Chapter 10: Recovering Graphics Files

Ace your homework & exams now with Quizwiz!

JPEG

A(n) ____ file has a hexadecimal header value of FF D8 FF E0 00 10.

True

Bitmap images are collections of dots, or pixels, that form an image.

True

If a graphics file is fragmented across areas on a disk, first you must recover all the fragments to re-create the file.

header data

If you can't open an image file in an image viewer, the next step is to examine the file's ____.

Outguess

In the following list, ____ is the only steg tool.

False

Operating systems do not have tools for recovering image files.

carving

Recovering pieces of a file is called ____.

False

Steganography cannot be used with file formats other than image files.

XIF

The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 2065 5874 656E 6465 6420 03.

TIFF

The image format XIF is derived from the more common ____ file format.

EXIF

The majority of digital cameras use the ____ format to store digital pictures.

demosaicing

The process of converting raw picture data to another format is referred to as ____.

hexadecimal

The simplest way to access a file header is to use a(n) ____ editor

"A"

The uppercase letter ____ has a hexadecimal value of 41.

literary works

Under copyright laws, computer programs may be registered as ____.

pictorial, graphic, and sculptural works

Under copyright laws, maps and architectural plans may be registered as ____.

copyright

When working with image files, computer investigators also need to be aware of ____ laws to guard against copyright violations.

True

With many computer forensics tools, you can open files with external viewers.

graphics editors

You use ____ to create, modify, and save bitmap, vector, and metafile graphics files.

Vector graphics

____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.

Lossy

____ compression compresses data by permanently discarding bits of information in the file.

Steganography

____ has also been used to protect copyrighted material by inserting digital watermarks into a file.

Bitmap

____ images store graphics information as grids of individual pixels.

Steganography

____ is the art of hiding information inside image files.

Insertion

____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

Substitution

____ steganography replaces bits of the host file with other bits of data.


Related study sets

Melissa Flemming video how to help refugees rebuild their world

View Set

N3511 Extra Questions Substance Abuse, Eating disorders and Impulse control disorders

View Set

Chapter 4: Reactions in Aqueous Solutions

View Set

Chapter 43: Loss, Grief, and Dying

View Set