2014
DOI: 10.14257/ijmue.2014.9.1.01
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Binary File Similarity Evaluation System

Abstract: In cloud storage system, when we search similar documentation files, keyword-based similarity evaluation scheme is well performed. However, if we want to find similar binary files then it is very difficult to satisfy user request. Because there is no widely used binary file search system that supports similarity evaluation among files. File similarity evaluation is essential for digital forensic and data deduplication field. In the file similarity processing time, the CPU consumption and resource overhead of m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…100000 sequences of the length of 400 nucleotides were selected as a case study. Our technique is compared with the optimal sequence alignment Needleman-Wunsch Algorithm 5 . Random sequences were selected as a query to test our technique using different similarity functions.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…100000 sequences of the length of 400 nucleotides were selected as a case study. Our technique is compared with the optimal sequence alignment Needleman-Wunsch Algorithm 5 . Random sequences were selected as a query to test our technique using different similarity functions.…”
Section: Resultsmentioning
confidence: 99%
“…"String Editing" [5], which is a form of sequence comparison, is used, in Computer Science, as error correction mechanism similar to the one found in spell checkers and file comparators. The way it works is by comparing and searching through a large sequence database of words for a particular one.…”
Section: Introductionmentioning
confidence: 99%
“…During the encryption process user need to encrypt the file using the hybrid cryptographic model, thus a input file is first produced to the system. The input file is first processed using SHA1 [5] hash generation algorithm, the SHA1 algorithm generates the 128 bit hash code for the input data.…”
Section: Figure 1: Encryption Processmentioning
confidence: 99%
“…Using our technique, we explicitly improve the time performance of the database sequence comparison applications by 63% in comparison to the traditional methods used. our technique in conjunction with the previous state-of-the-art methods (as in [17], [20], [22]) will further improve their time performance.…”
Section: Introductionmentioning
confidence: 97%