期刊文献+

基于差异度的JPEG碎片重组方法 被引量:2

Reassembling Method for JPEG Fragment Based on Degree of Difference
在线阅读 下载PDF
导出
摘要 针对JPEG文件特征,提出一种基于差异度的JPEG碎片重组方法JFDDM。利用图片相邻像素间的相似性,通过匹配MCU单元的差异度判断碎片是否属于同一文件。对标准图片集的实验结果表明,该方法对不同类型的JPEG图片表现出较好的适应性,碎片重组效果良好。 According to the feature of computer forensic,a method is proposed to reassemble JPEG fragment files and the reassemble progress is described.By analyzing JPEG file structure,an algorithm called JFDDM(JPEG Fragment Degree of Difference Matching) for reassembling JPEG fragmented files is proposed and discussed,by which the MCU' degree of difference in the image and the similarity between adjacent pixels are exploited to decide whether current fragments fall within the same image.Experimental results show that this is an effective method for JPEG fragment reassembling.
作者 肖腾 许榕生
出处 《计算机工程》 CAS CSCD 北大核心 2011年第10期263-265,268,共4页 Computer Engineering
基金 中国科学院知识创新工程基金资助项目(YYYJ-1013)
关键词 差异度 计算机取证 JPEG碎片 重组 JFDDM算法 degree of difference computer forensic JPEG fragment reassembling JFDDM(JPEG Fragment Degree of Difference Matching) algorithm
  • 相关文献

参考文献6

  • 1王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:199
  • 2陈丹伟,孙国梓,唐娟,王海平.一种计算机数据取证有效性的证明方法[J].计算机工程,2009,35(8):20-22. 被引量:3
  • 3Garfinkel S.Carving Contiguous and Fragmented Files with Fast Object Validation[C] //Proc.of Digital Forensics Research Workshop.Pittsburgh,Pennsylvania,USA:[s.n.] ,2007:2-12.
  • 4Martin K,Nahid S.File Type Identification of Data Fragments by Their Binary Structure[C] //Proc.of IEEE Information Assurance Workshop.[S.l.] :IEEE Press,2006:140-146.
  • 5Pal A,Memon N.Automated Reassembly of File Fragmented Images Using Greed Algorithms[J].IEEE Trans.on Image Processing,2006,15(2):385-393.
  • 6Sencar P,Memon N.Detecting File Fragmentation Point Using Sequential Hypothesis Testing[C] //Proc.of the 8th Annual DFRWS Conference.Brooklyn,USA:[s.n.] ,2008.

二级参考文献11

  • 1刘宝旭,马建民,池亚平.计算机网络安全应急响应技术的分析与研究[J].计算机工程,2007,33(10):128-130. 被引量:12
  • 2grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 3Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 4Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 5grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 6Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 7ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 8Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 9Kruse W G, Heiser J G. Computer Forensics: Incident Response Essentials[M]. 北京:人民邮电出版社,2003.
  • 10Robbins J. An Explanation of Computer Forensics[EB/OL]. (2008-01-02). http://www.computefforensics.net/forensics.htm.

共引文献200

同被引文献21

  • 1丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 2Yen,S.and S.Chen.Planning and Building a Taiwan Cyber Forensic Laboratory[J].Aerospace and Electronic Systems Magazine, 2007.22(09) : 17-22.
  • 3蒋平,黄舒华,杨莉莉数字取证[M].北京:清华大学出版社,2007:134.
  • 4Rose P.The technical comparison of forensic voice samples[M].Sydney : Thomson,2003.
  • 5I Shafik G, Punja, Richard P. Mislan. Mobile device analysis[ J]. Small Scale Digital Device Forensics Journal, 2010,2( 1 ) : 1 -15.
  • 6Vrizlynn L L Thing, Kian-Yong Ng, Ee-Chien Chang. Live memory forensics of mobile phones [ J ]. Digital Investigation, 2010,7( 1 ) :74 - 82.
  • 7Marcel B, Martien DJ. Forensic data recovery from flash memory [ J ]. Small Scale Digital Device Forensic, 2007, 1 (1):1-17.
  • 8C. Klaver. W~mdows mobile advanced forensics[ J] Digital Investigation,2010,6: 147- 167.
  • 9Scott Hand, Zlaiqiang Lin, Guofei Gu etc. Bin-carver: automat- ic recovery of binary executable fries [ J ]. Digital Investiga- tion, 2012,9: s108 - s117.
  • 10Shiffier R E. Maximum Z score and outliers[ J]. The Ameri- can Statistician, 1988,42( 1 ) :79 - 80.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部