Skip to content

JPM (.jpm)

.jpm file signature | image/jpm

JPEG 2000format[18]

Safe

Magic Bytes

Offset 0
00 00 00 0C 6A 50 20 20 0D 0A 87 0A

Sources: Apache Tika, Wikipedia

Extension

.jpm

MIME Type

image/jpm

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .jpm files in Python

Python
def is_jpm(file_path: str) -> bool:
    """Check if file is a valid JPM by magic bytes."""
    signature = bytes([0x00, 0x00, 0x00, 0x0C, 0x6A, 0x50, 0x20, 0x20, 0x0D, 0x0A, 0x87, 0x0A])
    with open(file_path, "rb") as f:
        return f.read(12) == signature

How to validate .jpm files in Node.js

Node.js
function isJPM(buffer: Buffer): boolean {
  const signature = Buffer.from([0x00, 0x00, 0x00, 0x0C, 0x6A, 0x50, 0x20, 0x20, 0x0D, 0x0A, 0x87, 0x0A]);
  return buffer.subarray(0, 12).equals(signature);
}

How to validate .jpm files in Go

Go
func IsJPM(data []byte) bool {
    signature := []byte{0x00, 0x00, 0x00, 0x0C, 0x6A, 0x50, 0x20, 0x20, 0x0D, 0x0A, 0x87, 0x0A}
    if len(data) < 12 {
        return false
    }
    return bytes.Equal(data[:12], signature)
}

API Endpoint

GET /api/v1/jpm
curl https://filesignature.org/api/v1/jpm

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .jpm file?

A .jpm file is a JPM file. JPEG 2000format[18]

What are the magic bytes for .jpm files?

The magic bytes for JPM files are 00 00 00 0C 6A 50 20 20 0D 0A 87 0A at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .jpm file?

To validate a .jpm file, read the first bytes of the file and compare them against the known magic bytes (00 00 00 0C 6A 50 20 20 0D 0A 87 0A) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .jpm files?

The primary MIME type for .jpm files is image/jpm.

Is it safe to open .jpm files?

JPM (.jpm) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.