Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2
Document Type
Book Chapter
Publication Date
2013
Subject: LCSH
Computer forensics, Cyber forensics, Hashing (Computer science)
Disciplines
Computer Engineering | Computer Sciences | Electrical and Computer Engineering | Forensic Science and Technology | Information Security
Abstract
Hash functions are a widespread class of functions in computer science and used in several applications, e.g. in computer forensics to identify known files. One basic property of cryptographic Hash Functions is the avalanche effect that causes a significantly different output if an input is changed slightly. As some applications also need to identify similar files (e.g. spam/virus detection) this raised the need for Similarity Preserving Hashing. In recent years, several approaches came up, all with different namings, properties, strengths and weaknesses which is due to a missing definition.
Based on the properties and use cases of traditional Hash Functions this paper discusses a uniform naming and properties which is a first step towards a suitable definition of Similarity Preserving Hashing. Additionally, we extend the algorithm MRSH for Similarity Preserving Hashing to its successor MRSH-v2, which has three specialties. First, it fulfills all our proposed defining properties, second, it outperforms existing approaches especially with respect to run time performance and third it has two detections modes. The regular mode of MRSH-v2 is used to identify similar files whereas the f-mode is optimal for fragment detection, i.e. to identify similar parts of a file.
DOI
10.1007/978-3-642-39891-9_11
Repository Citation
Breitinger, Frank and Baier, Harald, "Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2" (2013). Electrical & Computer Engineering and Computer Science Faculty Publications. 67.
https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/67
Publisher Citation
Breitinger, Frank; Baier, Harald (2013): Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2. In: Rogers, Marcus; Seigfried-Spellar, KathrynC. (Ed.): Digital Forensics and Cyber Crime, pp. 167-182, Springer Berlin Heidelberg, 2013, ISBN: 978-3-642-39890-2. doi: 10.1007/978-3-642-39891-9_11
Comments
Buy the book or chapter
Find in a library near you
Find in UNH Library
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 114