it Appears P N G 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer PNG Chunks PNG File Format Following the first 8 bytes, a PNG file can contain any number of chunks Each chunk starts a 4 byte chunk length. So every chunk can contain up to 4,294,967,296 bytes contains a 4 byte ASCII identifier are backwards and forwards compatible. If a PNG reader does not understand a chunk identifier, it skips the section it also contains a CRC error check 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer PNG Chunks Critical Chunks Chunks are classified into 2 categories Critical Chunks are necessary to identify the image, set bounds and other items that must be included. Ancillary Chunks help the image, but are not required. They can be safely ignored though the image might not look correct if a chunk type is not recognized, it will be ignored Type IHDR PLTE IDAT IEND Contents The true header is contained in this chuck. This is required and is the first chunk If the image uses a palette, this chunk contains the table The image data This chunk marks the end of the file 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer

8 Ancillary Chunks Just a few Text Ancillary Chunks Type bkgb chrm gama sbit time trns Contents Default background color Chromaticity settings (for color correction) Gamma information Color accuracy Time stamp for the image Transparency information PNGs can contain a number of hidden text fields these are used to store comments, information about the image, or anything the user needs these can be used to store hidden data (Base64) Since unrecognized chunk types are ignored, fake chunks can be snuck into a file and used to store hidden data So, in addition to the least-significant bit method, there other ways to hide data in PNGs 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Ancillary Text Chunks Graphics File Signature Summary Type Contents itxt Unicode text. This can be compressed text Stores text with a key = value time format. This allows image attributes to be stored similar to how to INI values. The format uses a 00 byte rather than an equals ztxt Compressed version of text File Type Signature How it Looks JPEG FF D8 FF E A GIF GIF87a GIF89a ÿøÿà JFIF PNG E 47 0D 0A 1A 0A PNG BMP 42 4D BM 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer File Carving File Carving Do you want the light bytes or the dark bytes? Even, if the file is found partially on a hard disk, it can still be recovered using a process data carving or data salvaging Header can contain info about the total size of the file this is vital to know how many bytes to copy 7/28/2018 Sacramento State - Cook - CSc Summer

9 Review: Hard Disk Technology Review: How Data is Organized The data is stored in circles which we call tracks Each track is divided into small pieces called sectors. Most disks store 512 bytes to a sector Disks contain enormous numbers of sectors so a file system groups several into a cluster 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Hard Disk Clusters Unallocated Space Deleted File Header Signature Cluster Sector Deleted File 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Reconstructing Files Continuous File Basically, you need to find the all used clusters fortunately, these are usually continuous on the hard disk but not necessarily on nearlyfull volumes Then, export the clusters (in the correct order) and reconstruct them into a new file To restore the file, copy the used sectors and store it a new file The signatures (header and possibly one in the body) can be used to identify the type 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer

10 Fragmented File File Repair Finding the next cluster, for fragmented files, can be difficult Fortunately, often the file s body (depending on the type) can have signatures Using these signatures, you can find the next cluster Sadly, when cluster is overwritten the start of the cluster is overwritten first this is the beginning of the previous file so essentially the header is the first casualty First, try to open the file normally the software might compensate for the damage 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer File Repair File Repair However, this is not always the case You will need to reconstruct the file so it can be viewed So, you need to: recover more pieces of file if needed examine file header & repair it test the corrected file A new header, can be carefully created and combined with the partial file to create a new complete file This is called grafting, and is not easy 7/28/2018 Sacramento State - Cook - CSc Summer /28/2018 Sacramento State - Cook - CSc Summer Destroyed File Header A file may be partially overwritten You have to repair (graft) the missing sections! If the header is destroyed, you must rely on other signatures to identify the file 7/28/2018 Sacramento State - Cook - CSc Summer

Bytes are read Right to Left, so = 0x3412, = 0x

Bytes are read Right to Left, so = 0x3412, = 0x Practice - Quiz #5 CIST 2612 Computer Forensics Bitmap File Information Bytes are read Right to Left, so 12 34 = 0x3412, 12 34 56 70 = 0x70563412 Figure 1 - Bitmap File Header Figure 2 - Device Independent

More information

Introduction. Collecting, Searching and Sorting evidence. File Storage

Introduction. Collecting, Searching and Sorting evidence. File Storage Collecting, Searching and Sorting evidence Introduction Recovering data is the first step in analyzing an investigation s data Recent studies: big volume of data Each suspect in a criminal case: 5 hard

More information

Multimedia Systems. Part 4. Mahdi Vasighi

Multimedia Systems. Part 4. Mahdi Vasighi Multimedia Systems Part 4 Mahdi Vasighi www.iasbs.ac.ir/~vasighi Department of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences, Zanjan, Iran Image Formats

More information

Model-Driven Engineering in Digital Forensics. Jeroen van den Bos with Tijs van der Storm and Leon Aronson

Model-Driven Engineering in Digital Forensics. Jeroen van den Bos with Tijs van der Storm and Leon Aronson Model-Driven Engineering in Digital Forensics Jeroen van den Bos (jeroen@infuse.org) with Tijs van der Storm and Leon Aronson Contents Digital forensics MDE in forensics Domain-specific optimizations Conclusion

More information

Data Storage JMU Computer Science Content Teaching Academy 2014

Data Storage JMU Computer Science Content Teaching Academy 2014 Data Storage JMU Computer Science Content Teaching Academy 2014 Florian Buchholz buchhofp@jmu.edu Abstraction layers to interpret data and information Physical layer Data is physically stored Device BIOS

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Graphics & Media Scalable Outline & Bit- mapped Fonts Binary Number Representation & Text Pixels, Colors and Resolution Sound & Digital Audio Film & Digital Video Data Compression

More information

BMP file format - Wikipedia

BMP file format - Wikipedia Page 1 of 3 Bitmap file header This block of bytes is at the start of the file and is used to identify the file. A typical application reads this block first to ensure that the file is actually a BMP file

More information

Image Compression. cs2: Computational Thinking for Scientists.

Image Compression. cs2: Computational Thinking for Scientists. Image Compression cs2: Computational Thinking for Scientists Çetin Kaya Koç http://cs.ucsb.edu/~koc/cs2 koc@cs.ucsb.edu The course was developed with input from: Ömer Eǧecioǧlu (Computer Science), Maribel

More information

Chapter 1 (Computer Forensics)

Chapter 1 (Computer Forensics) Final Study Guide Chapter 1 (Computer Forensics) CIST2612 Final will be given Sunday the 22 from 10:30 to 12:30 22 nd of May nd of Understanding Computer forensics {pages 2-3} Computer forensics involves

More information

Common File Formats. Need a standard to store images Raster data Photos Synthetic renderings. Vector Graphic Illustrations Fonts

Common File Formats. Need a standard to store images Raster data Photos Synthetic renderings. Vector Graphic Illustrations Fonts 1 Image Files Common File Formats Need a standard to store images Raster data Photos Synthetic renderings Vector Graphic Illustrations Fonts Bitmap Format - Center for Graphics and Geometric Computing,

More information

This is not yellow. Image Files - Center for Graphics and Geometric Computing, Technion 2

This is not yellow. Image Files - Center for Graphics and Geometric Computing, Technion 2 1 Image Files This is not yellow Image Files - Center for Graphics and Geometric Computing, Technion 2 Common File Formats Need a standard to store images Raster data Photos Synthetic renderings Vector

More information

IT153 Midterm Study Guide

IT153 Midterm Study Guide IT153 Midterm Study Guide These are facts about the Adobe Dreamweaver CS4 Application. If you know these facts, you should be able to do well on your midterm. Dreamweaver users work in the Document window

More information

Lecture 19 Media Formats

Lecture 19 Media Formats Revision IMS2603 Information Management in Organisations Lecture 19 Media Formats Last week s lectures looked at MARC as a specific instance of complex metadata representation and at Content Management

More information

Standard File Formats

Standard File Formats Standard File Formats Introduction:... 2 Text: TXT and RTF... 4 Grapics: BMP, GIF, JPG and PNG... 5 Audio: WAV and MP3... 8 Video: AVI and MPG... 11 Page 1 Introduction You can store many different types

More information

Introduction to carving File fragmentation Object validation Carving methods Conclusion

Introduction to carving File fragmentation Object validation Carving methods Conclusion Simson L. Garfinkel Presented by Jevin Sweval Introduction to carving File fragmentation Object validation Carving methods Conclusion 1 Carving is the recovery of files from a raw dump of a storage device

More information

Graphics File Formats

Graphics File Formats 1 Graphics File Formats Why have graphics file formats? What to look for when choosing a file format A sample tour of different file formats, including bitmap-based formats vector-based formats metafiles

More information

ITP 101 Project 2 - Photoshop

ITP 101 Project 2 - Photoshop ITP 101 Project 2 - Photoshop Project Objectives Learn how to use an image editing application to create digital images. We will use Adobe Photoshop for this project. Project Details To continue the development

More information

WATERMARK S ENSE User Guide. VeprIT.

WATERMARK S ENSE User Guide. VeprIT. WATERMARK S ENSE User Guide VeprIT http://veprit.com support@veprit.com Based on version 1.2.0. April 28, 2014 VeprIT - Watermark Sense User Guide Page 1 Contents 1 Main Concepts 3 2 User Interface Overview

More information

BMP file format. Contents. Pixel storage. The BMP file format, sometimes called bitmap. or DIB file format (for device-independent

BMP file format. Contents. Pixel storage. The BMP file format, sometimes called bitmap. or DIB file format (for device-independent 1 of 7 BMP file format From Wikipedia, the free encyclopedia Windows Bitmap The BMP file format, sometimes called bitmap File extension:.bmp or.dib or DIB file format (for device-independent MIME type:

More information

Sources of Evidence. CSF: Forensics Cyber-Security. Part I. Foundations of Digital Forensics. Fall 2015 Nuno Santos

Sources of Evidence. CSF: Forensics Cyber-Security. Part I. Foundations of Digital Forensics. Fall 2015 Nuno Santos Sources of Evidence Part I. Foundations of Digital Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary Reasoning about sources of evidence Data representation and interpretation Number

More information

21st-Century Image and Data Exchange Standards

21st-Century Image and Data Exchange Standards Course IN22-1 21st-Century Image and Data Exchange Standards Peter Sheerin Dec 3, 2003 02:00 PM 03:30 PM 1 2 Why do Formats Matter? Image quality Interoperability Capabilities/features Alpha channel/transparency

More information

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems

More information

Java Oriented Object Programming II Files II - Binary I/O Lesson 3

Java Oriented Object Programming II Files II - Binary I/O Lesson 3 Java Oriented Object Programming II Files II - Binary I/O Lesson 3 The objectives in this lesson are: Convert Binary to Hexadecimals (vice versa) Understand Binary Code Use Hex Editors Explain how Streams

More information

Breeze User Guide. Breeze Multiple Stream Video Processors. Light and Standard Editions Version 5.3.2

Breeze User Guide. Breeze Multiple Stream Video Processors. Light and Standard Editions Version 5.3.2 Breeze User Guide Breeze Multiple Stream Video Processors Light and Standard Editions Version 5.3.2 Copyright 1989-2007 Discovery Scientific, LLC All rights reserved www.discoverybiz.net January 01, 2007

More information

Creating Web Pages with SeaMonkey Composer

Creating Web Pages with SeaMonkey Composer 1 of 26 6/13/2011 11:26 PM Creating Web Pages with SeaMonkey Composer SeaMonkey Composer lets you create your own web pages and publish them on the web. You don't have to know HTML to use Composer; it

More information

Data Representation From 0s and 1s to images CPSC 101

Data Representation From 0s and 1s to images CPSC 101 Data Representation From 0s and 1s to images CPSC 101 Learning Goals After the Data Representation: Images unit, you will be able to: Recognize and translate between binary and decimal numbers Define bit,

More information

PSD to Mobile UI Tutorial

PSD to Mobile UI Tutorial PSD to Mobile UI Tutorial Contents Planning for design... 4 Decide the support devices for the application... 4 Target Device for design... 4 Import Asset package... 5 Basic Setting... 5 Preparation for

More information

CP SC 4040/6040 Computer Graphics Images. Joshua Levine

CP SC 4040/6040 Computer Graphics Images. Joshua Levine CP SC 4040/6040 Computer Graphics Images Joshua Levine levinej@clemson.edu Lecture 03 File Formats Aug. 27, 2015 Agenda pa01 - Due Tues. 9/8 at 11:59pm More info: http://people.cs.clemson.edu/ ~levinej/courses/6040

More information

Frequently Asked Questions about Text and Graphics

Frequently Asked Questions about Text and Graphics 1 Frequently Asked Questions about Text and Graphics 1. What is a font? A font is a set of printable or displayable text characters that are in a specific style and size. The type design for a set of fonts

More information

INFS 2150 / 7150 Intro to Web Development / HTML Programming

INFS 2150 / 7150 Intro to Web Development / HTML Programming XP INFS 2150 / 7150 Intro to Web Development / HTML Programming Working with Graphics in a Web Page 1 Objectives Learn about different image formats Control the placement and appearance of images on a

More information

Web graphics. Introduction

Web graphics. Introduction Web graphics Introduction Role of Web Graphics Role of Web Graphics Although web designers could build a site without graphics, most users would not readily recognize a collection of bare pages as a cohesive

More information

Computer Organization & Architecture M. A, El-dosuky

Computer Organization & Architecture M. A, El-dosuky 4.1-storage systems and technology Memory as a Linear Array Computer Organization & Architecture M. A, El-dosuky A byte-addressable memory with N bytes is the logical equivalent of a C++ array, declared

More information

Image creation with PHP

Image creation with PHP Image creation with PHP By Kore Nordmann PHP Unconference Hamburg 25.04.08 About me Kore Nordmann Studying computer science at the University Dortmund Working for ez systems on ez components Maintainer

More information

Create a Contact Sheet of Your Images Design a Picture Package Customize Your Picture Package Layout Resample Your Image...

Create a Contact Sheet of Your Images Design a Picture Package Customize Your Picture Package Layout Resample Your Image... 72 71 Create a Contact Sheet of Your Images................... 158 Design a Picture Package............ 160 73 Customize Your Picture Package Layout.... 162 74 Resample Your Image.................... 164

More information

CMPT 165 Graphics Part 2. Nov 3 rd, 2015

CMPT 165 Graphics Part 2. Nov 3 rd, 2015 CMPT 165 Graphics Part 2 Nov 3 rd, 2015 Key concepts of Unit 5-Part 1 Image resolution Pixel, bits and bytes Colour info (intensity) vs. coordinates Colour-depth Color Dithering Compression Transparency

More information

Recover My Files Data Recovery Software English V3.98. The Options Button

Recover My Files Data Recovery Software English V3.98. The Options Button Page 1 of 5 Recover My Files Data Recovery Software English V3.98 The Options Button To access the program options, click on the Options button on "Manually Set Options" in the search selection window

More information

OBJECTIVES After reading this chapter, the student should be able to:

OBJECTIVES After reading this chapter, the student should be able to: Data Representation OBJECTIVES After reading this chapter, the student should be able to: Define data types. Visualize how data are stored inside a computer. Understand the differences between text, numbers,

More information

PurePNG Documentation

PurePNG Documentation PurePNG Documentation Release 0.3.0 Pavel Zlatovratskii 2017-11-10 Contents 1 What is PurePNG? 3 1.1 Comparison to other PNG tools................................... 3 1.2 Installation..............................................

More information

Chapter 1. Hardware. Introduction to Computers and Programming. Chapter 1.2

Chapter 1. Hardware. Introduction to Computers and Programming. Chapter 1.2 Chapter Introduction to Computers and Programming Hardware Chapter.2 Hardware Categories Input Devices Process Devices Output Devices Store Devices /2/27 Sacramento State - CSc A 3 Storage Devices Primary

More information

CIPA DC- 009-Translation- 2010

CIPA DC- 009-Translation- 2010 Standard of the Camera & Imaging Products Association CIPA DC- 009-Translation- 2010 Design rule for Camera File system: DCF Version 2.0 (Edition 2010) This translation has been made based on the original

More information

Advanced High Graphics

Advanced High Graphics VISUAL MEDIA FILE TYPES JPG/JPEG: (Joint photographic expert group) The JPEG is one of the most common raster file formats. It s a format often used by digital cameras as it was designed primarily for

More information

Software Requirements Specification BRIC. for. Requirements for Version Prepared by Panagiotis Vasileiadis

Software Requirements Specification BRIC. for. Requirements for Version Prepared by Panagiotis Vasileiadis Software Requirements Specification for BRIC Requirements for Version 0.8.0 Prepared by Panagiotis Vasileiadis Introduction to Software Engineering, Aristotle University 01/04/2014 Software Requirements

More information

Data Representation and Networking

Data Representation and Networking Data Representation and Networking Instructor: Dmitri A. Gusev Spring 2007 CSC 120.02: Introduction to Computer Science Lecture 3, January 30, 2007 Data Representation Topics Covered in Lecture 2 (recap+)

More information

Technical concepts. Some basics of computers today. Comp 399

Technical concepts. Some basics of computers today. Comp 399 Technical concepts Some basics of computers today. Comp 399 Admin Anyone new?. http://www.cnn.com/2013/07/12/tech/social-media http://tv.msnbc.com/2013/08/13/pre-trial-hearings- Locard's Exchange Principle

More information

Image Types Vector vs. Raster

Image Types Vector vs. Raster Image Types Have you ever wondered when you should use a JPG instead of a PNG? Or maybe you are just trying to figure out which program opens an INDD? Unless you are a graphic designer by training (like

More information

Photoshop tutorial: Final Product in Photoshop:

Photoshop tutorial: Final Product in Photoshop: Disclaimer: There are many, many ways to approach web design. This tutorial is neither the most cutting-edge nor most efficient. Instead, this tutorial is set-up to show you as many functions in Photoshop

More information

255, 255, 0 0, 255, 255 XHTML:

255, 255, 0 0, 255, 255 XHTML: Colour Concepts How Colours are Displayed FIG-5.1 Have you looked closely at your television screen recently? It's in full colour, showing every colour and shade that your eye is capable of seeing. And

More information

Reviewer s Guide. Morpheus Photo Warper. Screenshots. Tutorial. Included in the Reviewer s Guide: Loading Pictures

Reviewer s Guide. Morpheus Photo Warper. Screenshots. Tutorial. Included in the Reviewer s Guide: Loading Pictures Morpheus Photo Warper Reviewer s Guide Morpheus Photo Warper is easy-to-use picture distortion software that warps and exaggerates portions of photos such as body parts! Have you ever wanted to distort

More information

FineReader Engine Overview & New Features in V10

FineReader Engine Overview & New Features in V10 FineReader Engine Overview & New Features in V10 Semyon Sergunin ABBYY Headquarters September 2010 Michael Fuchs ABBYY Europe GmbH September 2010 FineReader Engine Processing Steps Step 1: Image/Document

More information

Image Formats. Ioannis Rekleitis

Image Formats. Ioannis Rekleitis Image Formats Ioannis Rekleitis JPEG/JFIF JPEG 2000 GIF PNG TIFF PPM, PGM, PBM, and PNM Exif BMP WebP HDR raster formats HEIF BAT BPG CSCE 590: Introduction to Image Processing https://en.wikipedia.org/wiki/image_file_formats

More information

NAME optipng optimize Portable Network Graphics files. SYNOPSIS optipng [? h help] optipng [options...] files...

NAME optipng optimize Portable Network Graphics files. SYNOPSIS optipng [? h help] optipng [options...] files... NAME optipng optimize Portable Network Graphics files SYNOPSIS optipng [? h help] optipng [options...] files... DESCRIPTION OptiPNG shall attempt to optimize PNG files, i.e. reduce their size to a minimum,

More information

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3 1.1.1 Binary systems In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different

More information

Understanding FAT12. Introduction to Computer Forensics. Kessler/Schirling

Understanding FAT12. Introduction to Computer Forensics. Kessler/Schirling Understanding FAT12 Introduction to Computer Forensics Kessler/Schirling Fall 2002 EXP 248 Project #3 You have a floppy disk image file Examine floppy to find an address and a password, and verify MD5

More information

DERRIC. Model-Driven Engineering in Digital Forensics. Jeroen van den Bos

DERRIC. Model-Driven Engineering in Digital Forensics. Jeroen van den Bos DERRIC Model-Driven Engineering in Digital Forensics Jeroen van den Bos jeroen@infuse.org DERRIC Model-Driven Engineering in Digital Forensics Experience: Jeroen van den Bos jeroen@infuse.org 1998: software

More information

Running head: FTK IMAGER 1

Running head: FTK IMAGER 1 Running head: FTK IMAGER 1 FTK Imager Jean-Raymond Ducasse CSOL-590 June 26, 2017 Thomas Plunkett FTK IMAGER 2 FTK Imager Outline Process for Adding Individual Files & Folders as Evidence Items Although

More information

Image Optimisation. Image Dimensions...1 Image File Formats...2 Adding Images...5 Thumbnails...13 Summary...15

Image Optimisation. Image Dimensions...1 Image File Formats...2 Adding Images...5 Thumbnails...13 Summary...15 Table of Contents Image Optimisation Image Dimensions...1 Image File Formats...2 Adding Images...5 Thumbnails...13 Summary...15 Introduction Images are placed on a website to enhance its appearance. However,

More information

Exporting Images from Lightroom

Exporting Images from Lightroom Li kewhatyou see? Buyt hebookat t hefocalbookst or e AdobePhot oshop Li ght r oom 2 Huss& Pl ot ki n ISBN 9780240521336 Getting Your Photos into Lightroom Exporting Images from Lightroom Although Lightroom

More information

7: Image Compression

7: Image Compression 7: Image Compression Mark Handley Image Compression GIF (Graphics Interchange Format) PNG (Portable Network Graphics) MNG (Multiple-image Network Graphics) JPEG (Join Picture Expert Group) 1 GIF (Graphics

More information

A Quick Introduction to IFF

A Quick Introduction to IFF A Quick Introduction to IFF Jerry Morrison, Electronic Arts 10-17-88 IFF is the Amiga-standard "Interchange File Format", designed to work across many machines. Why IFF? Did you ever have this happen to

More information

lesson 3 Transforming Data into Information

lesson 3 Transforming Data into Information essential concepts lesson 3 Transforming Data into Information This lesson includes the following sections: How Computers Represent Data How Computers Process Data Factors Affecting Processing Speed Extending

More information

Bricks'n'Tiles. Tutorial Creating a brick file and texturing a medieval tower. Easy Creation of Architectural Textures.

Bricks'n'Tiles. Tutorial Creating a brick file and texturing a medieval tower. Easy Creation of Architectural Textures. Bricks'n'Tiles Easy Creation of Architectural Textures www.bricksntiles.com Tutorial Creating a brick file and texturing a medieval tower 1 Introduction Welcome this this Bricks'n'Tiles Tutorial. Brick'n'Tiles

More information

Error correction and Extensions from BasePac 6.04 to BasePac 7.00

Error correction and Extensions from BasePac 6.04 to BasePac 7.00 Error correction and Extensions from BasePac 6.04 to BasePac 7.00 Common / Design management Design import from Explorer Load stitch data Search in folders Mouse wheel Save as ZSK Memory Slanting of modules

More information

Midterm Review. October 17

Midterm Review. October 17 Midterm Review October 17 Midterm Layout Some multiple choice, matching, true/false Not much though Will mostly be short answer You will have to write/edit/sketch some HTML You will have to write/edit/sketch

More information

Social Issues. spam Espionage forgery access to your data years from today destroying old records/ data

Social Issues. spam Espionage forgery access to your data years from today destroying old records/ data CS Concepts document formats interpreting bits ascii, jpg, mp3, meta data representing digital images modeling vs rendering ocr sampling rate cloud computing data compression spatial coherence temporal

More information

Adobe Photoshop CS2 Reference Guide For Windows

Adobe Photoshop CS2 Reference Guide For Windows This program is located: Adobe Photoshop CS2 Reference Guide For Windows Start > All Programs > Photo Editing and Scanning >Adobe Photoshop CS2 General Keyboarding Tips: TAB Show/Hide Toolbox and Palettes

More information

Binary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example

Binary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example The Basics Binary Numbers Part Bit of This and a Bit of That What is a Number? Base Number We use the Hindu-Arabic Number System positional grouping system each position represents a power of Binary numbers

More information

Public comments on this W3C Recommendation are welcome. Please send them to the archived list

Public comments on this W3C Recommendation are welcome. Please send them to the archived list Portable Network Graphics (PNG) Specification (Second Edition) Information technology Computer graphics and image processing Portable Network Graphics (PNG): Functional specification. ISO/IEC 15948:2003

More information

INSTITUTO SUPERIOR TÉCNICO

INSTITUTO SUPERIOR TÉCNICO INSTITUTO SUPERIOR TÉCNICO DEPARTAMENTO DE ENGENHARIA INFORMÁTICA FORENSICS CYBER-SECURITY MEIC, METI Lab Guide II Evidence Examination 2015/2016 nuno.m.santos@tecnico.ulisboa.pt 1 Introduction This guide

More information

Preview from Notesale.co.uk Page 2 of 88

Preview from Notesale.co.uk Page 2 of 88 Contents About this Guide Information for Students... Be Revise-Wise How to Use this Guide to Do Well in Your Exams... Revision Checklist... 4 1 Data and Quality of Data... 5 1.1 Encoding and Storing Data...7

More information

Specification of the PFS File Format version 1.5

Specification of the PFS File Format version 1.5 Specification of the PFS File Format version 1.5 October 14, 2008 1 Introduction This document contains a detailed specification of the pfs file format. PFS file format is intended to store in particular

More information

Introduction. You might be interested in the system requirements, the installation, payment and registration procedures.

Introduction. You might be interested in the system requirements, the installation, payment and registration procedures. Introduction Contenta NEF Converter is a simple and powerful tool to convert your NEF photos. It does support a very wide range of Nikon cameras. It is simple to use because of its intuitive interface

More information

This instruction manual may not be copied either in part or in its entirety without the prior permission of Minolta Co., Ltd Minolta Co., Ltd.

This instruction manual may not be copied either in part or in its entirety without the prior permission of Minolta Co., Ltd Minolta Co., Ltd. This instruction manual does not provide instructions for the basic operation of the personal computers, or the basic operation of Windows or Mac OS operating systems. Please refer to the manual that came

More information

The bmpsize package. Heiko Oberdiek <heiko.oberdiek at googl .com> 2016/05/16 v1.7

The bmpsize package. Heiko Oberdiek <heiko.oberdiek at googl .com> 2016/05/16 v1.7 The bmpsize package Heiko Oberdiek 2016/05/16 v1.7 Abstract Package bmpsize analyzes bitmap images to extract size and resolution data. It adds this feature to the graphics

More information

color bit depth dithered

color bit depth dithered EPS The EPS (Encapsulated PostScript) format is widely accepted by the graphic arts industry for saving images that will be placed into programs such as Adobe Illustrator and QuarkXPress. It is used on

More information

Data Maintenance Tool

Data Maintenance Tool DT700 Series Data Maintenance Tool User's Guide A50-017029-001 Ver. 1.2 June 2009 Notice (1) Information in this guide is subject to change without notice. (2) If you find any unclear or incorrect description

More information

Image rescue Quick Start Guide

Image rescue Quick Start Guide Image rescue Quick Start Guide Image Recovery - Recovers lost or deleted image files (JPEG, TIFF and RAW), from your memory card, even if you have erased them, reformatted the card, or your card has become

More information

Format Type Support Thru. vector (with embedded bitmaps)

Format Type Support Thru. vector (with embedded bitmaps) 1. Overview of Graphics Support The table below summarizes the theoretical support for graphical formats within FOP. In other words, within the constraints of the limitations listed here, these formats

More information

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng.

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng. CS 265 Computer Architecture Wei Lu, Ph.D., P.Eng. 1 Part 1: Data Representation Our goal: revisit and re-establish fundamental of mathematics for the computer architecture course Overview: what are bits

More information

What you will learn 2. Converting to PDF Format 15 Converting to PS Format 16 Converting to HTML format 17 Saving and Updating documents 19

What you will learn 2. Converting to PDF Format 15 Converting to PS Format 16 Converting to HTML format 17 Saving and Updating documents 19 What you will learn 2 Creating Text 3 Inserting a CAD Graphic 5 Inserting images from CorelDraw or Designer 8 Inserting Photos or Scanned pages 10 Inserting Objects from Excel or Project 11 Cropping or

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic

More information

Tools Menu (Frequently Used Features)

Tools Menu (Frequently Used Features) Tools Menu (Frequently Used Features) Exit VoxelCalc Shop for features Show VoxelCalc User Guide (right click on oither icons shows user guide for that function) Region of Interest (ROI) tool with beam

More information

Operating Systems. Operating Systems Professor Sina Meraji U of T

Operating Systems. Operating Systems Professor Sina Meraji U of T Operating Systems Operating Systems Professor Sina Meraji U of T How are file systems implemented? File system implementation Files and directories live on secondary storage Anything outside of primary

More information

SketchUp Fundamentals 2

SketchUp Fundamentals 2 KU Design Group llc SketchUp Fundamentals 2 Led by: Mark-o Kennelly Ullman May 3, 2012 A download of today s handout is available at: kudesigngroup.com/niketraining 2012 KU Design Group llc T (503) 583-2194

More information

Panasonic HD Writer AE File Formats. Herbert Oppmann

Panasonic HD Writer AE File Formats. Herbert Oppmann Panasonic HD Writer AE File Formats Herbert Oppmann herby@memotech.franken.de http://www.memotech.franken.de/fileformats/ 2018-01-01 Content Panasonic HD Writer AE File Formats...3 Content (*.cont) File

More information

Media Types. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

Media Types. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of Contents Media Types Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information [http://creativecommons.org/licenses/by/3.0/]

More information

File Systems Management and Examples

File Systems Management and Examples File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size

More information

Design Tradeoffs for Developing Fragmented Video Carving Tools

Design Tradeoffs for Developing Fragmented Video Carving Tools DIGITAL FORENSIC RESEARCH CONFERENCE Design Tradeoffs for Developing Fragmented Video Carving Tools By Eoghan Casey and Rikkert Zoun Presented At The Digital Forensic Research Conference DFRWS 2014 USA

More information

INDESIGN AND PHOTOSHOP

INDESIGN AND PHOTOSHOP NEIL MALEK, ACI With just a few basic tools, anyone can professionally polish photos in Photoshop and arrange them into a layout in InDesign. The incredible power and diverse tools can be intimidating,

More information

GCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three %

GCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three % GCSE Computing Revision Pack TWO Data Representation Questions Name: /113 Attempt One % Attempt Two % Attempt Three % Areas of Strength Areas for Development 1. Explain how ASCII is used to represent text

More information

This is not an official directory; it is for voluntary participation only and does not guarantee that someone will not use the same identifier.

This is not an official directory; it is for voluntary participation only and does not guarantee that someone will not use the same identifier. Cover Sheet for the GIF89a Specification DEFERRED CLEAR CODE IN LZW COMPRESSION There has been confusion about where clear codes can be found in the data stream. As the specification says, they may appear

More information

Lesson 3 Creating and Using Graphics

Lesson 3 Creating and Using Graphics Lesson What you will learn: how to delete a sprite and import a new sprite how to draw using the pen feature of Scratch how to use the pen up and pen down feature how to change the colour of the pen how

More information

Fireworks 3 Animation and Rollovers

Fireworks 3 Animation and Rollovers Fireworks 3 Animation and Rollovers What is Fireworks Fireworks is Web graphics program designed by Macromedia. It enables users to create any sort of graphics as well as to import GIF, JPEG, PNG photos

More information

Understanding file formats

Understanding file formats Understanding file formats When you save files from Elements, you need to pick a file format in the Format drop-down menu found in both the Save and Save As dialog boxes. When you choose from the different

More information

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive

More information

Digital Data. 10/11/2011 Prepared by: Khuzaima Jallad

Digital Data. 10/11/2011 Prepared by: Khuzaima Jallad Chapter 2 Digital Data Elements of Digital Data Digital Codes Files Digitization File Compression Advantages of Digital Information Challenges of Digital Information 2 Digital Data ELEMENTS OF DIGITAL

More information

Representing Graphical Data

Representing Graphical Data Representing Graphical Data Chapman & Chapman, chapters 3,4,5 Richardson 1 Graphics in IT82 What does computer graphics cover? IT82 Input, output, and representation of graphical data Creation of graphics

More information

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files

More information

Different File Types and their Use

Different File Types and their Use Different File Types and their Use.DOC (Microsoft Word Document) Text Files A DOC file is a Word processing document created by Microsoft Word, a word processor included with all versions of Microsoft

More information

1 ZoomBrowser EX Software User Guide 5.0

1 ZoomBrowser EX Software User Guide 5.0 1 ZoomBrowser EX Software User Guide 5.0 Table of Contents (1/2) Chapter 1 Chapter 2 Chapter 3 What is ZoomBrowser EX? What Can ZoomBrowser EX Do?... 4 Guide to the ZoomBrowser EX Windows... 5 Task Buttons

More information

Force Open: Lightweight Black Box File Repair

Force Open: Lightweight Black Box File Repair Force Open: Lightweight Black Box File Repair Karl Wüst1, Petar Tsankov1, Saša Radomirovic 2, Mohammad Torabi Dashti1 1 ETH Zürich, 2 University of Dundee DFRWS EU 2017 Karl Wüst 2017-03-23 1 Motivation

More information