Browse Definitions :
File Extension

JPG File Format

JPEG bitmap

JPG file format icon

JPG is a file extension for a lossy graphics file. The JPEG file extension is used interchangeably with JPG. JPEG stands for Joint Photographic Experts Group who created the standard. JPG files have 2 sub-formats, JPG/Exif (often used in digital cameras and photographic equipment), and JPG/JFIF (often used on the World Wide Web).

The JPEG standard specifies the codec, which defines how an image is compressed into a stream of bytes and decompressed back into an image, but not the file format used to contain that stream. The Exif and JFIF standards define the commonly used formats for interchange of JPEG-compressed images.

A JPG file consists of a sequence of segments, each beginning with a marker, each of which begins with a 0xFF byte followed by a byte indicating what kind of marker it is. Some markers consist of just those two bytes; others are followed by two bytes indicating the length of marker-specific payload data that follows.

JPG files can be opened by most image editing software, from Microsoft Paint to Adobe Photoshop.

 

MIME type: image/jpeg

 

Learn more about .JPG files:

Visit theJPEG web page.

See answers to .JPG-related questions at ITKnowledgeExchange.com.

This was last updated in July 2010
Browse File Extensions Alphabetically:

Join the conversation

5 comments

Send me notifications when other members comment.

Please create a username to comment.

To open this file you can use any image viewer. If you want to edit JPG file, you should find software on website like this:

http://www.fileextension.org/JPG
Cancel
how i can convert my word doc file to JPG?
Cancel
got a jpg file in 3d wondering if i can put in autocad ? ty in advance
Cancel
Sorry, to have to ask this but I need to send a photo in an email & have no clue how to do it. I have only sent them in a message. The email states I have to send the photo thru JPG. Please help e if you can. Thanks
Cancel
What I want to know is who made JPG as a file type, but I don't see any info for that at all.

Cancel

-ADS BY GOOGLE

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • intrusion prevention system (IPS)

    An intrusion prevention system (IPS) is a network security and threat prevention tool.

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close