Integrity Analysis of Multimedia File Transmission between Mobile Phones

Full Text (PDF, 1215KB), PP.27-36

Views: 0 Downloads: 0


Sweta Deana Bye. Dhondoo 1,* Vidasha. Ramnarain-Seetohul 1 Razvi. Doomun 1

1. University of Mauritius Department of Computer Science and Engineering, Reduit, Mauritius

* Corresponding author.


Received: 16 Jan. 2014 / Revised: 11 Apr. 2014 / Accepted: 2 Jun. 2014 / Published: 8 Aug. 2014

Index Terms

Mobile devices, Mobile forensics, Bluetooth, Multimedia Messages, graphic file


Mobile forensics deals with evidence from mobile devices. Data recovered from the mobile devices are helpful in investigation to solve criminal cases. It is crucial to preserve the integrity of these data. According to research carried out [1], it has been noted that not all data extracted from mobile phones have discrepancies in hash values during integrity verification. It has been reported that only the Multimedia Messaging Service message type showed a variation in hash values when performing data extraction. The main objective in this work is to study the variance in the content of the graphic files transferred between mobile phones via Bluetooth or MMS. We also determine the causes of such variations, if any, while checking the graphics file integrity. Different parameters including distance and file format have been varied and a series of test were conducted using: mobile sets of same make same model, same make different model and different make different model on different graphic file formats of different sizes. Results obtained confirmed that there was no alteration of graphic files during Bluetooth transmission. However, while transmitting the graphic files through Multimedia Messaging Service, results showed notable alteration level for graphic files of certain file format and size.

Cite This Paper

Sweta Deana Bye. Dhondoo, Vidasha. Ramnarain-Seetohul, Razvi. Doomun, "Integrity Analysis of Multimedia File Transmission between Mobile Phones", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.9, pp.27-36, 2014. DOI:10.5815/ijcnis.2014.09.04


[1]Danker, S., Ayers, R. & Mislan, R.P., 2009. Hashing Techniques for Mobile Device Forensics, Small scale digital device forensics journal [online], 3 (1).
[2]Dankner, S., 2009, Viability of Using Hash Values in Mobile Forensics, Exeter: Author.
[3]Borgstr?m, K., 2008. Multimedia Messaging Service Components for Web 2.0. Master of Science Thesis. K T H Information and Communication Technology.
[4]Katz D., Gentile R., 2005. Embedded Media Processing [online]. U.S, Newnes.
[5]Coulombe, S ,Grassel G., 2004. Multimedia Adaptation for the Multimedia Messaging Service. IEEE Communications Magazine, 42 (7), 120–126.
[6]Ghaderi, M., Srinivasan, K., 2005. Multimedia Messaging Service: System Description and Performance Analysis. IEEE Communications Magazine, 198 – 205.
[7]Wei-Qi, Y., 2007. Multimedia simplification for optimized MMS synthesis. ACM Digital Library, 3 (1), 1-23.
[8]Comverse, 2009. MMS Is Growing in More Ways than One: The Dimensions and Implications of Surging MMS Growth.U.S: COMVERSE.
[9]Kornblum, J., 2006. Identifying almost identical files using context triggered piecewise hashing. Digital Investigating 3S.
[10]Le Bodic, G., 2003. Multimedia Messaging Service: An Engineering Approach to MMS [online]. England, Wiley.
[11]Saylor, M., 2012. The Mobile Wave: How Mobile Intelligence Will Change everything [online]. U.S, Vanguard Press.
[12]Sobieraj, S.C., 2008. Mobile Device Forensics Case File Integrity Verification. Thesis (Master). Purdue University.
[13]Soinio, A., 2004. Viewing Multimedia Messages with 3GPP SMIL in a Size Driven Mobile Terminal. Master of Science Thesis. Abo Akademi University.
[14]Sridevi M.E, Vijayakuymar V.R,Anuja R 2012. A survey on various compression methods for medical images, I.J Intelligent Systems and Applications,2012,3,13-19.DOI: 10.5815/ijisa.2012.03.02
[15]Kaur P, Chhabra N., 2012. Image Segmentation Techniques for noisy digital images based upon Fuzzy logic-A review and Comparison, I,J Intelligent Systems and Applications,2012,7,30-36. DOI 10.5815/ijisa.202.07.04