{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:07:23Z","timestamp":1725739643695},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642397004"},{"type":"electronic","value":"9783642397011"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39701-1_37","type":"book-chapter","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T14:19:31Z","timestamp":1372947571000},"page":"454-464","source":"Crossref","is-referenced-by-count":0,"title":["Photo Forensics on Shanzhai Mobile Phone"],"prefix":"10.1007","author":[{"given":"Gang","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yanbin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Zoe L.","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"K. P.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"Lucas C. K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"Rougsheng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yonghao","family":"Mai","sequence":"additional","affiliation":[]},{"given":"Shuhui","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"Worldwide Mobile Phone Market Grew 20\u0130n: Q1 2011, Fueled By Smartphone Boom (2011), \n                  \n                    http:\/\/techcrunch.com\/2011\/04\/28\/worldwide-mobile-phone-market-grew-20-in-q1-fueled-by-smartphone-boom"},{"key":"37_CR2","unstructured":"Dual-core smartphones: The next mobile arms race (2011), \n                  \n                    http:\/\/www.silicon.com\/technology\/mobile\/2011\/01\/12\/dual-core-smartphones-the-next-mobile-arms-race-39746799"},{"key":"37_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSPEC.2010.5491013","volume":"47","author":"R. Mislan","year":"2010","unstructured":"Mislan, R.: Cellphone crime solvers. IEEE Spectrum\u00a047, 34\u201339 (2010)","journal-title":"IEEE Spectrum"},{"key":"37_CR4","unstructured":"Fake iPhone 4G Mobile Phone Hits Shanzhai Market (2010), \n                  \n                    http:\/\/www.suite101.com\/news\/fake-iphone-4g-mobile-phone-hits-shanzhai-market-a234058"},{"key":"37_CR5","unstructured":"MediaTek, \n                  \n                    http:\/\/www.mediatek.com"},{"key":"37_CR6","unstructured":"Spreadtrum, \n                  \n                    http:\/\/www.Spreadtrum.com"},{"key":"37_CR7","unstructured":"McCarthy, P.: Forensic analysis of mobile phones. Master thesis, University of South Australia (2005)"},{"key":"37_CR8","first-page":"1","volume":"1","author":"M. Breeuwsma","year":"2007","unstructured":"Breeuwsma, M., Jongh, M., Klaver, C., Knijff, R., Roeloffs, M.: Forensic Data Recovery from Flash Memory. Small Scale Digital Device Forensics Journal\u00a01, 1\u201317 (2007)","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"37_CR9","unstructured":"Expert: \u2018Flasher\u2019 technology digs deeper for digital evidence, \n                  \n                    http:\/\/www.physorg.com\/news95611284.html"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MSP.2006.148","volume":"4","author":"V. Gratzer","year":"2006","unstructured":"Gratzer, V., Naccache, D.: Cryptography, Law Enforcement, and Mobile Communications. IEEE Security and Privacy\u00a04, 67\u201370 (2006)","journal-title":"IEEE Security and Privacy"},{"key":"37_CR11","first-page":"191","volume-title":"IFIP The International Federation for Information Processing, Advances in Digital Forensics IV","author":"S. Willassen","year":"2005","unstructured":"Willassen, S.: Forensic Analysis of Mobile Phone Internal Memory. In: IFIP The International Federation for Information Processing, Advances in Digital Forensics IV, pp. 191\u2013204. Springer, Boston (2005)"},{"key":"37_CR12","first-page":"34","volume":"11","author":"Z.W. Zhang","year":"2010","unstructured":"Zhang, Z.W.: The research of MTK mobile phones flash file system recovery. Netinfo Security\u00a011, 34\u201336 (2010)","journal-title":"Netinfo Security"},{"key":"37_CR13","unstructured":"Fang, J., Jiang, Z.L., He, M., Yiu, S.M., Hui, L.C.K., Chow, K.P., Zhou, G.: Investigating and Analyzing the Web-based Contents on Chinese Shanzhai Mobile Phones. In: Seventh IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE\/SADFE 2012), Vancouver BC, Canada, pp. 1\u201314 (2012)"},{"key":"37_CR14","first-page":"117","volume-title":"Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics VIII","author":"J. Fang","year":"2012","unstructured":"Fang, J., Jiang, Z.L., Chow, K.P., Yiu, S.M., Hui, L.C.K., Zhou, G., He, M., Tang, Y.: Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. In: Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics, Advances in Digital Forensics VIII, pp. 117\u2013130. Springer, Boston (2012)"},{"key":"37_CR15","first-page":"413","volume-title":"IFIP International Federation for Information Processing, Security and Privacy in Dynamic Environments","author":"M. Karresand","year":"2006","unstructured":"Karresand, M., Shahmehri, N.: Oscar-file type identification of binary data in disk clusters and RAM pages. In: IFIP International Federation for Information Processing, Security and Privacy in Dynamic Environments, vol.\u00a0201, pp. 413\u2013424. Springer, Boston (2006)"},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/IAW.2006.1652088","volume-title":"2006 IEEE Workshop on Information Assurance","author":"M. Karresand","year":"2006","unstructured":"Karresand, M., Shahmehri, N.: File type identification of data fragments by their binary structure. In: 2006 IEEE Workshop on Information Assurance, pp. 140\u2013147. IEEE Press, New York (2006)"},{"key":"37_CR17","doi-asserted-by":"crossref","first-page":"s14","DOI":"10.1016\/j.diin.2008.05.005","volume":"5","author":"W.C. Calhoun","year":"2008","unstructured":"Calhoun, W.C., Coles, D.: Predicting the types of file fragments. Digital Investigation\u00a05, s14\u2013s20 (2008)","journal-title":"Digital Investigation"},{"key":"37_CR18","unstructured":"JPEG Standard (JPEG ISO\/IEC 10918-1 ITU-T Recommendation T.81), \n                  \n                    http:\/\/www.w3.org\/Graphics\/JPEG\/itu-t81.pdf"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.: Carving Contiguous and Fragmented Files with Fast Object Validation. Digital Investigation\u00a04S, s2\u2013s12 (2007)","DOI":"10.1016\/j.diin.2007.06.017"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39701-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T17:44:39Z","timestamp":1547833479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39701-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642397004","9783642397011"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39701-1_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}