The Community for Technology Leaders
2013 Seventh International Conference on IT Security Incident Management and IT Forensics (2013)
Nuremberg, Germany Germany
Mar. 12, 2013 to Mar. 14, 2013
ISBN: 978-1-4673-6307-5
pp: 33-44
The handling of hundreds of thousands of files is a major challenge in today's IT forensic investigations. In order to cope with this information overload, investigators use fingerprints (hash values) to identify known files automatically using blacklists or white lists. Besides detecting exact duplicates it is helpful to locate similar files by using similarity preserving hashing (SPH), too. We present a new algorithm for similarity preserving hashing. It is based on the idea of majority voting in conjunction with run length encoding to compress the input data and uses Bloom filters to represent the fingerprint. It is therefore called mvHash-B. Our assessment shows that mvHash-B is superior to other SPHs with respect to run time efficiency: It is almost as fast as SHA-1 and thus faster than any other SPH algorithm. Additionally the hash value length is approximately 0.5% of the input length and hence outperforms most existing algorithms. Finally, we show that the robustness of mvHash-B against active manipulation is sufficient for practical purposes.
Bloom filter, Digital forensics, fuzzy hashing, similarity preserving hashing, run-length encoding

F. Breitinger, K. P. Astebol, H. Baier and C. Busch, "mvHash-B - A New Approach for Similarity Preserving Hashing," 2013 Seventh International Conference on IT Security Incident Management and IT Forensics(IMF), Nuremberg, Germany Germany, 2013, pp. 33-44.
94 ms
(Ver 3.3 (11022016))