{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T16:17:16Z","timestamp":1720628236534},"reference-count":24,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2016,4,28]],"date-time":"2016-04-28T00:00:00Z","timestamp":1461801600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Projects of International Cooperation and Exchanges NSFC","award":["61361166006"]},{"name":"NSFC\/RGC Joint Research Scheme","award":["N_HKU 729\/13"]},{"name":"Hong Kong, and China State Scholarship Fund","award":["201506785014"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1016\/j.diin.2016.04.016","type":"journal-article","created":{"date-parts":[[2016,8,7]],"date-time":"2016-08-07T00:00:33Z","timestamp":1470528033000},"page":"S108-S117","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":16,"special_numbering":"S","title":["Recovery of heavily fragmented JPEG files"],"prefix":"10.1016","volume":"18","author":[{"given":"Yanbin","family":"Tang","sequence":"first","affiliation":[]},{"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[]},{"given":"K.P.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"S.M.","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.diin.2016.04.016_bib1","series-title":"Adroit photo forensics 2013","author":"APF","year":"2013"},{"issue":"3","key":"10.1016\/j.diin.2016.04.016_bib2","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.diin.2007.10.001","article-title":"Advanced carving techniques","volume":"4","author":"Cohen","year":"2007","journal-title":"Digit Investig"},{"issue":"1","key":"10.1016\/j.diin.2016.04.016_bib3","first-page":"19","article-title":"Jpgcarve: an advanced tool for automated recovery of fragmented jpeg files. Information forensics and security","volume":"11","author":"De Bock","year":"2016","journal-title":"IEEE Trans"},{"key":"10.1016\/j.diin.2016.04.016_bib4","series-title":"Foremost","author":"Foremost","year":"2010"},{"issue":"Suppl.","key":"10.1016\/j.diin.2016.04.016_bib5","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.diin.2007.06.017","article-title":"Carving contiguous and fragmented files with fast object validation","volume":"4","author":"Garfinkel","year":"2007","journal-title":"Digit Investig"},{"key":"10.1016\/j.diin.2016.04.016_bib6","series-title":"Control, automation and systems engineering (CASE), 2011 international conference on","first-page":"1","article-title":"A method for recovering jpeg files based on thumbnail","author":"Guo","year":"2011"},{"key":"10.1016\/j.diin.2016.04.016_bib7","series-title":"Security and privacy in dynamic environments","first-page":"413","article-title":"Oscar file type identification of binary data in disk clusters and ram pages","author":"Karresand","year":"2006"},{"key":"10.1016\/j.diin.2016.04.016_bib8","series-title":"2008 European conference on computer network defense","article-title":"Reassembly of fragmented jpeg images containing restart markers","author":"Karresand","year":"2008"},{"key":"10.1016\/j.diin.2016.04.016_bib9","series-title":"Multimedia information networking and security (MINES), 2012 fourth international conference on","first-page":"979","article-title":"Image fragment carving algorithms based on pixel similarity","author":"Li","year":"2012"},{"key":"10.1016\/j.diin.2016.04.016_bib10","series-title":"Information assurance workshop, 2005. IAW'05. Proceedings from the sixth annual IEEE SMC","first-page":"64","article-title":"Fileprints: identifying file types by n-gram analysis","author":"Li","year":"2005"},{"key":"10.1016\/j.diin.2016.04.016_bib11","series-title":"Proceedings of the 36th annual Hawaii international conference on","first-page":"10","article-title":"Content based file type detection algorithms. In system sciences, 2003","author":"McDaniel","year":"2003"},{"issue":"2","key":"10.1016\/j.diin.2016.04.016_bib12","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/TIP.2005.863054","article-title":"Automated reassembly of file fragmented images using greedy algorithms","volume":"15","author":"Memon","year":"2006","journal-title":"Image Process IEEE Trans"},{"key":"10.1016\/j.diin.2016.04.016_bib13","series-title":"2003 IEEE international conference on acoustics, speech, and signal processing","article-title":"Automated reassembly of fragmented images","volume":"4","author":"Pal","year":"2003"},{"issue":"2","key":"10.1016\/j.diin.2016.04.016_bib14","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MSP.2008.931081","article-title":"The evolution of file carving","volume":"26","author":"Pal","year":"2009","journal-title":"Signal Process Mag IEEE"},{"key":"10.1016\/j.diin.2016.04.016_bib15","first-page":"S2","article-title":"Detecting file fragmentation point using sequential hypothesis testing. digital investigation","volume":"5","author":"Pal","year":"2008"},{"key":"10.1016\/j.diin.2016.04.016_bib16","series-title":"Multimedia file carving","author":"Poisel","year":"2012"},{"key":"10.1016\/j.diin.2016.04.016_bib17","series-title":"Availability, reliability and security (ARES), 2013 eighth international conference on","first-page":"475","article-title":"A comprehensive literature review of file carving","author":"Poisel","year":"2013"},{"key":"10.1016\/j.diin.2016.04.016_bib18","series-title":"DFRWS","article-title":"Scalpel: a frugal, high performance file carver","author":"Richard","year":"2005"},{"key":"10.1016\/j.diin.2016.04.016_bib19","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1142\/9789812836243_0015","article-title":"Overview of state-of-the-art in digital image forensics","volume":"3","author":"Sencar","year":"2008","journal-title":"Algorithms Archit Inf Syst Secur"},{"key":"10.1016\/j.diin.2016.04.016_bib20","doi-asserted-by":"crossref","first-page":"S88","DOI":"10.1016\/j.diin.2009.06.007","article-title":"Identification and recovery of jpeg files with missing fragments","volume":"6","author":"Sencar","year":"2009","journal-title":"Digit Investig"},{"key":"10.1016\/j.diin.2016.04.016_bib21","series-title":"Computer security applications conference, 2003. Proceedings. 19th annual","first-page":"152","article-title":"Automatic reassembly of document fragments via context based statistical models","author":"Shanmugasundaram","year":"2003"},{"key":"10.1016\/j.diin.2016.04.016_bib22","series-title":"Digital color imaging handbook","author":"Sharma","year":"2002"},{"key":"10.1016\/j.diin.2016.04.016_bib23","series-title":"Information assurance and security, 2007. IAS 2007. Third international symposium on","first-page":"393","article-title":"Statistical disk cluster classification for file carving","author":"Veenman","year":"2007"},{"key":"10.1016\/j.diin.2016.04.016_bib24","series-title":"Forensics in telecommunications, information, and multimedia","first-page":"28","article-title":"A novel inequality-based fragmented file carving technique","author":"Ying","year":"2011"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287616300512?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287616300512?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,9]],"date-time":"2018-09-09T06:59:08Z","timestamp":1536476348000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287616300512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":24,"alternative-id":["S1742287616300512"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2016.04.016","relation":{},"ISSN":["1742-2876"],"issn-type":[{"value":"1742-2876","type":"print"}],"subject":[],"published":{"date-parts":[[2016,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Recovery of heavily fragmented JPEG files","name":"articletitle","label":"Article Title"},{"value":"Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.diin.2016.04.016","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 The Author(s). Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}]}}