| 1 |
A Fast Method for Identifying Plain Text Files |
| 2 |
============================================== |
| 3 |
|
| 4 |
|
| 5 |
Introduction |
| 6 |
------------ |
| 7 |
|
| 8 |
Given a file coming from an unknown source, it is sometimes desirable |
| 9 |
to find out whether the format of that file is plain text. Although |
| 10 |
this may appear like a simple task, a fully accurate detection of the |
| 11 |
file type requires heavy-duty semantic analysis on the file contents. |
| 12 |
It is, however, possible to obtain satisfactory results by employing |
| 13 |
various heuristics. |
| 14 |
|
| 15 |
Previous versions of PKZip and other zip-compatible compression tools |
| 16 |
were using a crude detection scheme: if more than 80% (4/5) of the bytes |
| 17 |
found in a certain buffer are within the range [7..127], the file is |
| 18 |
labeled as plain text, otherwise it is labeled as binary. A prominent |
| 19 |
limitation of this scheme is the restriction to Latin-based alphabets. |
| 20 |
Other alphabets, like Greek, Cyrillic or Asian, make extensive use of |
| 21 |
the bytes within the range [128..255], and texts using these alphabets |
| 22 |
are most often misidentified by this scheme; in other words, the rate |
| 23 |
of false negatives is sometimes too high, which means that the recall |
| 24 |
is low. Another weakness of this scheme is a reduced precision, due to |
| 25 |
the false positives that may occur when binary files containing large |
| 26 |
amounts of textual characters are misidentified as plain text. |
| 27 |
|
| 28 |
In this article we propose a new, simple detection scheme that features |
| 29 |
a much increased precision and a near-100% recall. This scheme is |
| 30 |
designed to work on ASCII, Unicode and other ASCII-derived alphabets, |
| 31 |
and it handles single-byte encodings (ISO-8859, MacRoman, KOI8, etc.) |
| 32 |
and variable-sized encodings (ISO-2022, UTF-8, etc.). Wider encodings |
| 33 |
(UCS-2/UTF-16 and UCS-4/UTF-32) are not handled, however. |
| 34 |
|
| 35 |
|
| 36 |
The Algorithm |
| 37 |
------------- |
| 38 |
|
| 39 |
The algorithm works by dividing the set of bytecodes [0..255] into three |
| 40 |
categories: |
| 41 |
- The white list of textual bytecodes: |
| 42 |
9 (TAB), 10 (LF), 13 (CR), 32 (SPACE) to 255. |
| 43 |
- The gray list of tolerated bytecodes: |
| 44 |
7 (BEL), 8 (BS), 11 (VT), 12 (FF), 26 (SUB), 27 (ESC). |
| 45 |
- The black list of undesired, non-textual bytecodes: |
| 46 |
0 (NUL) to 6, 14 to 31. |
| 47 |
|
| 48 |
If a file contains at least one byte that belongs to the white list and |
| 49 |
no byte that belongs to the black list, then the file is categorized as |
| 50 |
plain text; otherwise, it is categorized as binary. (The boundary case, |
| 51 |
when the file is empty, automatically falls into the latter category.) |
| 52 |
|
| 53 |
|
| 54 |
Rationale |
| 55 |
--------- |
| 56 |
|
| 57 |
The idea behind this algorithm relies on two observations. |
| 58 |
|
| 59 |
The first observation is that, although the full range of 7-bit codes |
| 60 |
[0..127] is properly specified by the ASCII standard, most control |
| 61 |
characters in the range [0..31] are not used in practice. The only |
| 62 |
widely-used, almost universally-portable control codes are 9 (TAB), |
| 63 |
10 (LF) and 13 (CR). There are a few more control codes that are |
| 64 |
recognized on a reduced range of platforms and text viewers/editors: |
| 65 |
7 (BEL), 8 (BS), 11 (VT), 12 (FF), 26 (SUB) and 27 (ESC); but these |
| 66 |
codes are rarely (if ever) used alone, without being accompanied by |
| 67 |
some printable text. Even the newer, portable text formats such as |
| 68 |
XML avoid using control characters outside the list mentioned here. |
| 69 |
|
| 70 |
The second observation is that most of the binary files tend to contain |
| 71 |
control characters, especially 0 (NUL). Even though the older text |
| 72 |
detection schemes observe the presence of non-ASCII codes from the range |
| 73 |
[128..255], the precision rarely has to suffer if this upper range is |
| 74 |
labeled as textual, because the files that are genuinely binary tend to |
| 75 |
contain both control characters and codes from the upper range. On the |
| 76 |
other hand, the upper range needs to be labeled as textual, because it |
| 77 |
is used by virtually all ASCII extensions. In particular, this range is |
| 78 |
used for encoding non-Latin scripts. |
| 79 |
|
| 80 |
Since there is no counting involved, other than simply observing the |
| 81 |
presence or the absence of some byte values, the algorithm produces |
| 82 |
consistent results, regardless what alphabet encoding is being used. |
| 83 |
(If counting were involved, it could be possible to obtain different |
| 84 |
results on a text encoded, say, using ISO-8859-16 versus UTF-8.) |
| 85 |
|
| 86 |
There is an extra category of plain text files that are "polluted" with |
| 87 |
one or more black-listed codes, either by mistake or by peculiar design |
| 88 |
considerations. In such cases, a scheme that tolerates a small fraction |
| 89 |
of black-listed codes would provide an increased recall (i.e. more true |
| 90 |
positives). This, however, incurs a reduced precision overall, since |
| 91 |
false positives are more likely to appear in binary files that contain |
| 92 |
large chunks of textual data. Furthermore, "polluted" plain text should |
| 93 |
be regarded as binary by general-purpose text detection schemes, because |
| 94 |
general-purpose text processing algorithms might not be applicable. |
| 95 |
Under this premise, it is safe to say that our detection method provides |
| 96 |
a near-100% recall. |
| 97 |
|
| 98 |
Experiments have been run on many files coming from various platforms |
| 99 |
and applications. We tried plain text files, system logs, source code, |
| 100 |
formatted office documents, compiled object code, etc. The results |
| 101 |
confirm the optimistic assumptions about the capabilities of this |
| 102 |
algorithm. |
| 103 |
|
| 104 |
|
| 105 |
-- |
| 106 |
Cosmin Truta |
| 107 |
Last updated: 2006-May-28 |