2014
DOI: 10.1007/978-3-319-14289-0_12
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Process Model for Hash Functions in Digital Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Roussev (2010) describes sdhash, a method for selecting statistically improbable features when producing data fingerprints, while Garfinkel et al (2010) focus on reducing the number of common non-distinct blocks from the hash database. Breitinger et al (2013) compare and contrast the properties of full file cryptographic hashing, bytewise approximate matching, and semantic approximate matching. Binary methods were shown to be much faster, though much less resistant to content preserving modifications, while out performing semantic methods in the realms of damaged or embedded file detection.…”
Section: Forensic File Hashingmentioning
confidence: 99%
“…Roussev (2010) describes sdhash, a method for selecting statistically improbable features when producing data fingerprints, while Garfinkel et al (2010) focus on reducing the number of common non-distinct blocks from the hash database. Breitinger et al (2013) compare and contrast the properties of full file cryptographic hashing, bytewise approximate matching, and semantic approximate matching. Binary methods were shown to be much faster, though much less resistant to content preserving modifications, while out performing semantic methods in the realms of damaged or embedded file detection.…”
Section: Forensic File Hashingmentioning
confidence: 99%
“…978-1-5386-5541-2/18/$31.00 ©2018 IEEE Modifications to this hashing process have largely focused on detecting similar, rather than identical, files, either by features of their binary data [8]- [10], or by their semantic, human facing, content [11]. However, such similar file detection is slower to process than traditional cryptographic hashing [12].…”
Section: Related Work a Detecting Contrabandmentioning
confidence: 99%
“…As this work focuses on Bloom filter-based approaches, we briefly describe them in the following. A comprehensive overview of different algorithms is given by (Breitinger, Liu, et al, 2013). Basically approximate matching consists of two separate functions.…”
Section: Bytewise Approximate Matchingmentioning
confidence: 99%