Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2

Détails

ID Serval
serval:BIB_00F9CD268AC1
Type
Actes de conférence (partie): contribution originale à la littérature scientifique, publiée à l'occasion de conférences scientifiques, dans un ouvrage de compte-rendu (proceedings), ou dans l'édition spéciale d'un journal reconnu (conference proceedings).
Collection
Publications
Titre
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2
Titre de la conférence
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Auteur⸱e⸱s
Breitinger Frank, Baier Harald
Editeur
Springer Berlin Heidelberg
ISBN
9783642398902
9783642398919
ISSN
1867-8211
1867-822X
Statut éditorial
Publié
Date de publication
2013
Editeur⸱rice scientifique
Rogers Marcus, Seigfried-Spellar KathrynC.
Volume
114
Pages
167-182
Langue
anglais
Résumé
Hash functions are a widespread class of functions in computer science and used in several applications, e.g. in computer forensics to identify known files. One basic property of cryptographic hash func- tions is the avalanche effect that causes a significantly different output if an input is changed slightly. As some applications also need to identify similar files (e.g. spam/virus detection) this raised the need for similarity preserving hashing. In recent years, several approaches came up, all with different namings, properties, strengths and weaknesses which is due to a missing definition.
Based on the properties and use cases of traditional hash functions this paper discusses a uniform naming and properties which is a first step towards a suitable definition of similarity preserving hashing. Additionally, we extend the algorithm MRSH for similarity preserving hashing to its successor MRSH-v2, which has three specialties. First, it fulfills all our proposed defining properties, second, it outperforms existing approaches especially with respect to run time performance and third it has two detections modes. The regular mode of MRSH-v2 is used to identify similar files whereas the f-mode is optimal for fragment detection, i.e. to identify similar parts of a file.
Mots-clé
Digital forensics, Similarity Preserving Hashing, fuzzy hashing, MRSH-v2, properties of Similarity Preserving Hashing
Création de la notice
06/05/2021 12:01
Dernière modification de la notice
06/05/2021 12:22
Données d'usage