2014
DOI: 10.15394/jdfsl.2014.1178
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Similarity Digests Database Lookup – A Logarithmic Divide & Conquer Approach

Abstract: Investigating seized devices within digital forensics represents a challenging task due to the increasing amount of data. Common procedures utilize automated file identification, which reduces the amount of data an investigator has to examine manually. In the past years the research field of approximate matching arises to detect similar data. However, if n denotes the number of similarity digests in a database, then the lookup for a single similarity digest is of complexity of O(n). This paper presents a conce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…As a form to mitigate the limitation of MRSH-NET [31], which only answers whether an object is present in the filter or not but does not identify the object, Breitinger et al [32] propose a new similarity digest search strategy based on the wellknown divide and conquer paradigm. In this approach, the authors build a Bloom filter-based tree data structure to store digests and efficiently locate similar objects.…”
Section: Bloommentioning
confidence: 99%
See 3 more Smart Citations
“…As a form to mitigate the limitation of MRSH-NET [31], which only answers whether an object is present in the filter or not but does not identify the object, Breitinger et al [32] propose a new similarity digest search strategy based on the wellknown divide and conquer paradigm. In this approach, the authors build a Bloom filter-based tree data structure to store digests and efficiently locate similar objects.…”
Section: Bloommentioning
confidence: 99%
“…However, MRSH-NET, BF-based tree, and MRSH-CF approaches do, according to the explanation presented below. According to Breitinger et al [32], the false positive probability for an object is calculated by = , where is the false positive probability for a single feature and the number of following features required to be found in the filter to be considered a match. While can be adjusted according to the desired false positive rate, is defined by…”
Section: Strategy's Match Decisionmentioning
confidence: 99%
See 2 more Smart Citations
“…To mitigate the limitation of MRSH-NET in answering only membership queries, Breitinger, F. et al [18] proposed a new approach for performing similarity search. This strategy is based on the well-known divide and conquer paradigm.…”
Section: Bloom Filter-based Tree Strategymentioning
confidence: 99%