1/92
Flashcards covering graphics file formats, metadata, steganography, data compression, file recovery, and anti-forensic techniques.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Bitmap Image
Collection of dots forming an image.
Vector Graphic
Image based on mathematical instructions.
Metafile Graphic
Combination of bitmap and vector graphics.
Bitmap Image
Grids of individual pixels.
Raster Image
Collection of pixels stored in rows.
Screen Resolution
Determines the amount of detail in an image.
Vector Graphics
Uses lines instead of dots to create images.
Metafile Graphics
Combines raster and vector graphics.
.png
Portable Network Graphic.
.gif
Graphic Interchange Format.
.jpeg/.jpg
Joint Photographic Experts Group.
.tiff/.tif
Tagged Image File Format.
.bmp
Windows Bitmap.
.hpgl
Hewlett Packard Graphics Language.
.dxf
Autocad.
Raw file format
Refers to a digital negative and is typically found on higher-end digital cameras.
Demosaicing
The process of converting raw picture data to another format.
Exchangeable Image File format (Exif)
Commonly used to store digital pictures; a standard for storing metadata in JPEG and TIF files.
Data compression
Coding data from a larger to a smaller form.
Lossless compression
Reduces file size without removing data.
Lossy compression
Permanently discards bits of information.
EOI Marker (FFD9)
The file marker for all JPEG files.
XIF file format
The first three bytes that are the same as a TIF file and are used to build a header search string.
Steganography
Practice of concealing a file within another file.
Steganography
Hides information inside image files.
Insertion Steganography
Hidden data is not displayed when viewing host file in its associated program.
Substitution Steganography
Replaces bits of the host file with other bits of data.
Steganalysis
Science of detecting the presence of hidden data in cover media files.
Error Level Analysis (ELA)
Shows inconsistencies in areas which may have been copy-pasted or cloned.
Host Protected Area (HPA) and Device Configuration Overlay (DCO)
One of the anti-forensic techniques used for data hiding, as well as the hidden areas on the HDD.
Image Recovery
Process of recovering visible information from digital images.
Data Hiding Techniques
Alters file metadata to hide forensic clues.
File Extension Manipulation
Hides data by appending it to existing files.
Timestamp Manipulation
Modifying timestamps of files to mislead investigators.
Anti-Forensic Techniques
Techniques used to obscure or eliminate data.
Host Protected Area (HPA) and Device Configuration Overlay (DCO)
A technique used for data hiding as well as the hidden areas on the HDD.
Disk Wiping and Encryption
A way to hide or distort data for forensic countermeasures.
Data Sanitization
Overwriting data to prevent recovery.
Encryption
Using algorithms to render data unreadable without a key.
Metadata Analysis
Searching metadata for inconsistencies or anomalies.
Bitmap Image
Collection of dots forming an image.
Vector Graphic
Image based on mathematical instructions.
Metafile Graphic
Combination of bitmap and vector graphics.
Bitmap Image
Grids of individual pixels.
Raster Image
Collection of pixels stored in rows.
Screen Resolution
Determines the amount of detail in an image.
Vector Graphics
Uses lines instead of dots to create images.
Metafile Graphics
Combines raster and vector graphics.
.png
Portable Network Graphic.
.gif
Graphic Interchange Format.
.jpeg/.jpg
Joint Photographic Experts Group.
.tiff/.tif
Tagged Image File Format.
.bmp
Windows Bitmap.
.hpgl
Hewlett Packard Graphics Language.
.dxf
Autocad.
Raw file format
Refers to a digital negative and is typically found on higher-end digital cameras.
Demosaicing
The process of converting raw picture data to another format.
Exchangeable Image File format (Exif)
Commonly used to store digital pictures; a standard for storing metadata in JPEG and TIF files.
Data compression
Coding data from a larger to a smaller form.
Lossless compression
Reduces file size without removing data.
Lossy compression
Permanently discards bits of information.
EOI Marker (FFD9)
The file marker for all JPEG files.
XIF file format
The first three bytes that are the same as a TIF file and are used to build a header search string.
Steganography
Practice of concealing a file within another file.
Steganography
Hides information inside image files.
Insertion Steganography
Hidden data is not displayed when viewing host file in its associated program.
Substitution Steganography
Replaces bits of the host file with other bits of data.
Steganalysis
Science of detecting the presence of hidden data in cover media files.
Error Level Analysis (ELA)
Shows inconsistencies in areas which may have been copy-pasted or cloned.
Host Protected Area (HPA) and Device Configuration Overlay (DCO)
One of the anti-forensic techniques used for data hiding, as well as the hidden areas on the HDD.
Image Recovery
Process of recovering visible information from digital images.
Data Hiding Techniques
Alters file metadata to hide forensic clues.
File Extension Manipulation
Hides data by appending it to existing files.
Timestamp Manipulation
Modifying timestamps of files to mislead investigators.
Anti-Forensic Techniques
Techniques used to obscure or eliminate data.
Host Protected Area (HPA) and Device Configuration Overlay (DCO)
A technique used for data hiding as well as the hidden areas on the HDD.
Disk Wiping and Encryption
A way to hide or distort data for forensic countermeasures.
Overwriting data to prevent
Overwriting data to prevent recovery.
Data Sanitization
Using algorithms to render data unreadable without a key.
Encryption
Searching metadata for inconsistencies or anomalies.
Metadata Analysis
Data Carving
The process of identifying and extracting data that has been concealed or hidden within a file or storage medium.
Data Visualization
A representation of data in a human-readable format.
Data Validation
The process of ensuring data is accurate, consistent, and reliable.
Data Mining
A technique used to analyze large datasets to uncover hidden patterns, unknown correlations, market trends, customer preferences, and other useful information.
Database
A structured set of data held in a computer, especially one that is accessible in various ways.
Data Conversion
A process in which data is converted from one format to another.
Metadata
Data that describes other data
Data Encoding
The format and structure in which data is stored or transmitted.
Data Accuracy
A measure of the precision and reliability of data.
Data Integrity
Ensuring that data is consistently represented and stored correctly across all instances.
Data Governance
Standards and guidelines for managing and protecting data throughout its lifecycle.
Data Deduplication
A process for removing duplicate or redundant data entries to improve data quality.