108 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			108 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
A Fast Method for Identifying Plain Text Files
 | 
						|
==============================================
 | 
						|
 | 
						|
 | 
						|
Introduction
 | 
						|
------------
 | 
						|
 | 
						|
Given a file coming from an unknown source, it is sometimes desirable
 | 
						|
to find out whether the format of that file is plain text.  Although
 | 
						|
this may appear like a simple task, a fully accurate detection of the
 | 
						|
file type requires heavy-duty semantic analysis on the file contents.
 | 
						|
It is, however, possible to obtain satisfactory results by employing
 | 
						|
various heuristics.
 | 
						|
 | 
						|
Previous versions of PKZip and other zip-compatible compression tools
 | 
						|
were using a crude detection scheme: if more than 80% (4/5) of the bytes
 | 
						|
found in a certain buffer are within the range [7..127], the file is
 | 
						|
labeled as plain text, otherwise it is labeled as binary.  A prominent
 | 
						|
limitation of this scheme is the restriction to Latin-based alphabets.
 | 
						|
Other alphabets, like Greek, Cyrillic or Asian, make extensive use of
 | 
						|
the bytes within the range [128..255], and texts using these alphabets
 | 
						|
are most often misidentified by this scheme; in other words, the rate
 | 
						|
of false negatives is sometimes too high, which means that the recall
 | 
						|
is low.  Another weakness of this scheme is a reduced precision, due to
 | 
						|
the false positives that may occur when binary files containing large
 | 
						|
amounts of textual characters are misidentified as plain text.
 | 
						|
 | 
						|
In this article we propose a new, simple detection scheme that features
 | 
						|
a much increased precision and a near-100% recall.  This scheme is
 | 
						|
designed to work on ASCII, Unicode and other ASCII-derived alphabets,
 | 
						|
and it handles single-byte encodings (ISO-8859, MacRoman, KOI8, etc.)
 | 
						|
and variable-sized encodings (ISO-2022, UTF-8, etc.).  Wider encodings
 | 
						|
(UCS-2/UTF-16 and UCS-4/UTF-32) are not handled, however.
 | 
						|
 | 
						|
 | 
						|
The Algorithm
 | 
						|
-------------
 | 
						|
 | 
						|
The algorithm works by dividing the set of bytecodes [0..255] into three
 | 
						|
categories:
 | 
						|
- The white list of textual bytecodes:
 | 
						|
  9 (TAB), 10 (LF), 13 (CR), 32 (SPACE) to 255.
 | 
						|
- The gray list of tolerated bytecodes:
 | 
						|
  7 (BEL), 8 (BS), 11 (VT), 12 (FF), 26 (SUB), 27 (ESC).
 | 
						|
- The black list of undesired, non-textual bytecodes:
 | 
						|
  0 (NUL) to 6, 14 to 31.
 | 
						|
 | 
						|
If a file contains at least one byte that belongs to the white list and
 | 
						|
no byte that belongs to the black list, then the file is categorized as
 | 
						|
plain text; otherwise, it is categorized as binary.  (The boundary case,
 | 
						|
when the file is empty, automatically falls into the latter category.)
 | 
						|
 | 
						|
 | 
						|
Rationale
 | 
						|
---------
 | 
						|
 | 
						|
The idea behind this algorithm relies on two observations.
 | 
						|
 | 
						|
The first observation is that, although the full range of 7-bit codes
 | 
						|
[0..127] is properly specified by the ASCII standard, most control
 | 
						|
characters in the range [0..31] are not used in practice.  The only
 | 
						|
widely-used, almost universally-portable control codes are 9 (TAB),
 | 
						|
10 (LF) and 13 (CR).  There are a few more control codes that are
 | 
						|
recognized on a reduced range of platforms and text viewers/editors:
 | 
						|
7 (BEL), 8 (BS), 11 (VT), 12 (FF), 26 (SUB) and 27 (ESC); but these
 | 
						|
codes are rarely (if ever) used alone, without being accompanied by
 | 
						|
some printable text.  Even the newer, portable text formats such as
 | 
						|
XML avoid using control characters outside the list mentioned here.
 | 
						|
 | 
						|
The second observation is that most of the binary files tend to contain
 | 
						|
control characters, especially 0 (NUL).  Even though the older text
 | 
						|
detection schemes observe the presence of non-ASCII codes from the range
 | 
						|
[128..255], the precision rarely has to suffer if this upper range is
 | 
						|
labeled as textual, because the files that are genuinely binary tend to
 | 
						|
contain both control characters and codes from the upper range.  On the
 | 
						|
other hand, the upper range needs to be labeled as textual, because it
 | 
						|
is used by virtually all ASCII extensions.  In particular, this range is
 | 
						|
used for encoding non-Latin scripts.
 | 
						|
 | 
						|
Since there is no counting involved, other than simply observing the
 | 
						|
presence or the absence of some byte values, the algorithm produces
 | 
						|
consistent results, regardless what alphabet encoding is being used.
 | 
						|
(If counting were involved, it could be possible to obtain different
 | 
						|
results on a text encoded, say, using ISO-8859-16 versus UTF-8.)
 | 
						|
 | 
						|
There is an extra category of plain text files that are "polluted" with
 | 
						|
one or more black-listed codes, either by mistake or by peculiar design
 | 
						|
considerations.  In such cases, a scheme that tolerates a small fraction
 | 
						|
of black-listed codes would provide an increased recall (i.e. more true
 | 
						|
positives).  This, however, incurs a reduced precision overall, since
 | 
						|
false positives are more likely to appear in binary files that contain
 | 
						|
large chunks of textual data.  Furthermore, "polluted" plain text should
 | 
						|
be regarded as binary by general-purpose text detection schemes, because
 | 
						|
general-purpose text processing algorithms might not be applicable.
 | 
						|
Under this premise, it is safe to say that our detection method provides
 | 
						|
a near-100% recall.
 | 
						|
 | 
						|
Experiments have been run on many files coming from various platforms
 | 
						|
and applications.  We tried plain text files, system logs, source code,
 | 
						|
formatted office documents, compiled object code, etc.  The results
 | 
						|
confirm the optimistic assumptions about the capabilities of this
 | 
						|
algorithm.
 | 
						|
 | 
						|
 | 
						|
--
 | 
						|
Cosmin Truta
 | 
						|
Last updated: 2006-May-28
 |