deJpeg is a simple Windows program that lets you extract embedded images from data files, mainly Microsoft Word (.Doc, .Docx) and EXE files. It may work with other types of files as well, since the developer says so, but is extremely unlikely as I tried several different types with no luck. Mostly, I hoped it would support PDF, but it didn’t.
deJpeg’s interface is very spartan. You click the Analyze button and then use the explorer file picker to locate the file you want to extract images from. As soon as you click OK, the status bar indicating the progress of the extraction process will shoot across the window and a message will announce the number of JPEG files successfully extracted.
And then you will wonder where the hell the images got extracted to. Well, it’s in the same folder as the source file, and thanks to the lack of hindsight by the developer, it’s not contained neatly inside a sub-folder but spread out, intermixed with all other files the source folder may contain. It would have been real nice if users could choose where they want the images to end up in. The images are also renamed during extraction and saved as image1, image2, etc. If the original filenames were important, than tough luck.
Another problem with deJpeg is that it can extract only JPEG images. So if the original embedded images are in any other format such as PNG or GIF, deJpeg will fail to detect them.
While there are certainly better applications to extract images from Microsoft Word documents (Office Image Extraction Wizard is a nice one that supports batch extraction), deJpeg’s saving grace is the support for EXE files.
Extracting images from EXE files is a bit tricky. You need a resource hacking tool to poke and prod the file until you discover the hidden images. deJpeg makes this easier and should be a handy alternative and time saver for all reverse engineers and file hackers.
And if everything else fails, you can still manually extract images, videos and audio files from Word documents.