Skip to main content

Photo Forensics on Shanzhai Mobile Phone

  • Conference paper
  • 1999 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7992))

Abstract

There is an increasing number of crime cases involving mobile phones. In particular, due to the low cost of China shanzhai mobile phone (Chinese pirated mobile phone), a significant portion of these crime cases (all over the world) is related to these shanzhai phones. Quite a number of the cases also involve pictures. The difficulty of conducting forensic investigation on shanzhai phones is the lack of specifications. In this paper, we try to provide some important information of how a photo is stored inside a MTK-based shanzhai phone (one of the most popular platforms for shanzhai phones), and provide a method to recover deleted photos from the physical segments of flash memory of a shanzhai phone. abstract environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Worldwide Mobile Phone Market Grew 20İn: Q1 2011, Fueled By Smartphone Boom (2011), http://techcrunch.com/2011/04/28/worldwide-mobile-phone-market-grew-20-in-q1-fueled-by-smartphone-boom

  2. Dual-core smartphones: The next mobile arms race (2011), http://www.silicon.com/technology/mobile/2011/01/12/dual-core-smartphones-the-next-mobile-arms-race-39746799

  3. Mislan, R.: Cellphone crime solvers. IEEE Spectrum 47, 34–39 (2010)

    Article  Google Scholar 

  4. Fake iPhone 4G Mobile Phone Hits Shanzhai Market (2010), http://www.suite101.com/news/fake-iphone-4g-mobile-phone-hits-shanzhai-market-a234058

  5. MediaTek, http://www.mediatek.com

  6. Spreadtrum, http://www.Spreadtrum.com

  7. McCarthy, P.: Forensic analysis of mobile phones. Master thesis, University of South Australia (2005)

    Google Scholar 

  8. Breeuwsma, M., Jongh, M., Klaver, C., Knijff, R., Roeloffs, M.: Forensic Data Recovery from Flash Memory. Small Scale Digital Device Forensics Journal 1, 1–17 (2007)

    Google Scholar 

  9. Expert: ‘Flasher’ technology digs deeper for digital evidence, http://www.physorg.com/news95611284.html

  10. Gratzer, V., Naccache, D.: Cryptography, Law Enforcement, and Mobile Communications. IEEE Security and Privacy 4, 67–70 (2006)

    Article  Google Scholar 

  11. Willassen, S.: Forensic Analysis of Mobile Phone Internal Memory. In: IFIP The International Federation for Information Processing, Advances in Digital Forensics IV, pp. 191–204. Springer, Boston (2005)

    Google Scholar 

  12. Zhang, Z.W.: The research of MTK mobile phones flash file system recovery. Netinfo Security 11, 34–36 (2010)

    Google Scholar 

  13. Fang, J., Jiang, Z.L., He, M., Yiu, S.M., Hui, L.C.K., Chow, K.P., Zhou, G.: Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones. In: Seventh IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012), Vancouver BC, Canada, pp. 1–14 (2012)

    Google Scholar 

  14. Fang, J., Jiang, Z.L., Chow, K.P., Yiu, S.M., Hui, L.C.K., Zhou, G., He, M., Tang, Y.: Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. In: Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics VIII, pp. 117–130. Springer, Boston (2012)

    Google Scholar 

  15. Karresand, M., Shahmehri, N.: Oscar-file type identification of binary data in disk clusters and RAM pages. In: IFIP International Federation for Information Processing, Security and Privacy in Dynamic Environments, vol. 201, pp. 413–424. Springer, Boston (2006)

    Google Scholar 

  16. Karresand, M., Shahmehri, N.: File type identification of data fragments by their binary structure. In: 2006 IEEE Workshop on Information Assurance, pp. 140–147. IEEE Press, New York (2006)

    Chapter  Google Scholar 

  17. Calhoun, W.C., Coles, D.: Predicting the types of file fragments. Digital Investigation 5, s14–s20 (2008)

    Google Scholar 

  18. JPEG Standard (JPEG ISO/IEC 10918-1 ITU-T Recommendation T.81), http://www.w3.org/Graphics/JPEG/itu-t81.pdf

  19. Garfinkel, S.: Carving Contiguous and Fragmented Files with Fast Object Validation. Digital Investigation 4S, s2–s12 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, G. et al. (2013). Photo Forensics on Shanzhai Mobile Phone. In: Ren, K., Liu, X., Liang, W., Xu, M., Jia, X., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2013. Lecture Notes in Computer Science, vol 7992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39701-1_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39701-1_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39700-4

  • Online ISBN: 978-3-642-39701-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics