I looked into this, but those .pk1 and .pk2 files are tough nuts to crack. I found this thread, and I know how to use the files found within them (this page explains the formats), but I asked Kosheh and unfortunately he can't remember how he decompressed them.
One thing I will say is that I would expect any palette data to be in NCLR/RLCN files. Most likely they're probably somewhere in the .pk1/.pk2 files as well, but if anyone finds any outside of them then it might help.
EDIT: Crud, OK, took a closer look and they may not actually be compressed (after unpacking them in Tinke). The format looks a bit strange but I may actually be onto something here. Can't promise anything and it'll probably take a while (school and whatnot) but it might not be as hopeless as I thought.
EDIT2: By the way, after seeing ZTO's other thread in QIT, I feel I should explain this; the LZ10 encryption Kosheh mentioned in the above thread is how the files are initially encrypted in the ROM. Tinke can easily remove this encryption by selecting the file and clicking "Unpack", giving the decrypted version. This counts for .pk1, .pk2, and .pk files. With Tahaxan, upon extracting it'll ask you if you want to decompress the file; say yes.
I think that after they've been decrypted, they're in their original form, just in a strange format. That's what I'm currently investigating.
One thing I will say is that I would expect any palette data to be in NCLR/RLCN files. Most likely they're probably somewhere in the .pk1/.pk2 files as well, but if anyone finds any outside of them then it might help.
EDIT: Crud, OK, took a closer look and they may not actually be compressed (after unpacking them in Tinke). The format looks a bit strange but I may actually be onto something here. Can't promise anything and it'll probably take a while (school and whatnot) but it might not be as hopeless as I thought.
EDIT2: By the way, after seeing ZTO's other thread in QIT, I feel I should explain this; the LZ10 encryption Kosheh mentioned in the above thread is how the files are initially encrypted in the ROM. Tinke can easily remove this encryption by selecting the file and clicking "Unpack", giving the decrypted version. This counts for .pk1, .pk2, and .pk files. With Tahaxan, upon extracting it'll ask you if you want to decompress the file; say yes.
I think that after they've been decrypted, they're in their original form, just in a strange format. That's what I'm currently investigating.