Difference between revisions of "JPEG"

From ForensicsWiki
Jump to: navigation, search
m (Metadata)
(Externals Links)
Line 24: Line 24:
 
* [http://www.adobe.com/products/xmp/related.html Extensible Metadata Platform (XMP)]
 
* [http://www.adobe.com/products/xmp/related.html Extensible Metadata Platform (XMP)]
 
* [http://partners.adobe.com/public/developer/en/xmp/sdk/XMPspecification.pdf Adobe - XMP Specification]
 
* [http://partners.adobe.com/public/developer/en/xmp/sdk/XMPspecification.pdf Adobe - XMP Specification]
 +
* [http://www.sno.phy.queensu.ca/~phil/exiftool/TagNames/FlashPix.html FlashPix Tags]
  
 
[[Category:File Formats]]
 
[[Category:File Formats]]

Revision as of 19:56, 30 September 2014

The Joint Photographic Experts Group (JPEG) format is a commonly-used lossy image format.


Format

JPEG is a container file format that consist of a well defined header, some metadata, icons, a color table, compressed data, and a well defined footer. The header is usually FF D8 (hex).

Common file extensions are .jpg, .jpeg, .JPG, .JPE, and .jfif.

Metadata

JPEG files can contain lots of metadata in several formats: Exif, IPTC, GPS, Camera Raw, etc. The exif and jhead command tools can extract and manipulate some of that metadata. Adroit Photo Forensics can be used to extract, view and group metadata from jpeg and camera Raw files. In iOS, the Photo Investigator can extract, view, and remove metadata from all images.

Externals Links