scispace - formally typeset
Search or ask a question

Showing papers on "Image file formats published in 2013"


Book
23 Sep 2013
TL;DR: Image Processing with ImageJ is a practical book that will guide you from the most basic analysis techniques to the fine details of implementing new functionalities through the ImageJ plugin system, all of it through the use of examples and practical cases.
Abstract: Discover the incredible possibilities of ImageJ, from basic image processing to macro and plugin development Overview Learn how to process digital images using ImageJ and deal with a variety of formats and dimensions, including 4D images Understand what histograms, region of interest, or filtering means and how to analyze images easily with these tools Packed with practical examples and real images, with step-by-step instructions and sample code In Detail Digital image processing is an increasingly important field across a vast array of scientific disciplines. ImageJs long history and ever-growing user base makes it a perfect candidate for solving daily tasks involving all kinds of image analysis processes. Image Processing with ImageJ is a practical book that will guide you from the most basic analysis techniques to the fine details of implementing new functionalities through the ImageJ plugin system, all of it through the use of examples and practical cases. ImageJ is an excellent public domain imaging analysis platform that can be very easily used for almost all your image processing needs. Image Processing with ImageJ will start by showing you how to open a number of different images, become familiar with the different options, and perform simple analysis operations using the provided image samples. You will also learn how to make modifications through ImageJ filters and how to make local measurements using the selections system. You will also find the instructions necessary to record all the steps you perform so they can be saved and re-run on the same image to ensure analysis reproducibility. Finally, you will get to know some different ImageJ plugins and will learn how to implement your own. What you will learn from this book Install and configure ImageJ and its plugins Open different image formats Move around the image, zoom in and out, and obtain pixel values Master the different selection tools Plot the image profile and understand the histograms Handle 3D and 4D images Use the macro recording system Create your own macros beyond the recorder Build your own plugins using the ImageJ editor Integrate ImageJ with the Eclipse IDE to improve the plugin development process Approach The book will help readers discover the various facilities of ImageJ through a tutorial-based approach. Who this book is written for This book is targeted at scientists, engineers, technicians, and managers, and anyone who wishes to master ImageJ for image viewing, processing, and analysis. If you are a developer, you will be able to code your own routines after you have finished reading this book. No prior knowledge of ImageJ is expected.

85 citations


Patent
10 Sep 2013
TL;DR: In this paper, a remote control device is provided for controlling an audio playback device, which includes an input region that is operable to select from a plurality of entities for providing audio content.
Abstract: A remote control device is provided for controlling an audio playback device. The remote control device includes an input region that is operable to select from a plurality of entities for providing audio content to the audio playback device, and a display for displaying information associated with the entities for providing audio content. The remote control device is configured to request image files from the audio playback device for display on the display. The image files correspond to the entities for providing audio content.

82 citations


Patent
30 Dec 2013
TL;DR: In this article, a method of integrating a device with a storage network may include generating metadata associated with image files generated by a camera of a device, which is then automatically transferred to the storage network based on the status of the device.
Abstract: A method of integrating a device with a storage network may include generating metadata associated with image files generated by a camera of a device. The method may further include automatically transferring to a storage network the image files and the metadata based a status of the device. The status of the device may include on one or more of power consumption associated with transferring the image files and metadata, battery status of a battery of the device, available storage space on the device, available connectivity paths with the storage network, and a power supply mode of the device.

63 citations


Patent
25 Mar 2013
TL;DR: In this article, a pixel texture encoding unit (552), arranged to encode pixels colors of the image with an image representation (Im l) comprising N-bit code words, and an image analysis unit (550) arranged to determine and output a region differentiator grey value (gTS), which is a luma value demarcating below it lumas of all pixels of a first object in at least one block of an image, and above it luminas of a second object in each of the blocks of an output image.
Abstract: The image encoder (549) for encoding an image of a high dynamic range scene, comprising: a pixel texture encoding unit (552), arranged to encode pixels colors of the image with an image representation (Im l) comprising N-bit code words; an image analysis unit (550) arranged to determine and output a region differentiator grey value (gTS), which is a luma value demarcating below it lumas of all pixels of a first object in at least one block of the image, and above it lumas of all pixels of a second object in the at least one block of the image; and a formatter (554) arranged to co-encode in an output image signal (S(Im_l, MET(gTS)) the image representation (Im l) and the region differentiator grey value (gTS), makes highly versatile use of images encoding HDR scenes possible, in particular encoding them in image formats compatible with existing MPEG video coding standards.

58 citations


Journal Article
TL;DR: This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) basedSteganography and Discrete Wavelet Transform (dWT) based steganography.
Abstract: Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography.The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are embedded into the frequency components of the cover image.The performance and comparison of these three techniques is evaluated on the basis of the parameters MSE, PSNR, Capacity & Robustness.

50 citations


Journal ArticleDOI
TL;DR: A novel technique to correlate statistical image noise features with three EXchangeable Image File format (EXIF) header features for manipulation detection and several detection examples suggest that the model can be applied in detecting real-world forgeries.
Abstract: We propose in this paper a novel technique to correlate statistical image noise features with three EXchangeable Image File format (EXIF) header features for manipulation detection. By formulating each EXIF feature as a weighted sum of selected statistical image noise features using sequential floating forward selection, the weights are then solved as a least squares solution for modeling the correlation between the intact image and the corresponding EXIF header. Image manipulations like brightness and contrast adjustment can affect these noise features and lead to enlarged numerical difference between each actual and its estimated EXIF feature from the noise features. By using the numerical difference as a manipulation indicator, we achieve excellent performance in detecting common brightness and contrast adjustment. Based on cameras of different brands, our manipulation detection is also demonstrated to work well in a blind mode, where the camera brand/model source is unavailable. Several detection examples suggest that our model can be applied in detecting real-world forgeries.

41 citations


Journal ArticleDOI
TL;DR: Experimental results indicate that the proposed reversible image information hiding scheme based on vector quantization has better compression bit rate and larger embedding capacity when it is compared with recent similar studies.

39 citations


Patent
13 Mar 2013
TL;DR: In this article, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview file, the data files in the native file to a secondary storage.
Abstract: Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request.

36 citations


31 Jul 2013
TL;DR: The objectives were to increase data entry speed while minimizing data entry errors, easily run data analysis, and enable data from multiple locations to be concatenated and analyzed as a single data set.
Abstract: Networks of automatic cameras are producing many thousands of images over modest time periods. For example, 35 cameras at Sevilleta National Wildlife Refuge in New Mexico, USA have produced more than 1.9m useful images since June, 2009. A US Fish and Wildlife monitoring program is producing about 30,000 images per week. Although image file retrieval and storage is trivial, data entry and analysis are both time consuming and error prone since data is most often entered by hand from a keyboard into a spreadsheet. Our objectives were to increase data entry speed while minimizing data entry errors, easily run data analysis, and enable data from multiple locations to be concatenated and analyzed as a single data set. These objectives are achieved by eliminating the task of hand data entry via a keyboard, and managing user interactions with image file data through the use of a suite of open software tools. Error-checking is also automatic. Here we update the methodology described in Harris et al. (2010) by providing a step-by step guide for automatic camera trap data storage and analysis without entering data by hand from a keyboard. This methodology is already in use and is benefiting from an established user community. The programs are available free on http://www.smallcats.org/CTA-executables.html. Key words : Automatic data organization; analysis; camera trap

36 citations


Patent
12 Jun 2013
TL;DR: A peripheral device for an electronic device includes a memory configured to store at least an active firmware image and another firmware image, and circuitry configured to execute instructions provided in the firmware image.
Abstract: A peripheral device for an electronic device includes a memory configured to store at least an active firmware image and another firmware image, and circuitry configured to execute instructions provided in the firmware image. The circuitry receives, from a software application of the electronic device, commands and a firmware image included in the software application. The circuitry verifies the received firmware image file and writes the portions to a memory block different from a memory block at which the active firmware image is located. A command from the software application causes the peripheral device to specify the newly written firmware image as an active firmware image and to execute the newly active firmware image.

34 citations


Journal ArticleDOI
TL;DR: Algorithm running behind with the concept of abnormal anomalies and identify the forgery regions to identify forged region by given only the forged image are succeeded.
Abstract: Digital Photo images are everywhere, on the covers of magazines, in newspapers, in courtrooms, and all over the Internet. We are exposed to them throughout the day and most of the time. Ease with which images can be manipulated; we need to be aware that seeing does not always imply believing. We propose methodologies to identify such unbelievable photo images and succeeded to identify forged region by given only the forged image. Formats are additive tag for every file system and contents are relatively expressed with extension based on most popular digital camera uses JPEG and Other image formats like png, bmp etc. We have designed algorithm running behind with the concept of abnormal anomalies and identify the forgery regions.

Patent
21 Nov 2013
TL;DR: In this article, a string of input characters is received through an input device and associated with an audio stream with at least one character of the string being associated with one sound of the audio stream, and each association is stored in a memory for synchronized playback.
Abstract: A string of input characters is received through an input device and associated with an audio stream with at least one character of the string being associated with at least one sound of the audio stream, and each association is stored in a memory for synchronized playback. An electronic text message is associated with an image file, the association including an instruction to output the electronic text message concurrently with the image file such that the image file is output as a background image to the electronic text message. One or more text strings in an electronic text message is associated with one or more other text strings, and the one or more other text strings and associations, which may include start and end indexes, are stored in a memory as tags for the electronic text message.

Journal ArticleDOI
TL;DR: It is demonstrated that not only can the proposed method detect steganography but, if certain criteria are met, it can also reveal which steganographic algorithm was used to embed data in a JPEG file.

Patent
11 Mar 2013
TL;DR: In this article, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview file, the data files in the native file to a secondary storage.
Abstract: Techniques for providing data preview before recalling large data files are disclosed. In one aspect, a data file is made accessible while being offline by converting the data file from a native format to a preview format, storing the data file in the preview format in a primary storage that is locally available and moving, after the conversion to the preview format, the data file in the native format to a secondary storage. When a viewing request is received for the data file, the data file in the preview format is displayed to fulfill the viewing request.

Patent
14 Jun 2013
TL;DR: In this article, an encryption and conversion unit may be incorporated within the hardware and software of a medical imaging device or another network device in order to provide the capability for encrypting a medical image for transmission to a remote network and for converting the medical image to a format that is compatible with a destination device or network.
Abstract: A network device and a peripheral device for attachment with a medical imaging device provides for the encryption and conversion of a medical image into a secure and standardized image file format as well as the communication of the encrypted and/or converted image to a secure server on a remote network. The devices may monitor all medical image files generated on the medical imaging device and encrypt and convert selected medical image files for transmission to a remotely connected device on another network, such as a server or a mobile device. An encryption and conversion unit may be incorporated within the hardware and software of a medical imaging device or another network device in order to provide the capability for encrypting a medical image for transmission to a remote network and for converting the medical image to a format that is compatible with a destination device or network.

Patent
20 Dec 2013
TL;DR: In this article, a histogram of one or more characteristics of the reference image is used to generate an image conversion score, which is then converted to a modified image of a second image format having a second bit depth less than the first bit depth and the modified image is scanned onto the continuous scan display screen.
Abstract: Various embodiments relating to reducing memory bandwidth consumed by a continuous scan display screen are provided. In one embodiment, scoring criteria are applied to a reference image of a first image format having a first bit depth to generate an image conversion score. The scoring criteria are based on a histogram of one or more characteristics of the reference image. If the image conversion score is greater than a threshold value, then the reference image is converted to a modified image of a second image format having a second bit depth less than the first bit depth, and the modified image is scanned onto the continuous scan display screen. If the image conversion score is less than the threshold value, then the reference image is scanned onto the continuous scan display screen.

Journal ArticleDOI
01 Jan 2013
TL;DR: This paper describes the studies conducted on the relationship between image format and visual experience of UHDTV and states that user visual experience is some of the most important aspects to be considered.
Abstract: Ultrahigh-definition television (UHDTV) is now being studied as the most promising candidate for next-generation television beyond HDTV. It consists of extremely high-resolution imagery and multichannel 3-D sound to give viewers a stronger sensation of reality. Various aspects should be taken into account when determining UHDTV image format. Of those, it is believed that user visual experience is some of the most important aspects to be considered. This paper describes the studies conducted on the relationship between image format and visual experience of UHDTV.

Patent
26 Jun 2013
TL;DR: In this paper, a replicated file deduplication apparatus generates a hash key of a requested data block, determines whether the same data block as the requested data blocks exists in data blocks of a replicated image file that is derived from the same golden image file as the request data block using the hash key.
Abstract: A replicated file deduplication apparatus generates a hash key of a requested data block, determines whether the same data block as the requested data block exists in data blocks of a replicated image file that is derived from the same golden image file as the requested data block using the hash key of the requested data block, and records, if the same data block as the requested data block exists, information of a chunk in which the same data block as the requested data block is stored at a layout of the requested data block.

01 Jan 2013
TL;DR: A lossless data hiding scheme is presented based on quantized coefficients of discrete wavelet transform (DWT) in the frequency domain to embed secret message in cover image.
Abstract: The two most aspects of any image based steganographic system are the quality of the stego-image & the capacity of the cover image. A lossless data hiding scheme is presented based on quantized coefficients of discrete wavelet transform (DWT) in the frequency domain to embed secret message. Using the quantized DWT based method, we embed secret data into the successive zero coefficients of the medium- high frequency components in each reconstructed block for 3- level 2-D DWT of cover image. The procedures of the proposed system mainly include embedding & extracting. The original image can be recovered losslessly when the secret data had been extracted from stego-image. Information hiding is a technique in the field of information security presently. It hides the existence of important information into cover-object to form stego-object. A cover image is an image file into which a secret message will be embedded. A stego image is an image file which has been altered to contain a message. The Steganography is used for secret data transmission. In steganography the secret image is embedded in the cover image and transmitted in such a way that the existence of information is undetectable. The digital images, videos, sound files and other computer files can be used as carrier to embed the information. The object in which the secret information is hidden is called covert object. Stego image is referred as an image that is obtained by embedding secret image into covert image. The hidden message may be plain text, cipher text or images etc Steganography is a method of hiding secret information using cover images. Audio steganography embeds the message into a cover audio file as noise at a frequency out of human hearing range. One major category, perhaps the most difficult kind of steganography is text steganography or linguistic steganography because due to the lack of redundant information in a text compared to an image or audio. Data hiding methods for images can be categorized into two categories. They are spatial-domain and frequency-domain ones. In the spatial domain, the secret messages are embedded in the image pixels directly. The most common methods are histogram-based and least-significant bit (LSB) techniques in the spatial domain. Steganographic model is proposed that is based on variable-six LSB insertion to maximize the embedding capacity while maintaining image fidelity.

Patent
27 Aug 2013
TL;DR: In this article, the authors present a method for image deduplication of guest virtual machines, which includes implementing a shared image file on a host server, transparently consolidating multiple duplicate blocks across multiple virtual machines on the shared file, and creating a merged data path for the multiple VM via the shared image files based on the multiple consolidated duplicate blocks.
Abstract: Methods, systems, and articles of manufacture for image deduplication of guest virtual machines are provided herein. A method includes implementing a shared image file on a host server, transparently consolidating multiple duplicate blocks across multiple virtual machines on the shared image file, and creating a merged data path for the multiple virtual machines via the shared image file based on the multiple consolidated duplicate blocks.

Patent
29 May 2013
TL;DR: In this article, a method for obtaining difference upgrade patch comprises the following steps: obtaining upgrade target version original data, generating a corresponding kernel enablement image file according to the obtained upgrade target versions original data; conducting differential treatment on the generated corresponding kernel enabling image file and an upgrade source version kernel image file, and obtaining a difference upgrade patches of the image file.
Abstract: The invention discloses a method for obtaining difference upgrade patch. The method for obtaining difference upgrade patch comprises the following steps: obtaining upgrade target version original data; generating a corresponding kernel enablement image file according to the obtained upgrade target version original data; conducting differential treatment on the generated corresponding kernel enablement image file and an upgrade source version kernel enablement image file, and obtaining a difference upgrade patch of the image file. The invention further discloses a system for obtaining difference upgrade patch. By adopting the method and the system for obtaining difference upgrade patch, size of an upgrade patch a mobile terminal needed to download when the mobile terminal conducts air-upgrade, data service network flow needed when users upgrade can be saved, and user experience can be improved.

Patent
27 Mar 2013
TL;DR: In this paper, a method and a device for upgrading virtual machines is presented, where free storage space is reserved in a basic mirror image file corresponding to the virtual machine template to establish a super management virtual machine for the VM template.
Abstract: The invention discloses a method and a device for upgrading virtual machines. The method includes that when each virtual machine template is generated, free storage space is reserved in a basic mirror image file corresponding to the virtual machine template to establish a super management virtual machine for the virtual machine template; when any one virtual machine in the virtual machines which are established on the basis of the basic mirror image file is required to be upgraded, the basic mirror image file corresponding to the virtual machine is looked up, all the virtual machines which are established on the basis of the basic mirror image file are suspended, the basic mirror image file is upgraded through the super management virtual machine corresponding to the basic mirror image file, data changed during upgrading are written into the free storage space reserved in the basic mirror image file, and all the virtual machines which are established on the basis of the basic mirror image file are upgraded in a batch mode. By means of the method and the device for upgrading the virtual machines, when a large quantity of the virtual machines are required to be upgraded, upgrading work loads can be greatly reduced, upgrading operation is simplified, and efficiencies are improved.

Patent
Shridhar Damale1
15 Mar 2013
TL;DR: In this paper, a capture and replay system identifies images displayed during an application session and uses the uploaded image files to replay the application session to capture application sessions more efficiently by reproducing images from the resource file instead of capturing the images during the original application session.
Abstract: A capture and replay system identifies images displayed during an application session. A parser may generate Hypertext Markup Language (HTML) code from an application resource file or from the JSON post made by the application. A replay engine may use the HTML code to recreate at least some of the screens displayed during the application session. The capture and replay system may dynamically identify images that are not reproduced from the resources database and request an agent/(s) to asynchronously upload the image files associated with the images. The replay engine may use the uploaded image files to replay the application session. The capture and replay system may capture application sessions more efficiently by reproducing images from the resource file instead of capturing the images during the original application session and by dynamically requesting image files for the images were are not previously reproduced from the resource file. Once an image file is uploaded to server, it does not need to be requested again from any other agent.

Patent
28 Aug 2013
TL;DR: In this article, a virtualization platform system based on distributed storage and an achieving method of achieving method is presented. But the authors do not discuss the performance of the virtualization platforms.
Abstract: The invention discloses a virtualization platform system based on distributed storage and an achieving method thereof. The virtualization platform system comprises a virtualization cluster and a distributed file system. The virtualization cluster is composed of a plurality of physical machines, each physical machine is deployed in the virtualization platform system, the distributed file system is composed of a plurality of distributed file system servers, and the virtualization platform cluster and the distributed file system are connected through a high-performance switch. The distributed file system is used for storing mirror image files of a virtual machine of a virtualization platform. Compared with storage modes of other traditional virtualization platforms, the virtualization platform system effectively solves the problems of disaster recovery and on-line capacity expansion in storage of the virtualization mirror image files and improves input-output (IO) throughput of the virtualization platform for reading and writing the mirror image files of the virtual machine.

Proceedings ArticleDOI
02 Sep 2013
TL;DR: This paper proposes an operational technique that allows digital forensic practitioners to recover deleted image files by referring to iOS journaling file system, and uses an iPhone as a case study to validate the technique.
Abstract: IOS devices generally allow users to synch their images (pictures) and video files using iTunes between Apple products (e.g. an iPhone and a Mac Book Pro). Recovering deleted images, particularly in a forensically sound manner, from iOS devices can be an expensive and challenging exercise (due to the hierarchical encrypted file system, etc). In this paper, we propose an operational technique that allows digital forensic practitioners to recover deleted image files by referring to iOS journaling file system. Using an iPhone as a case study, we then conduct a forensic analysis to validate our proposed technique.

Journal ArticleDOI
TL;DR: The new KEA format has comparable performance with existing formats while producing smaller file sizes and is already within active use for a number of projects within Landcare Research, New Zealand, and the wider community.

Patent
27 Sep 2013
TL;DR: In this paper, a method and apparatus for generating a stereoscopic file defined based on a conventional International Standardization Organization (ISO) based media file format was proposed, which includes an encoder encoding first video data and second video data that are included in 3D video data.
Abstract: A method and apparatus for generating a stereoscopic file defined based on a conventional International Standardization Organization (ISO) based media file format. The apparatus includes an encoder encoding first video data and second video data that are included in three-dimensional (3D) video data; and a file generating unit arranging the encoded first video data and second video data according to the information of a stereoscopic file format including boxes that are selected from boxes included in a conventional International Standardization Organization (ISO) based media file format in order to store and generate the stereoscopic file, and generating the stereoscopic file.

Journal ArticleDOI
TL;DR: This work demonstrates the dependency of the perceptual quality of the tone-mapped LDR images on the context: environmental factors, display parameters, and image content itself, and proposes to extend JPEG file format in a backward compatible manner to deal with HDR images also.
Abstract: High-dynamic range (HDR) imaging is expected, together with ultrahigh definition and high-frame rate video, to become a technology that may change photo, TV, and film industries. Many cameras and displays capable of capturing and rendering both HDR images and video are already available in the market. The popularity and full-public adoption of HDR content is, however, hindered by the lack of standards in evalu- ation of quality, file formats, and compression, as well as large legacy base of low-dynamic range (LDR) displays that are unable to render HDR. To facilitate the wide spread of HDR usage, the backward compatibility of HDR with commonly used legacy technologies for storage, rendering, and compression of video and images are necessary. Although many tone-mapping algorithms are developed for generating viewable LDR con- tent from HDR, there is no consensus of which algorithm to use and under which conditions. We, via a series of subjective evaluations, demonstrate the dependency of the perceptual quality of the tone-mapped LDR images on the context: environmental factors, display parameters, and image con- tent itself. Based on the results of subjective tests, it proposes to extend JPEG file format, the most popular image format, in a backward compat- ible manner to deal with HDR images also. An architecture to achieve such backward compatibility with JPEG is proposed. A simple implementation of lossy compression demonstrates the efficiency of the proposed archi- tecture compared with the state-of-the-art HDR image compression. © 2013

Patent
08 Jan 2013
TL;DR: In this paper, a target object in a primary image is identified, and reference images that include the target object are located, and the object is then modified within the primary image according to data derived from analyzing the reference image.
Abstract: Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image. In another aspect, a primary file is received, and at least one reference file is referenced to generate enhancement data that facilitates enhancing the primary file from an extrapolation of the reference file. In yet another aspect, media files corresponding to a common event are aggregated, and a desired enhancement of a primary file is identified. Here, the desired enhancement corresponds to a modification of an obstruction included in the primary file. A reference file which includes data associated with the desired enhancement is then referenced, and the obstructed data is modified based on replacement data extrapolated from the reference file.

Patent
15 May 2013
TL;DR: In this article, a start-up system of an operating system based on removable storage media is presented, where the file system mirror image file is kept in externally connected removable storage medium, so that the system can not only ensure security of the operating system but also facilitate amendment of related data of a user self.
Abstract: The invention provides a start-up system of an operating system based on removable storage media. The start-up system comprises computer equipment which is provided with inner storage media and the operating system, and the operating system starts up a guide file and a user data file. The start-up system further comprises removable storage media which stores a root file system mirror image file. The invention further provides a start-up method of the operating system, when the operating system is started up, the removable storage medium is connected, the computer equipment guides partition record according to a system in the inner storage medium, management procedures are started up, loaded and guided, and the root file system mirror image file in the removable storage medium is loaded. The file system mirror image file is kept in externally-connected removable storage media, so that the start-up method not only ensures security of the operating system, but also facilitates amendment of related data of a user self.