Dictionary Based Compression Type Classification Using a CNN

Dictionary Based Compression Type Classification Using a CNN

Proceedings of APSIPA Annual Summit and Conference 2019 18-21 November 2019, Lanzhou, China Dictionary based Compression Type Classification using a CNN Architecture Hyewon Song, Beom Kwon, Seongmin Lee and Sanghoon Lee Electrical and Electronic Department, Yonsei University, Seoul, South Korea E-mail: fshw3164, hsm260, lseong721, [email protected] Abstract—As digital devices which are capable of viewing of dictionary-based compression. There are various methods contents easily such as mobile phones and tablet PCs have according to how to find the patterns and represent as indices. become widespread, the number of digital crimes using these Although there are various compression types, there have been digital contents also increases. Usually, the data which can be the evidence of crimes is compressed and the header of data is a few studies to discriminate compression types by analyzing damaged to conceal the contents. Therefore, it is necessary to the characteristics of the entire bitstreams [1][2]. Therefore, in identify the characteristics of the entire bits of the compressed this paper, we propose a new Convolutional Neural Network data to discriminate the compression type not using the header (CNN) which distinguishes the dictionary-based compression of the data. In this paper, we propose a method for distin- type for compressed data. guishing 16 dictionary-based compression types. We utilize 5- layered Convolutional Neural Network (CNN) for classification of The previous discrimination methods used Support Vector compression type using Spatial Pyramid Pooling (SPP) layer. We Machine (SVM) by learning with the feature vector from the evaluate our proposed method on the Wikileaks Dataset, which is compressed data [3][4]. The feature vector which represents a text file database. The average accuracy of 16 dictionary-based the compression type is very different as which feature compression algorithms is 99%. We expect that our proposed extraction methods are used such as Frequency test and Runs method will be useful for providing evidence for Digital Forensics. test. Also, it is very limited to show various compression types using only hand-crafted features. In order to overcome I. INTRODUCTION these problems, we propose CNN based compression type With the advent of the digital age, people usually receive discrimination network by learning with feature vectors which and send data through digital devices in daily life. As digital represent the whole bitstream of data. culture permeates a lifetime, the number of digital crimes Our proposed classification method targets text files is increasing day by day. Digital crime is more difficult rather than images or videos mainly for data compressed to punish because of the diverse ways of concealing data by dictionary encoding. Since we use the bitstream of the which can be evidence. One way to conceal the evidence compressed text data as inputs, the features of the data are is to compress the data and delete the header for making it extracted using 1D-CNN network. In addition, we apply harder to be decoded. Modification or deletion of the header Spatial Pyramid Pooling (SPP) layer [5] to 1D-CNN network of the compressed data which has information about the to obtain fixed-size feature vectors from inputs. In the case compression type prevents the original data to be known. of images, cropping or zero-padding is usually used for It is necessary to prepare the method of decoding these adjusting the fixed-size. However, in the case of a text file, it compressed data to be used for the evidence of digital crimes. is hard to change its arbitrary size to a fixed size because the There are two types of compression methods: Lossy data is sensitive to transform its original form. Nevertheless, compression to achieve high compression rate and Lossless if some editing techniques are applied to text data, it could compression to avoid data loss. The compression type which is be possible to change the whole information of the text data. commonly used in daily life such as .7z and .zip is the lossless Therefore, in this paper, we attempt to use arbitrary-sized compression. It is necessary to use the lossless compression input and extract the fixed-size feature vector by SPP layer. In because using lossy compression is not critical on images addition, we apply softmax regression to the feature vectors and videos but it is critical on text files. There are two from SPP layer to classify 16 dictionary-based compression methods of lossless compression techniques: Entropy-based types. compression and Dictionary-based compression. Entropy- based compression is the method of compressing overlapped sequences of characters by making them simple codes. The II. MAIN ALGORITHM Shannon, Huffman, Golomb algorithms are the representative The overall network for dictionary-based compression algorithms of entropy-based compression. On the other hand, type classification is shown in Fig. 1. The proposed network dictionary-based compression is the method of compressing consists of two parts: Feature extraction part and Fixed length original data by expressing certain patterns of data in an index. feature generation. In the feature extraction part, features Lempel-Ziv 77 (LZ77), Lempel-Ziv 78 (LZ78), Lempel-Ziv for arbitrary-sized input data are extracted through several Storer-Szynanski (LZSS) are the representative algorithms convolutional layers. In the fixed-length feature generation 978-988-14768-7-6©2019 APSIPA 245 APSIPA ASC 2019 Proceedings of APSIPA Annual Summit and Conference 2019 18-21 November 2019, Lanzhou, China Input 0.1 0.02 0.01 Conv1 Conv2 Conv3 Conv4 Conv5 8 lys 16 lys 32 lys 64 lys 256 lys CNN Network ڭ0 N × 1 Arbitrary Size 256 × 6 6 bin 1024 512 ڭ Conv5 256 lys Concatenation 256 × 4 4 bin Conv5 256 lys 256 × 2 2 bin 16 Conv5 FC2 classes 256 lys FC1 SPP Layer ၄lys = layers Fig. 1. Main architecture of our proposed network part, the fixed-size feature vectors are generated by applying Lookahead Buffer (size = 3) Output SPP layer. Finally, the classification of compression type is performed through fully-connected layers and softmax a a c a b a c a b < 0, 0, a > regression. a a c a b a c a b < 1, 1, c > A. The type of Dictionary based compression a a c a b a c a b < 2, 1, b > Dictionary-based compression is a method of reducing the length of data by storing certain patterns of characters a a c a b a c a b < 4, 3, b > by means of the index of the dictionary. Dictionary-based compression is based on the Lempel-Ziv algorithm and a a c a b a c a b < 0, 0, $ > developed into several algorithms such as LZ77 and LZ78 algorithms. This compression type is divided into internal Next Character Search Buffer (size = 5) Matched Letters dictionary encoding and external dictionary encoding depending on whether information about the dictionary is Fig. 2. Encoding process of the LZ77 when the input stream is ”aacabacab” included in the encoded data. and the sizes of the search and lookahead buffers are 5 and 3, respectively. We explain the concept of dictionary-based compression by introducing the encoding process of the LZ77 algorithm which is one of the most popular dictionary-based compression the buffer. The matched letters are encoded as tuple hi, j, Xi, algorithms. Fig. 2 represents the process of dictionary where i means the start point of the matched letters in encoding. As shown in Fig. 2, LZ77 compresses the input the search buffer from the left, j represents the number of data using a sliding window that consists of a search buffer matched letters, and X is the next letter after the matched and a lookahead buffer. To implement this algorithm, first, letters in the lookahead buffer. If there are no matched letters it is necessary to set the length of a search buffer and a in the search and lookahead buffers, the output is h0, 0, Xi. lookahead buffer. In the figure, the length of a search buffer And if there are no further letters to be compressed, the and a lookahead buffer are 5 and 3. Moreover, LZ77 finds output is hi, j, $i, which $ is the signal of the endpoint of the longest matched letters in the lookahead buffer and input data. After the compression process is completed, LZ77 search buffer. These matched letters should be a sequence converts each tuple into binary form. of consecutive bits from the start point of lookahead buffer. As described in the LZ77 algorithm, the dictionary- After then, the lookahead buffer and the search buffer are based compression method reduces the data by indexing the slid together to find the letters that match with bitstreams in repeated characters in the data. We employ 16 dictionary-based 246 Proceedings of APSIPA Annual Summit and Conference 2019 18-21 November 2019, Lanzhou, China Input text data can be varied greatly in a small data change unlike other 1 0.2 0.4 0.11 0 1 0.3 general images or videos, using SPP layer is more suitable for the text data. layers ڮ1D Convolutional Spatial Pyramid Pooling layer C. CNN architecture for compression type classification 1×6 1×4 1×2 Filters Compressed text data is employed as the input in the form of bitstreams represented in hexadecimal codes and each bit value is normalized within 0∼1 range. The overall Features network consists of 5 convolutional layers, SPP layer, and 6×256 dim 4×256 dim 2×256 dim 2 fully-connected layers. The kernel size is all same as 3 and the number of channels is different for various scale Concatenation feature maps at each convolutional layer as shown in Fig.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us