Abstract
There is an increasing number of crime cases involving mobile phones. In particular, due to the low cost of China shanzhai mobile phone (Chinese pirated mobile phone), a significant portion of these crime cases (all over the world) is related to these shanzhai phones. Quite a number of the cases also involve pictures. The difficulty of conducting forensic investigation on shanzhai phones is the lack of specifications. In this paper, we try to provide some important information of how a photo is stored inside a MTK-based shanzhai phone (one of the most popular platforms for shanzhai phones), and provide a method to recover deleted photos from the physical segments of flash memory of a shanzhai phone. abstract environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Worldwide Mobile Phone Market Grew 20İn: Q1 2011, Fueled By Smartphone Boom (2011), http://techcrunch.com/2011/04/28/worldwide-mobile-phone-market-grew-20-in-q1-fueled-by-smartphone-boom
Dual-core smartphones: The next mobile arms race (2011), http://www.silicon.com/technology/mobile/2011/01/12/dual-core-smartphones-the-next-mobile-arms-race-39746799
Mislan, R.: Cellphone crime solvers. IEEE Spectrum 47, 34–39 (2010)
Fake iPhone 4G Mobile Phone Hits Shanzhai Market (2010), http://www.suite101.com/news/fake-iphone-4g-mobile-phone-hits-shanzhai-market-a234058
MediaTek, http://www.mediatek.com
Spreadtrum, http://www.Spreadtrum.com
McCarthy, P.: Forensic analysis of mobile phones. Master thesis, University of South Australia (2005)
Breeuwsma, M., Jongh, M., Klaver, C., Knijff, R., Roeloffs, M.: Forensic Data Recovery from Flash Memory. Small Scale Digital Device Forensics Journal 1, 1–17 (2007)
Expert: ‘Flasher’ technology digs deeper for digital evidence, http://www.physorg.com/news95611284.html
Gratzer, V., Naccache, D.: Cryptography, Law Enforcement, and Mobile Communications. IEEE Security and Privacy 4, 67–70 (2006)
Willassen, S.: Forensic Analysis of Mobile Phone Internal Memory. In: IFIP The International Federation for Information Processing, Advances in Digital Forensics IV, pp. 191–204. Springer, Boston (2005)
Zhang, Z.W.: The research of MTK mobile phones flash file system recovery. Netinfo Security 11, 34–36 (2010)
Fang, J., Jiang, Z.L., He, M., Yiu, S.M., Hui, L.C.K., Chow, K.P., Zhou, G.: Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones. In: Seventh IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012), Vancouver BC, Canada, pp. 1–14 (2012)
Fang, J., Jiang, Z.L., Chow, K.P., Yiu, S.M., Hui, L.C.K., Zhou, G., He, M., Tang, Y.: Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. In: Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics VIII, pp. 117–130. Springer, Boston (2012)
Karresand, M., Shahmehri, N.: Oscar-file type identification of binary data in disk clusters and RAM pages. In: IFIP International Federation for Information Processing, Security and Privacy in Dynamic Environments, vol. 201, pp. 413–424. Springer, Boston (2006)
Karresand, M., Shahmehri, N.: File type identification of data fragments by their binary structure. In: 2006 IEEE Workshop on Information Assurance, pp. 140–147. IEEE Press, New York (2006)
Calhoun, W.C., Coles, D.: Predicting the types of file fragments. Digital Investigation 5, s14–s20 (2008)
JPEG Standard (JPEG ISO/IEC 10918-1 ITU-T Recommendation T.81), http://www.w3.org/Graphics/JPEG/itu-t81.pdf
Garfinkel, S.: Carving Contiguous and Fragmented Files with Fast Object Validation. Digital Investigation 4S, s2–s12 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, G. et al. (2013). Photo Forensics on Shanzhai Mobile Phone. In: Ren, K., Liu, X., Liang, W., Xu, M., Jia, X., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2013. Lecture Notes in Computer Science, vol 7992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39701-1_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-39701-1_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39700-4
Online ISBN: 978-3-642-39701-1
eBook Packages: Computer ScienceComputer Science (R0)