DocumentCode
3544216
Title
Properties of a similarity preserving hash function and their realization in sdhash
Author
Breitinger, Frank ; Baier, Harald
Author_Institution
Dept. of Comput. Sci., Hochschule Darmstadt, Darmstadt, Germany
fYear
2012
fDate
15-17 Aug. 2012
Firstpage
1
Lastpage
8
Abstract
Finding similarities between byte sequences is a complex task and necessary in many areas of computer science, e.g., to identify malicious files or spam. Instead of comparing files against each other, one may apply a similarity preserving compression function (hash function) first and do the comparison for the hashes. Although we have different approaches, there is no clear definition / specification or needed properties of such algorithms available.
Keywords
cryptography; file organisation; unsolicited e-mail; byte sequences; computer science; hash function; malicious files; malicious spam; sdhash realization; Computer bugs; Computer science; Cryptography; Entropy; Forensics; Hamming distance; Digital forensics; fuzzy hashing; properties of similarity preserving hashing; similarity preserving hashing;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security for South Africa (ISSA), 2012
Conference_Location
Johannesburg, Gauteng
Print_ISBN
978-1-4673-2160-0
Type
conf
DOI
10.1109/ISSA.2012.6320445
Filename
6320445
Link To Document