Hash functions are a widespread class of functions in computer science and used in several applications, e.g. in computer forensics to identify known files. One basic property of cryptographic Hash Functions is the avalanche effect that causes a significantly different output if an input is changed slightly. As some applications also need to identify similar files (e.g. spam/virus detection) this raised the need for Similarity Preserving Hashing. In recent years, several approaches came up, all with different namings, properties, strengths and weaknesses which is due to a missing definition. Based on the properties and use cases of traditional Hash Functions this paper discusses a uniform naming and properties which is a first step towards ...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
Hash functions are well-known methods in computer science to map arbitrary large input to bit string...
Abstract. Large backup and restore systems may have a petabyte or more data in their repository. Suc...
7 páginas, 1 tabla. Comunicación presentada en: The 2014 International Conference on Security and Ma...
It is increasingly common in forensic investigations to use automated pre-processing techniques to r...
Most hash functions are used to separate and obscure data, so that similar data hashes to very diffe...
A hash function is a well-known method in computer science to map arbitrary large data to bit string...
Locality sensitive hashing (LSH) is a key algorithmic tool that lies at the heart of many informatio...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Handling hundreds of thousands of files is a major challenge in today’s digital forensics. In order ...
Fuzzy hashing is a known technique that has been adopted to speed up malware analysis processes. How...
Hashing is very useful for fast approximate similarity search on large database. In the unsupervised...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
Fuzzy hashing provides the possibility to identify similar files based on their hash signatures, whi...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
Hash functions are well-known methods in computer science to map arbitrary large input to bit string...
Abstract. Large backup and restore systems may have a petabyte or more data in their repository. Suc...
7 páginas, 1 tabla. Comunicación presentada en: The 2014 International Conference on Security and Ma...
It is increasingly common in forensic investigations to use automated pre-processing techniques to r...
Most hash functions are used to separate and obscure data, so that similar data hashes to very diffe...
A hash function is a well-known method in computer science to map arbitrary large data to bit string...
Locality sensitive hashing (LSH) is a key algorithmic tool that lies at the heart of many informatio...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Handling hundreds of thousands of files is a major challenge in today’s digital forensics. In order ...
Fuzzy hashing is a known technique that has been adopted to speed up malware analysis processes. How...
Hashing is very useful for fast approximate similarity search on large database. In the unsupervised...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
Fuzzy hashing provides the possibility to identify similar files based on their hash signatures, whi...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
Hash functions are well-known methods in computer science to map arbitrary large input to bit string...
Abstract. Large backup and restore systems may have a petabyte or more data in their repository. Suc...