{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T12:11:22Z","timestamp":1775477482450,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T00:00:00Z","timestamp":1613779200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T00:00:00Z","timestamp":1613779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10681-x","type":"journal-article","created":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T14:45:07Z","timestamp":1613832307000},"page":"18859-18874","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["File fragment recognition based on content and statistical features"],"prefix":"10.1007","volume":"80","author":[{"given":"Marzieh","family":"Masoumi","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Keshavarz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1848-0220","authenticated-orcid":false,"given":"Reza","family":"Fotohi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,20]]},"reference":[{"issue":"6","key":"10681_CR1","doi-asserted-by":"publisher","first-page":"465","DOI":"10.4103\/0256-4602.67149","volume":"27","author":"I Ahmed","year":"2010","unstructured":"Ahmed I, Lhee KS, Shin H, Hong M (2010) Content-based file-type identification using cosine similarity and a divide-and-conquer approach. IETE Tech Rev 27(6):465\u2013477","journal-title":"IETE Tech Rev"},{"key":"10681_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, I., Lhee, K. S., Shin, H. J., & Hong, M. P. (2011). Fast content-based file type identification. In IFIP international conference on digital forensics (pp. 65\u201375). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-24212-0_5"},{"key":"10681_CR3","doi-asserted-by":"crossref","unstructured":"Alamri NS, Allen WH (2015) A comparative study of file-type identification techniques. In SoutheastCon 2015 (pp. 1-5). IEEE.","DOI":"10.1109\/SECON.2015.7132993"},{"key":"10681_CR4","doi-asserted-by":"crossref","unstructured":"Calhoun WC, Coles D (2008) Predicting the types of file fragments. Digital investigation, 5, S14-S20.","DOI":"10.1016\/j.diin.2008.05.005"},{"key":"10681_CR5","unstructured":"Cao D, Luo J, Yin M, Yang H (2010) Feature selection based file type identification algorithm. In 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (Vol. 3, pp. 58-62). IEEE."},{"issue":"3","key":"10681_CR6","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s10844-013-0295-y","volume":"42","author":"KH Chen","year":"2014","unstructured":"Chen KH, Chen LF, Su CT (2014) A new particle swarm feature selection method for classification. J Intell Inf Syst 42(3):507\u2013530","journal-title":"J Intell Inf Syst"},{"key":"10681_CR7","doi-asserted-by":"crossref","unstructured":"Chen Q, Liao Q, Jiang ZL, Fang J, Yiu S, Xi G, ... Liu D (2018, May) File fragment classification using grayscale image conversion and deep learning in digital forensics. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 140\u2013147). IEEE.","DOI":"10.1109\/SPW.2018.00029"},{"issue":"22","key":"10681_CR8","doi-asserted-by":"publisher","first-page":"10545","DOI":"10.1039\/C8NR00595H","volume":"10","author":"S Chun","year":"2018","unstructured":"Chun S, Hwang I, Son W, Chang JH, Park W (2018) Recognition, classification, and prediction of the tactile sense. Nanoscale 10(22):10545\u201310553","journal-title":"Nanoscale"},{"key":"10681_CR9","unstructured":"Dunham JG, Sun MT, Tseng JC (2005) Classifying file type of stream ciphers in depth using neural networks. In The 3rd ACS\/IEEE International Conference on Computer Systems and Applications, 2005. (p. 97). IEEE."},{"key":"10681_CR10","unstructured":"Fapohunda F (2018) U.S. Patent No. 9,928,284. Washington, DC: U.S. Patent and Trademark Office."},{"key":"10681_CR11","doi-asserted-by":"crossref","unstructured":"Gopal S, Yang Y, Salomatin K, Carbonell J (2011) Statistical learning for file-type identification. In 2011 10th international conference on machine learning and applications and workshops (Vol. 1, pp. 68-73). IEEE.","DOI":"10.1109\/ICMLA.2011.135"},{"key":"10681_CR12","unstructured":"Karresand M, Shahmehri N (2006) File type identification of data fragments by their binary structure. In Proceedings of the IEEE Information Assurance Workshop (pp. 140-147)."},{"key":"10681_CR13","doi-asserted-by":"crossref","unstructured":"Kulkarni S, Harman G (2011) An elementary introduction to statistical learning theory (Vol. 853). John Wiley & Sons.","DOI":"10.1002\/9781118023471"},{"key":"10681_CR14","unstructured":"Li WJ, Wang K, Stolfo SJ, Herzog B (2005) Fileprints: identifying file types by n-gram analysis. In Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop (pp. 64-71). IEEE."},{"key":"10681_CR15","doi-asserted-by":"crossref","unstructured":"Li H, He F, Liang Y, Quan Q (2019) A dividing-based many-objective evolutionary algorithm for large-scale feature selection. Soft Computing:1\u201320","DOI":"10.1007\/s00500-019-04324-5"},{"key":"10681_CR16","doi-asserted-by":"publisher","first-page":"106593","DOI":"10.1016\/j.asoc.2020.106593","volume":"96","author":"H Li","year":"2020","unstructured":"Li H, He F, Chen Y (2020) Learning dynamic simultaneous clustering and classification via automatic differential evolution and firework algorithm. Appl Soft Comput 96:106593","journal-title":"Appl Soft Comput"},{"key":"10681_CR17","doi-asserted-by":"crossref","unstructured":"McDaniel M, Heydari MH (2003) Content based file type detection algorithms. In 36th annual Hawaii International Conference on System Sciences, 2003. Proceedings of the (pp. 10-pp). IEEE.","DOI":"10.1109\/HICSS.2003.1174905"},{"key":"10681_CR18","doi-asserted-by":"crossref","unstructured":"Moody SJ, Erbacher RF (2008) S\u00e1di-statistical analysis for data type identification. In 2008 Third international workshop on systematic approaches to digital forensic engineering (pp. 41-54). IEEE.","DOI":"10.1109\/SADFE.2008.13"},{"issue":"11","key":"10681_CR19","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1016\/0167-8655(94)90127-9","volume":"15","author":"P Pudil","year":"1994","unstructured":"Pudil P, Novovi\u010dov\u00e1 J, Kittler J (1994) Floating search methods in feature selection. Pattern Recogn Lett 15(11):1119\u20131125","journal-title":"Pattern Recogn Lett"},{"key":"10681_CR20","doi-asserted-by":"crossref","unstructured":"Quan Q, He F, Li H (2020) A multi-phase blending method with incremental intensity for training detection networks. Vis Comput:1\u201315","DOI":"10.1007\/s00371-020-01796-7"},{"key":"10681_CR21","doi-asserted-by":"crossref","unstructured":"Quan Q, He F, Li H (2020) A multi-phase blending method with incremental intensity for training detection networks. Vis Comput:1\u201315","DOI":"10.1007\/s00371-020-01796-7"},{"key":"10681_CR22","doi-asserted-by":"crossref","unstructured":"Sportiello L, Zanero S (2012) Context-based file block classification. In IFIP international conference on digital forensics (pp. 67\u201382). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-33962-2_5"},{"key":"10681_CR23","doi-asserted-by":"crossref","unstructured":"Veenman CJ (2007) Statistical disk cluster classification for file carving. In Third international symposium on information assurance and security (pp. 393-398). IEEE.","DOI":"10.1109\/IAS.2007.75"},{"issue":"2","key":"10681_CR24","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11036-017-0926-6","volume":"23","author":"J Wang","year":"2018","unstructured":"Wang J, Liu S, Song H (2018) Fractal research on the edge blur threshold recognition in big data classification. Mobile Networks and Applications 23(2):251\u2013260","journal-title":"Mobile Networks and Applications"},{"issue":"9","key":"10681_CR25","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1109\/T-C.1971.223410","volume":"100","author":"AW Whitney","year":"1971","unstructured":"Whitney AW (1971) A direct method of nonparametric measurement selection. IEEE Trans Comput 100(9):1100\u20131103","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"10681_CR26","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1515\/geo-2020-0155","volume":"12","author":"D Xiaohui","year":"2020","unstructured":"Xiaohui D, Huapeng L, Yong L, Ji Y, Shuqing Z (2020) Comparison of swarm intelligence algorithms for optimized band selection of hyperspectral remote sensing image. Open Geosciences 12(1):425\u2013442","journal-title":"Open Geosciences"},{"key":"10681_CR27","doi-asserted-by":"crossref","unstructured":"Zhang L, White GB (2007) An approach to detect executable content for anomaly based network intrusion detection. In 2007 IEEE International Parallel and Distributed Processing Symposium (pp. 1-8). IEEE.","DOI":"10.1109\/IPDPS.2007.370614"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10681-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10681-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10681-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T09:27:03Z","timestamp":1621502823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10681-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,20]]},"references-count":27,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10681"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10681-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,20]]},"assertion":[{"value":"12 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent statement"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}