scispace - formally typeset
Search or ask a question
Topic

Image file formats

About: Image file formats is a research topic. Over the lifetime, 10349 publications have been published within this topic receiving 102407 citations.


Papers
More filters
Patent
08 Mar 2005
TL;DR: In this article, an image storage and display system including an image server that includes an image file compressing unit that sets an optimum compression ratio on the basis of the information to compress the image and stores the image in the image file storing unit.
Abstract: The invention provides an image storage and display system including: an image storage server that includes an image file storing unit for storing image data; and image display terminals that are connected to the image storage server via a network and display an image sent from the image storage server. In the image storage and display system, the image storage server includes: an information managing unit that acquires and manages information on a system including at least one of environmental information and operation information of the system; and an image file compressing unit that sets an optimum compression ratio on the basis of the information to compress the image and stores the image in the image file storing unit. According to the constitution, it is possible to reduce time for, for example, adjustment of a compression ratio of an image by a user or a service person by automatically optimizing the compression ratio.

23 citations

Patent
04 Feb 2005
TL;DR: In this paper, an application-based access control system for VSD image files is presented, which includes a Virtual Space of a hard disk in a file form, a VSD drive for processing security-sensitive files within the VSD file module, an encryption and decryption module for encrypting and decrypting data input/output between the file module and the disk drive, and an access control module for determining access by determining whether an access location is a disk drive or the VDS drive.
Abstract: An application-based access control system is disclosed. The access control system includes a Virtual space of a hard disk in a file form; a VSD drive for processing security-sensitive files within the VSD image file module; an encryption and decryption module for encrypting and decrypting data input/output between the VSD image file module and the VSD drive; a VSD file system module for allowing an operating system to recognize a separate disk volume at a time of access to the security-sensitive files within the VSD image file module; and an access control module for determining access by determining whether an access location is a disk drive or the VSD drive and the application module has been authorized to access a certain file at a time of access to the file, which is stored on the hard disk, to perform tasks in the application module. Secure Disk (VSD) image file module occupying a certain

23 citations

Patent
09 Apr 2002
TL;DR: In this paper, the authors present a system for the automatic or semi-automatic generation of a set of files representing "zoomed-in" sections of a master high-resolution image file.
Abstract: The invention relates generally to improvements in systems used in the development (“authoring”) of interactive visual media. More particularly, the invention relates to (a) the automatic or semi-automatic generation of a set of files representing “zoomed-in” sections of a master high-resolution image file, and (b) the automatic or semi-automatic generation of the logical data required to allow navigation of the generated files by an end-user of an interactive visual medium, including but not limited to such optical disc formats as DVD-Video, DVD-Audio, Video CD, and Super Video CD, as well as media hosted by a server and delivered over a network.

23 citations

Patent
25 May 2000
TL;DR: When images recorded in a memory card are read and reduced images of image files are displayed on a liquid crystal monitor in order, printing information of the image files is referred to as discussed by the authors, and a figure is displayed according the number of the prints that have been designated.
Abstract: When images recorded in a memory card are read and reduced images of image files are displayed on a liquid crystal monitor in order, printing information of the image files is referred to. An image of which two or more prints have been designated is enclosed by a predetermined-colored (for example, yellow) frame, and a figure is displayed according the number of the prints that have been designated. An image of which any prints have not been designated is not enclosed by the frame. An image that has been printed is enclosed by an another-colored (for example, blue) frame.

23 citations

Journal ArticleDOI
TL;DR: MalJPEG is presented, the first machine learning-based solution tailored specifically at the efficient detection of unknown malicious JPEG images, which statically extracts 10 simple yet discriminative features from the JPEG file structure and leverages them with a machine learning classifier, in order to discriminate between benign and malicious JPEG image.
Abstract: In recent years, cyber-attacks against individuals, businesses, and organizations have increased. Cyber criminals are always looking for effective vectors to deliver malware to victims in order to launch an attack. Images are used on a daily basis by millions of people around the world, and most users consider images to be safe for use; however, some types of images can contain a malicious payload and perform harmful actions. JPEG is the most popular image format, primarily due to its lossy compression. It is used by almost everyone, from individuals to large organizations, and can be found on almost every device (on digital cameras and smartphones, websites, social media, etc.). Because of their harmless reputation, massive use, and high potential for misuse, JPEG images are used by cyber criminals as an attack vector. While machine learning methods have been shown to be effective at detecting known and unknown malware in various domains, to the best of our knowledge, machine learning methods have not been used particularly for the detection of malicious JPEG images. In this paper, we present MalJPEG, the first machine learning-based solution tailored specifically at the efficient detection of unknown malicious JPEG images. MalJPEG statically extracts 10 simple yet discriminative features from the JPEG file structure and leverages them with a machine learning classifier, in order to discriminate between benign and malicious JPEG images. We evaluated MalJPEG extensively on a real-world representative collection of 156,818 images which contains 155,013 (98.85%) benign and 1,805 (1.15%) malicious images. The results show that MalJPEG, when used with the LightGBM classifier, demonstrates the highest detection capabilities, with an area under the receiver operating characteristic curve (AUC) of 0.997, true positive rate (TPR) of 0.951, and a very low false positive rate (FPR) of 0.004.

23 citations


Network Information
Related Topics (5)
Image processing
229.9K papers, 3.5M citations
81% related
Software
130.5K papers, 2M citations
80% related
Feature extraction
111.8K papers, 2.1M citations
78% related
Deep learning
79.8K papers, 2.1M citations
78% related
The Internet
213.2K papers, 3.8M citations
77% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20238
202222
2021124
2020269
2019373
2018382