Skip to content

MJ2 (.mj2)

.mj2 file signature | video/mj2

JPEG 2000format[18]

Safe

Magic Bytes

Offset 0
00 00 00 0C 6A 50 20 20 0D 0A 87 0A

Sources: Apache Tika, Wikipedia

Extension

.mj2

MIME Type

video/mj2

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .mj2 files in Python

Python
def is_mj2(file_path: str) -> bool:
    """Check if file is a valid MJ2 by magic bytes."""
    signature = bytes([0x00, 0x00, 0x00, 0x0C, 0x6A, 0x50, 0x20, 0x20, 0x0D, 0x0A, 0x87, 0x0A])
    with open(file_path, "rb") as f:
        return f.read(12) == signature

How to validate .mj2 files in Node.js

Node.js
function isMJ2(buffer: Buffer): boolean {
  const signature = Buffer.from([0x00, 0x00, 0x00, 0x0C, 0x6A, 0x50, 0x20, 0x20, 0x0D, 0x0A, 0x87, 0x0A]);
  return buffer.subarray(0, 12).equals(signature);
}

How to validate .mj2 files in Go

Go
func IsMJ2(data []byte) bool {
    signature := []byte{0x00, 0x00, 0x00, 0x0C, 0x6A, 0x50, 0x20, 0x20, 0x0D, 0x0A, 0x87, 0x0A}
    if len(data) < 12 {
        return false
    }
    return bytes.Equal(data[:12], signature)
}

API Endpoint

GET /api/v1/mj2
curl https://filesignature.org/api/v1/mj2

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .mj2 file?

A .mj2 file is a MJ2 file. JPEG 2000format[18]

What are the magic bytes for .mj2 files?

The magic bytes for MJ2 files are 00 00 00 0C 6A 50 20 20 0D 0A 87 0A at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .mj2 file?

To validate a .mj2 file, read the first bytes of the file and compare them against the known magic bytes (00 00 00 0C 6A 50 20 20 0D 0A 87 0A) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .mj2 files?

The primary MIME type for .mj2 files is video/mj2.

Is it safe to open .mj2 files?

MJ2 (.mj2) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.