2014
DOI: 10.6028/nist.sp.800-168
|View full text |Cite
|
Sign up to set email alerts
|

Approximate matching : definition and terminology

Abstract: This publication has been developed by National Institute of Standards and Technology (NIST) to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 7 publications
(16 reference statements)
0
17
0
1
Order By: Relevance
“…similarity hashing or fuzzy hashing) is a rather new domain and probably started with an idea from Kornblum (2006) named context-triggered piecewise hashing. Subsequently, a small community emerged around that field and presented new algorithms, finally coming up with a definition in 2014 -Special Publication 800-168 from the National Institute of Standards and Technology (NIST, Breitinger, Guttman, et al (2014)). …”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…similarity hashing or fuzzy hashing) is a rather new domain and probably started with an idea from Kornblum (2006) named context-triggered piecewise hashing. Subsequently, a small community emerged around that field and presented new algorithms, finally coming up with a definition in 2014 -Special Publication 800-168 from the National Institute of Standards and Technology (NIST, Breitinger, Guttman, et al (2014)). …”
Section: Background and Related Workmentioning
confidence: 99%
“…In order to overcome this drawback, the community came up with approximate matching, which allows investigators to calculate the probability of similarity between two or more similar objects, such as media, stream, and other files. According to the definition from Breitinger, Guttman, McCarrin, Roussev, and White (2014), "approximate matching methods can be placed in one of three main categories":…”
Section: Introductionmentioning
confidence: 99%
“…Approximate matching is a rather new working field but has been proven to be useful for similar input detection (e.g., different versions of a file) or embedded objects detection (e.g., a jpg within a Word document). Furthermore, approximate matching can be used for fragment detection where a fragment is a small piece of a file (Breitinger, Guttman, McCarrin, & Roussev, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Approximate matching functions are defined by NIST [7] as a "promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or find objects that are contained in another object."…”
Section: Approximate Matchingmentioning
confidence: 99%