• 제목/요약/키워드: File Editing

Search Result 50, Processing Time 0.025 seconds

Implementation of a Block Link File System Supporting Fast Editing/Writing for Large-sized Multimedia Files (대용량 멀티미디어 파일 고속 편집저장을 지원하는 블록 링크 파일 시스템 설계 및 구현)

  • Jung, Seung-Wan;Ko, Seok-Young;Nam, Young-Jin;Seo, Dae-Wha
    • The KIPS Transactions:PartA
    • /
    • v.17A no.2
    • /
    • pp.63-72
    • /
    • 2010
  • Recently, the need for multimedia devices, such as digital TV, and camcorder has increased. These devices provide many services on multimedia files such as playing, recording, and editing. Throughout these services, in case of storing edited large-scaled multimedia files, existing file system have several capability problems that are taking too much time and requiring disk I/O. In this paper, we propose the use of Linux Ext2 file system based 'Block-Link file (BL-file) system' in order to solve these problems. For the BL-file system, when editing and storing large-scaled files, there is no data input or output but only modification of the metadata. Additionally, by sharing data blocks between multimedia files, we can save disk spaces. Moreover, because the managing of data block sharing information is more convenient than the existing FWAE technique, we can lessen system overhead. The BL-file system is based on Ext2 file system and implemented in a Linux environment, and the usefulness of the proposed technique is validated by applying the Linux multimedia file-editing tool 'Avidemux'.

X-File Viewer on a Mobile Platform (모바일 플랫폼상의 X-File Viewer)

  • Ha, Kyeoung-Ju
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.61-70
    • /
    • 2010
  • In this paper, we propose a mobile document viewer which is executable on a variety of mobile platforms. The proposed viewer is designed with file decoding engine and independent module which are adopted with os independent. The proposed viewer can be used as a basis of document editing tool by analyzing the characteristics of the document file.

Selection Strategy for the File Format of Official Documents in a Cloud Environment (클라우드 환경에서 공문서 파일포맷의 선택 전략)

  • Yim, Jin Hee
    • The Korean Journal of Archival Studies
    • /
    • no.66
    • /
    • pp.5-35
    • /
    • 2020
  • In the digital age, the most basic unit of records management is a document file. Depending on whether each document file is produced in an open standard format or an exclusive proprietary format, there is a cost difference in the process of use and long-term preservation. As government agencies moved to cloud-based business management systems, web-based document editing software was newly adopted. They had the opportunity to select a new file format for web-based document editing software. This paper deals with strategies to maximize the advantages of open standard formats while considering the legacy public document production practices. It introduces ISO/IEC 26300:2006 ODF, ISO/IEC 29500:2008 OOXML, KS X 6101 OWPML, etc. as open standard formats, and looks at considerations when choosing a format and web-based document editing software. In addition, it proposes a strategy to maintain the format of document files shared in cloud storage as an open standard format.

Limitations of Spectrogram Analysis for Smartphone Voice Recording File Forgery Detection (스마트폰 음성 녹음 파일 위변조 검출을 위한 스펙트로그램 분석의 한계점)

  • Sangmin Han;Yeongmin Son;Jae Wan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.545-551
    • /
    • 2023
  • As digital information is readily available to everyone today, the adoption of digital evidence is increasing. However, it is virtually impossible to determine the authenticity of forgery in the case of a voice recording file that has gone through a sophisticated editing process along with the spread of various voice file editing tools. This study aims to prove that forgery, which is difficult to distinguish from the original file, is possible by using insertion, deletion, linking, and synthetic editing technologies in voice recording files. This study presents the difficulty of detecting forgery by encoding a forged voice file with the same extension as the original. In addition, it was shown that forgery detection is impossible if additional transition band deletion and secondary encoding are performed only for experiments in which features occurred. Through this, this study is expected to contribute to the establishment of more stringent evidence admissibility criteria for adopting voice recording files as digital evidence.

A Fast Writing Technique of Large-sized Edited Multimedia Files based on the Ext3 File System (Ext3 파일 시스템 기반의 편집된 대용량 멀티미디어 파일의 고속 저장 기법)

  • Jung, Seung-Wan;Nam, Young-Jin;Seo, Dae-Wha
    • The KIPS Transactions:PartA
    • /
    • v.16A no.2
    • /
    • pp.89-100
    • /
    • 2009
  • With the advance in digital technologies and the increasing prevalence of high quality multimedia contents, there is a growing user demand for multimedia devices, such as mobile phones, digital TV, PMP, digital camcoders, digital cameras. Such devices provide various services associated with multimedia file manipulation, including multimedia contents playback, multimedia file editing, etc. Conventional file systems exhibit a performance-related drawback that requires considerable amount of time and disk I/Os in order to store large-sized edited multimedia files. This paper proposes a fast, efficient writing technique for large-sized edited multimedia files by using data block sharing with adjustment of inode block pointers. Our experiments show that the proposed scheme not only improves write performance of the Ext3 file system on average by 16 times with various types of edited multimedia files, but also reduces consumed disk space dramatically through the data block sharing.

A Scheme of 3D Objects Viewing and Editing System

  • Gao, Hui;Kang, Mi-Young;Nam, Ji-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1657-1660
    • /
    • 2005
  • In this paper, we introduce a general method for constructing 3D models viewing, editing and synthesizing system, including the practical algorithms that are necessary in 3D animation and game programming. While at the same time, the user’s customized acquirements are considered in our system by providing a flexible and friendly interface. Also 3D objects file formats and the method for writing 3D file sparser and loader program are introduced.

  • PDF

CSL Computerized Speech Lab - Model 4300B Software version 5.X

  • Ahn, Cheol-Min
    • Proceedings of the KSLP Conference
    • /
    • 1995.11a
    • /
    • pp.154-164
    • /
    • 1995
  • CSL, Model 4300B is a highly flexible audio processing package designed to provide a wide variety of speech analysis operations for both new and sophisticated users. Operations include 1) Data acquisition 2) File management 3) Graphics 4) Numerical display 5) Audio output 6) Signal editing 7) A variety of analysis functions, External module include 1) Input control B) Output control 3) Jacks, Software include 1) Wide range of speech display manipulation 2) Editing 3) Analysis (omitted)

  • PDF

A Study on Forgery Techniques of Smartphone Voice Recording File Structure and Metadata (스마트폰 음성녹음 파일 구조 및 메타데이터의 위변조 기법에 관한 연구)

  • Park, Jae Wan;Kwak, Won Jun;Lee, John Sanghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.807-812
    • /
    • 2022
  • Recently, as the number of voice recording files submitted as court evidence increases, the number of cases claiming forgery is also increasing. If the audio recording file structure and metadata, which are objective grounds, are completely forged, it is actually impossible to detect forgery of the sophisticated audio recording file. It is extremely rare for the court to reject the file structure and metadata analysis performed with the forged audio recording file. The purpose of this study is to prove that forgery of voice recording file structure and metadata is easily possible. To this end, in this study, it was introduced that forgery detection is impossible when the 'mixed paste' function, which enables sophisticated editing based on the typification of the editing method of voice recording files, is applied. Moreover, it has been proven through experiments that forgery of file structure and metadata is possible. Therefore, a stricter standard for judging the admissibility of evidence is required when the audio recording file is adopted as digital evidence. This study will not only contribute to the standard of integrity in the adoption of digital evidence by judges, but will also contribute to the method of constructing a dataset for artificial intelligence in detecting forgery of recorded files that is expected to be developed in the future.

A Method of Forensic Authentication via File Structure and Media Log Analysis of Digital Images Captured by iPhone (아이폰으로 촬영된 디지털 이미지의 파일 구조 및 미디어 로그 분석을 통한 법과학적 진본 확인 방법)

  • Park, Nam In;Lee, Ji Woo;Jeon, Oc-Yeub;Kim, Yong Jin;Lee, Jung Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.4
    • /
    • pp.558-568
    • /
    • 2021
  • The digital image to be accepted as legal evidence, it is important to verify the authentication of the digital image. This study proposes a method of authenticating digital images through three steps of comparing the file structure of digital images taken with iPhone, analyzing the encoding information as well as media logs of the iPhone storing the digital images. For the experiment, digital image samples were acquired from nine iPhones through a camera application built into the iPhone. And the characteristics of file structure and media log were compared between digital images generated on the iPhone and digital images edited through a variety of image editing tools. As a result of examining those registered during the digital image creation process, it was confirmed that differences from the original characteristics occurred in file structure and media logs when manipulating digital images on the iPhone, and digital images take with the iPhone. In this way, it shows that it can prove its forensic authentication in iPhone.