Classification of Image Codecs in Telecommunication Networks

Authors

Faculty of New Science and Technology, University of Tehran, Tehran, Iran

Abstract

Nowadays, with the spread of communication networks, the demand to transmit multimedia data has significantly increased. So, the knowledge about data type which is transmitted through the network is an important issue for monitoring communications and preventing transmission of malicious data. A typical identification system attempts to identify the type of transmitted coded data through classification within a predefined set. The classification is usually based on some relevant features extracted from the received bit stream. Most of the researches in this field consider a few kinds of image codec in their classification problem. In this paper, an efficient identification system is proposed for classification within ten different images codecs. The proposed system is based on combination and extension of existing methods. According to simulation results, image codecs are classified with average accuracy of 88.90%. Among various codecs, GIF and BMP have the highest accuracy of 99.3% and 92.5%, respectively. On the other hand, FLIF and WEBP have the lowest accuracy 83.3% and 83.6%, respectively.

Keywords


[1] مهدی تیموری، «آشکارسازی سیگنال لینک 16»، مجله مهندسی برق دانشگاه تبریز، جلد 46، شماره 4، ص. 84-87، 1395.
[2] مهدی تیموری، حمیدرضا کاکایی مطلق و مرتضی حدادی، «شناسایی کور کدهای ضربی BCH»، مجله مهندسی برق دانشگاه تبریز، جلد 47، شماره 1، ص. 49-54، 1396.
[3] E. S. Pilli, R. C. Joshi, and R. Niyogi, "Network forensic frameworks: Survey and research challenges," digital investigation, vol. 7, pp. 14-27, 2010.
[4] G. Kessler. File Signature Table, 16 December 2017, https://www.garykessler.net/library/file_sigs.html.
[5] M. McDaniel and M. H. Heydari, "Content based file type detection algorithms," in Proceedings of the 36th International Conference onAnnual Hawaii International Conference on,System Sciences, pp. 1-10, 2003.
[6] W.-J. Li, K. Wang, S. J. Stolfo, and B. Herzog, "Fileprints: Identifying file types by n-gram analysis," in Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC, pp. 64-71, 2005.
[7] M. Karresand and N. Shahmehri, "Oscar—file type identification of binary data in disk clusters and ram pages," in Security and privacy in dynamic environments, ed: Springer, pp. 413-424, 2006.
[8] M. Karresand and N. Shahmehri, "File type identification of data fragments by their binary structure," in Information Assurance Workshop, 2006 IEEE, pp. 140-147, 2006.
[9] S. J. Moody and R. F. Erbacher, "Sádi-statistical analysis for data type identification," in Third International Workshop onSystematic Approaches to Digital Forensic Engineering, SADFE'08., pp. 41-54, 2008.
[10] C. J. Veenman, "Statistical disk cluster classification for file carving," in Information Assurance and Security, 2007. IAS 2007. Third International Symposium on, pp. 393-398, 2007.
[11] W. C. Calhoun and D. Coles, "Predicting the types of file fragments," Digital Investigation, vol. 5, pp. S14-S20, 2008.
[12] M. C. Amirani, M. Toorani, and A. Beheshti, "A new approach to content-based file type detection," in Computers and Communications,. ISCC 2008. IEEE Symposium on, pp. 1103-1108, 2008.
[13] K. Nguyen, D. Tran, W. Ma, and D. Sharma, "A New Approach to Executable File Fragment Detection in Network Forensics," in Network and System Security, ed: Springer, pp. 510-517, 2014.
[14] N. L. Beebe, L. A. Maddox, L. Liu, and M. Sun, "Sceadan: using concatenated n-gram vectors for improved file and data type classification," IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1519-1530, 2013.
[15] M. Norouzi, D. J. Fleet, and R. R. Salakhutdinov, "Hamming distance metric learning," in Advances in neural information processing systems, pp. 1061-1069, 2012.
[16] D. Ruppert, "What is kurtosis? An influence function approach," The American Statistician, vol. 41, pp. 1-5, 1987.
[17] L. T. DeCarlo, "On the meaning and use of kurtosis," Psychological methods, vol. 2, p. 292, 1997.
[18] R. A. Groeneveld and G. Meeden, "Measuring skewness and kurtosis," The Statistician, pp. 391-399, 1984.
[19] W.-J. Li, K. Wang, S. J. Stolfo, and B. Herzog, "Fileprints: Identifying file types by n-gram analysis," in Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, pp. 64-71, 2005.
[20] D. M. Divakaran, Y. S. Liau, and V. L. Thing, "Accurate in-network file-type classification," in Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design, p. 139-146, 2016.