{"id":1612,"date":"2016-10-12T12:21:56","date_gmt":"2016-10-12T12:21:56","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=1612"},"modified":"2025-03-06T16:32:44","modified_gmt":"2025-03-06T16:32:44","slug":"surprises-of-jpeg-quantization-table","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/","title":{"rendered":"Surprises of JPEG Quantization Table"},"content":{"rendered":"\n<p>Examination of JPEG&nbsp;quantization tables has been used in digital image&nbsp;forensics for quite a long time. Using it an examiner can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>identify imagery processed by software [1, 2];<\/li>\n\n\n\n<li>identify camera, including its model [1, 2];<\/li>\n\n\n\n<li>detect double compressed images [3].<\/li>\n<\/ul>\n\n\n\n<!--more-->\n\n\n\n<p>Solving of the first two problems is based on the fact that different image editors and firmware of different digital cameras get the same image compression quality using different unique&nbsp;quantization tables. These tables are like signatures, which an editor or camera leaves in a JPEG file.<\/p>\n\n\n\n<p>If you need to identify camera model used for taking of examined picture, you can use EXIF data. But this data can be easily deleted or modified. That&#8217;s why&nbsp;quantization tables are more dependable data sources. You can just compare examined image&#8217;s&nbsp;quantization tables with&nbsp;quantization tables from a database, for example, FourMatch [4].<\/p>\n\n\n\n<p>But, firstly, such database can&#8217;t be full. Secondly, only developers know how such databases are filled. Thirdly, not all forensic examiners has such bases.<\/p>\n\n\n\n<p>That&#8217;s why sometimes digital image forensic examiner can&#8217;t identify model of camera used for taking the picture. But he can identify if the picture was taken with the camera he got for examination.<\/p>\n\n\n\n<p>When an examiner compares&nbsp;quantization tables, he or she can be surprised.<\/p>\n\n\n\n<p>It&#8217;s well known that any digital image editor uses separate&nbsp;quantization matrix for every available quality. All images saved with an editor with same quality have same&nbsp;quantization matrix. One can think that the same works with digital cameras. But the answer is &#8211; not always.<\/p>\n\n\n\n<p>Most digital cameras allow to choose one of two or three qualities for picture saving. But some cameras use different&nbsp;quantization matrixes for the same quality. It depends on the fact, was flash used or not. The thing is &#8211; there are a lot of light and black parts on images taken with flash. Such parts can be compressed more without visible quality decreasing. So that&#8217;s what happens &#8211; pictures taken with flash are compressed more than whose taken without it.<\/p>\n\n\n\n<p>But if we analyse pictures taken with different cameras, we learn that flash isn&#8217;t the only factor.<\/p>\n\n\n\n<p>For example,&nbsp;OLYMPUS E-M10 uses different&nbsp;quantization matrixes for pictures taken with different ISO. You can see it on the following illustrations:<\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-6 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"611\" height=\"357\" data-id=\"1613\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1.png\" alt=\"jpegsnoop_1\" class=\"wp-image-1613\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1.png 611w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1-300x175.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1-512x299.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1-16x9.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1-32x19.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1-28x16.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1-56x33.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_1-64x37.png 64w\" sizes=\"auto, (max-width: 611px) 100vw, 611px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-7 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"610\" height=\"356\" data-id=\"1614\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2.png\" alt=\"jpegsnoop_2\" class=\"wp-image-1614\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2.png 610w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2-300x175.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2-512x299.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2-16x9.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2-32x19.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2-28x16.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2-56x33.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_2-64x37.png 64w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 1, 2. EXIF data (partly) and&nbsp;quantization table of a picture taken with ISO 100<\/em><\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-8 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"611\" height=\"357\" data-id=\"1615\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3.png\" alt=\"jpegsnoop_3\" class=\"wp-image-1615\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3.png 611w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3-300x175.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3-512x299.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3-16x9.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3-32x19.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3-28x16.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3-56x33.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_3-64x37.png 64w\" sizes=\"auto, (max-width: 611px) 100vw, 611px\" \/><\/figure>\n<\/figure>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-9 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"610\" height=\"356\" data-id=\"1616\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4.png\" alt=\"jpegsnoop_4\" class=\"wp-image-1616\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4.png 610w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4-300x175.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4-512x299.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4-16x9.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4-32x19.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4-28x16.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4-56x33.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpegsnoop_4-64x37.png 64w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/figure>\n<\/figure>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 3, 4. EXIF data (partly) and&nbsp;quantization table of a picture taken with ISO 6400<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\">If an examiner doesn&#8217;t know about this, his experiment may fail, because&nbsp;quantization table of questioned picture and&nbsp;quantization table of picture taken with the camera received for examination may not match. This may be because pictures are taken with same camera, but different settings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span class=\"ez-toc-section\" id=\"References\"><\/span>References:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Jesse Kornblum. Using JPEG Quantization Tables to Identify Imagery Processed by Software.\u00a0<a href=\"https:\/\/www.dfrws.org\/sites\/default\/files\/session-files\/paper-using_jpeg_quantization_tables_to_identify_imagery_processed_by_software.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/www.dfrws.org\/sites\/default\/files\/session-files\/paper-using_jpeg_quantization_tables_to_identify_imagery_processed_by_software.pdf<\/a><\/li>\n\n\n\n<li>Hany Farid. Digital Image Ballistics from JPEG Quantization. <a href=\"http:\/\/www.cs.dartmouth.edu\/farid\/downloads\/publications\/tr06a.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">http:\/\/www.cs.dartmouth.edu\/farid\/downloads\/publications\/tr06a.pdf<\/a><\/li>\n\n\n\n<li>Babak Mahdian and Stanislav Saic. Detecting Double Compressed JPEG Images.&nbsp;<a href=\"https:\/\/www.google.ru\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=2&amp;cad=rja&amp;uact=8&amp;ved=0ahUKEwi5-pSFwsnPAhXpK5oKHTjsBcoQFggmMAE&amp;url=http%3A%2F%2Flibrary.utia.cas.cz%2Fseparaty%2F2011%2FZOI%2Fmahdian-detecting%2520double%2520compressed%2520jpeg%2520images.pdf&amp;usg=AFQjCNGNBOZD-4ZqSubE927psRSy9HVb0w\">https:\/\/www.google.ru\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=2&amp;cad=rja&amp;uact=8&amp;ved=0ahUKEwi5-pSFwsnPAhXpK5oKHTjsBcoQFggmMAE&amp;url=http%3A%2F%2Flibrary.utia.cas.cz%2Fseparaty%2F2011%2FZOI%2Fmahdian-detecting%2520double%2520compressed%2520jpeg%2520images.pdf&amp;usg=AFQjCNGNBOZD-4ZqSubE927psRSy9HVb0w<\/a><\/li>\n\n\n\n<li>FOURMATCH\u2122.\u00a0<a href=\"http:\/\/www.fourandsix.com\/fourmatch\/\">http:\/\/www.fourandsix.com\/fourmatch\/<\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-about-the-authors\"><span class=\"ez-toc-section\" id=\"About_the_authors\"><\/span>About the authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Serge Petrov<\/p>\n\n\n\n<p>Interests: Digital Video Forensics, Forgery Detection, Audio Forensics<\/p>\n\n\n\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noopener\">Igor Mikhaylov<\/a><\/p>\n\n\n\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"noopener\">Oleg Skulkin<\/a><\/p>\n\n\n\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n","protected":false},"excerpt":{"rendered":"Examination of JPEG&nbsp;quantization tables has been used in digital image&nbsp;forensics for quite a long time. Using it an&hellip;","protected":false},"author":126,"featured_media":1617,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-1612","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>JPEG Quantization Table Surprises<\/title>\n<meta name=\"description\" content=\"Discover the secrets of JPEG quantization tables. This article explains how to analyze these tables for forensic purposes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Surprises of JPEG Quantization Table\" \/>\n<meta property=\"og:description\" content=\"Discover the secrets of JPEG quantization tables. This article explains how to analyze these tables for forensic purposes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-12T12:21:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-06T16:32:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpeg_quantization_table_forensics_weare4n6.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1805\" \/>\n\t<meta property=\"og:image:height\" content=\"892\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Surprises of JPEG Quantization Table\",\"datePublished\":\"2016-10-12T12:21:56+00:00\",\"dateModified\":\"2025-03-06T16:32:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/\"},\"wordCount\":623,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/jpeg_quantization_table_forensics_weare4n6.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/\",\"name\":\"JPEG Quantization Table Surprises\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/jpeg_quantization_table_forensics_weare4n6.png\",\"datePublished\":\"2016-10-12T12:21:56+00:00\",\"dateModified\":\"2025-03-06T16:32:44+00:00\",\"description\":\"Discover the secrets of JPEG quantization tables. This article explains how to analyze these tables for forensic purposes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/jpeg_quantization_table_forensics_weare4n6.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/jpeg_quantization_table_forensics_weare4n6.png\",\"width\":1805,\"height\":892},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/surprises-of-jpeg-quantization-table\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Surprises of JPEG Quantization Table\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"JPEG Quantization Table Surprises","description":"Discover the secrets of JPEG quantization tables. This article explains how to analyze these tables for forensic purposes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/","og_locale":"en_US","og_type":"article","og_title":"Surprises of JPEG Quantization Table","og_description":"Discover the secrets of JPEG quantization tables. This article explains how to analyze these tables for forensic purposes.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-10-12T12:21:56+00:00","article_modified_time":"2025-03-06T16:32:44+00:00","og_image":[{"width":1805,"height":892,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpeg_quantization_table_forensics_weare4n6.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Surprises of JPEG Quantization Table","datePublished":"2016-10-12T12:21:56+00:00","dateModified":"2025-03-06T16:32:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/"},"wordCount":623,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpeg_quantization_table_forensics_weare4n6.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/","name":"JPEG Quantization Table Surprises","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpeg_quantization_table_forensics_weare4n6.png","datePublished":"2016-10-12T12:21:56+00:00","dateModified":"2025-03-06T16:32:44+00:00","description":"Discover the secrets of JPEG quantization tables. This article explains how to analyze these tables for forensic purposes.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpeg_quantization_table_forensics_weare4n6.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/10\/jpeg_quantization_table_forensics_weare4n6.png","width":1805,"height":892},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/surprises-of-jpeg-quantization-table\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Surprises of JPEG Quantization Table"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=1612"}],"version-history":[{"count":3,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1612\/revisions"}],"predecessor-version":[{"id":9591,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1612\/revisions\/9591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/1617"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=1612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=1612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=1612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}