Advertisement

Photo Forensics on Shanzhai Mobile Phone

  • Gang Zhou
  • Yanbin Tang
  • Junbin Fang
  • Zoe L. Jiang
  • K. P. Chow
  • S. M. Yiu
  • Lucas C. K. Hui
  • Rougsheng Xu
  • Yonghao Mai
  • Shuhui Hou
  • Fei Xu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7992)

Abstract

There is an increasing number of crime cases involving mobile phones. In particular, due to the low cost of China shanzhai mobile phone (Chinese pirated mobile phone), a significant portion of these crime cases (all over the world) is related to these shanzhai phones. Quite a number of the cases also involve pictures. The difficulty of conducting forensic investigation on shanzhai phones is the lack of specifications. In this paper, we try to provide some important information of how a photo is stored inside a MTK-based shanzhai phone (one of the most popular platforms for shanzhai phones), and provide a method to recover deleted photos from the physical segments of flash memory of a shanzhai phone. abstract environment.

Keywords

Shanzhai mobile phone photo forensics file carving MediaTek 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Worldwide Mobile Phone Market Grew 20İn: Q1 2011, Fueled By Smartphone Boom (2011), http://techcrunch.com/2011/04/28/worldwide-mobile-phone-market-grew-20-in-q1-fueled-by-smartphone-boom
  2. 2.
  3. 3.
    Mislan, R.: Cellphone crime solvers. IEEE Spectrum 47, 34–39 (2010)CrossRefGoogle Scholar
  4. 4.
    Fake iPhone 4G Mobile Phone Hits Shanzhai Market (2010), http://www.suite101.com/news/fake-iphone-4g-mobile-phone-hits-shanzhai-market-a234058
  5. 5.
  6. 6.
  7. 7.
    McCarthy, P.: Forensic analysis of mobile phones. Master thesis, University of South Australia (2005)Google Scholar
  8. 8.
    Breeuwsma, M., Jongh, M., Klaver, C., Knijff, R., Roeloffs, M.: Forensic Data Recovery from Flash Memory. Small Scale Digital Device Forensics Journal 1, 1–17 (2007)Google Scholar
  9. 9.
    Expert: ‘Flasher’ technology digs deeper for digital evidence, http://www.physorg.com/news95611284.html
  10. 10.
    Gratzer, V., Naccache, D.: Cryptography, Law Enforcement, and Mobile Communications. IEEE Security and Privacy 4, 67–70 (2006)CrossRefGoogle Scholar
  11. 11.
    Willassen, S.: Forensic Analysis of Mobile Phone Internal Memory. In: IFIP The International Federation for Information Processing, Advances in Digital Forensics IV, pp. 191–204. Springer, Boston (2005)Google Scholar
  12. 12.
    Zhang, Z.W.: The research of MTK mobile phones flash file system recovery. Netinfo Security 11, 34–36 (2010)Google Scholar
  13. 13.
    Fang, J., Jiang, Z.L., He, M., Yiu, S.M., Hui, L.C.K., Chow, K.P., Zhou, G.: Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones. In: Seventh IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2012), Vancouver BC, Canada, pp. 1–14 (2012)Google Scholar
  14. 14.
    Fang, J., Jiang, Z.L., Chow, K.P., Yiu, S.M., Hui, L.C.K., Zhou, G., He, M., Tang, Y.: Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. In: Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics VIII, pp. 117–130. Springer, Boston (2012)Google Scholar
  15. 15.
    Karresand, M., Shahmehri, N.: Oscar-file type identification of binary data in disk clusters and RAM pages. In: IFIP International Federation for Information Processing, Security and Privacy in Dynamic Environments, vol. 201, pp. 413–424. Springer, Boston (2006)Google Scholar
  16. 16.
    Karresand, M., Shahmehri, N.: File type identification of data fragments by their binary structure. In: 2006 IEEE Workshop on Information Assurance, pp. 140–147. IEEE Press, New York (2006)CrossRefGoogle Scholar
  17. 17.
    Calhoun, W.C., Coles, D.: Predicting the types of file fragments. Digital Investigation 5, s14–s20 (2008)Google Scholar
  18. 18.
    JPEG Standard (JPEG ISO/IEC 10918-1 ITU-T Recommendation T.81), http://www.w3.org/Graphics/JPEG/itu-t81.pdf
  19. 19.
    Garfinkel, S.: Carving Contiguous and Fragmented Files with Fast Object Validation. Digital Investigation 4S, s2–s12 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Gang Zhou
    • 1
  • Yanbin Tang
    • 2
  • Junbin Fang
    • 2
    • 3
  • Zoe L. Jiang
    • 4
  • K. P. Chow
    • 2
  • S. M. Yiu
    • 2
  • Lucas C. K. Hui
    • 2
  • Rougsheng Xu
    • 5
  • Yonghao Mai
    • 6
  • Shuhui Hou
    • 7
  • Fei Xu
    • 8
  1. 1.Wuhan Engineering Science and Technology InstituteWuhanChina
  2. 2.Department of Computer ScienceThe University of Hong KongHong Kong SAR, China
  3. 3.Department of Optoelectronic EngineeringJinan UniversityGuangzhouChina
  4. 4.Harbin Institute of Technology Shenzhen Graduate SchoolShenzhenChina
  5. 5.Institute of High Energy PhysicsChinese Academy of SciencesChina
  6. 6.Hubei University of PoliceChina
  7. 7.Department of Information and Computing ScienceUniversity of Science and Technology BeijingChina
  8. 8.Institute of Information EngineeringChinese Academy of SciencesChina

Personalised recommendations