Detecting JFIF header using FORHEADER
Header and footer are important in digital investigation for JPEG file detection as only 16% of files are fragmented. The use of efficient algorithm to detect them is vital to reduce time taken for analyzing ever increasing data in hard drive or physical memory. Even though there are few application...
| Main Authors: | Kamaruddin Malik, Mohamad, Herawan, Tutut, Mustafa, Mat Deris |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science and Engineering Research Support Society
2011
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/25589/ http://umpir.ump.edu.my/id/eprint/25589/1/Detecting%20JFIF%20header%20using%20FORHEADER.pdf |
Similar Items
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013)
by: Zailani, Abdullah, et al.
Published: (2013)
Visualizing the construction of incremental Disorder Trie Itemset data structure (DOSTrieIT) for Frequent Pattern Tree (FP-Tree)
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Mining significant association rules from educational data using critical relative support approach
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Mining Least Association Rules of Degree Level Programs Selected by Students
by: Zailani, Abdullah, et al.
Published: (2014)
by: Zailani, Abdullah, et al.
Published: (2014)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
WLAR-Viz: Weighted least association rules visualization
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
by: Zailani, Abdullah, et al.
Published: (2012)
by: Zailani, Abdullah, et al.
Published: (2012)
Scalable technique to discover items support from trie data structure
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
On soft partition attribute selection
by: Rabiei, Mamat, et al.
Published: (2012)
by: Rabiei, Mamat, et al.
Published: (2012)
Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming
by: Bouthiba Farouq, Douma, et al.
Published: (2020)
by: Bouthiba Farouq, Douma, et al.
Published: (2020)
Extracting highly positive association rules from students' enrollment data
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Mining Indirect Least Association Rule from Students’ Examination Datasets
by: Zailani, Abdullah, et al.
Published: (2014)
by: Zailani, Abdullah, et al.
Published: (2014)
EFP-M2: Efficient model for mining frequent patterns in transactional database
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
CNAR-M: A model for mining critical negative association rules
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
Reducing network congestion by separating nets of single-row networks into layers
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
RMF: Rough Set Membership Function-based for Clustering Web Transactions
by: Herawan, Tutut, et al.
Published: (2013)
by: Herawan, Tutut, et al.
Published: (2013)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Consistency rules between UML use case and activity diagrams using logical approach
by: Noraini, Ibrahim, et al.
Published: (2011)
by: Noraini, Ibrahim, et al.
Published: (2011)
Evolutionary Grammars Based Design Framework For Product Innovation
by: Cheong Lee, Ho, et al.
Published: (2012)
by: Cheong Lee, Ho, et al.
Published: (2012)
The Backbone of Key Successful Branding Strategies in the 21st Century: Innovation in Design Technology, Decision Making on Product Quality, and Collaborative Communications
by: Ho, Cheong Lee, et al.
Published: (2017)
by: Ho, Cheong Lee, et al.
Published: (2017)
Product Design Generation and Decision Making Through Strategic Integration of Evolutionary Grammars and Kano Model
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
A hardware-in-the-loop simulation and test for unmanned ground vehicle on indoor environment
by: Khalid, Yunus, et al.
Published: (2012)
by: Khalid, Yunus, et al.
Published: (2012)
Performance Analysis on the Effect of G.729, Speex and GSM Speech Codec on 802.11g Wireless Local Area Network over VoIP using Packet Jitter
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
by: Hongwu, Qin, et al.
Published: (2014)
by: Hongwu, Qin, et al.
Published: (2014)
Data Mining for Education Decision Support: A Review
by: Suhirman, Suhirman, et al.
Published: (2014)
by: Suhirman, Suhirman, et al.
Published: (2014)
IncSPADE: An Incremental Sequential Pattern Mining Algorithm Based on SPADE Property
by: Omer, Adam, et al.
Published: (2016)
by: Omer, Adam, et al.
Published: (2016)
End-to-end delay performance for VoIP on LTE system in access network
by: Ng, Liang Shen, et al.
Published: (2013)
by: Ng, Liang Shen, et al.
Published: (2013)
MT2Way: A novel strategy for pair-wise test data generation
by: Rabbi, Khandakar Fazley, et al.
Published: (2012)
by: Rabbi, Khandakar Fazley, et al.
Published: (2012)
A novel normal parameter reduction algorithm of soft sets
by: Ma, Xiuqin, et al.
Published: (2010)
by: Ma, Xiuqin, et al.
Published: (2010)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Measuring human performance using annual work target evaluation system
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
JOMS: System architecture for telemetry and visualization on unmanned vehicle
by: Khalid, Hasnan, et al.
Published: (2012)
by: Khalid, Hasnan, et al.
Published: (2012)
Identifying the Dominant Language of Web Page Using Supervised N-grams
by: Ng, Choon-Ching, et al.
Published: (2013)
by: Ng, Choon-Ching, et al.
Published: (2013)
Spread Spectrum Audio Watermarking Using Vector Space Projections
by: Abubakar, Adamu I., et al.
Published: (2015)
by: Abubakar, Adamu I., et al.
Published: (2015)
Spread Spectrum Audio Watermarking Using Vector Space Projections
by: Adamu I., Abu Bakar, et al.
Published: (2015)
by: Adamu I., Abu Bakar, et al.
Published: (2015)
Max-D clustering K-means algorithm for Autogeneration of Centroids and Distance of Data Points Cluster
by: Wan Maseri, Wan Mohd, et al.
by: Wan Maseri, Wan Mohd, et al.
MaxD K-Means: A clustering algorithm for auto-generation of centroids and distance of data points in clusters
by: Wan Maseri, Wan Mohd, et al.
Published: (2012)
by: Wan Maseri, Wan Mohd, et al.
Published: (2012)
Similar Items
-
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013) -
Visualizing the construction of incremental Disorder Trie Itemset data structure (DOSTrieIT) for Frequent Pattern Tree (FP-Tree)
by: Zailani, Abdullah, et al.
Published: (2011) -
Mining significant association rules from educational data using critical relative support approach
by: Zailani, Abdullah, et al.
Published: (2011) -
Mining Least Association Rules of Degree Level Programs Selected by Students
by: Zailani, Abdullah, et al.
Published: (2014) -
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)