Skip to main content

A Fingerprint Method for Scientific Data Verification

  • Conference paper
Book cover Advances in Computer and Information Sciences and Engineering

Abstract

This article discusses an algorithm (called "UNF") for verifying digital data matrices. This algorithm is now used in a number of software packages and digital library projects. We discuss the details of the algorithm, and offer an extension for normalization of time and duration data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Cano, E. Batle, T. Kalker, J. Haistma, "A Reiview of Algorithms for Audio Fingerprinting", IEEE Workshop on Multimedia Signal Processing,,IEEE Press, 2002, pp. 169-173.

    Google Scholar 

  2. J. Oostveen, T. Kalker, J. Haitsma, "Feature Extaction and a Databse Stategy for Video Fingerprinting", Lecture Notes in Computer Science, vol 2314, Heidelburg: Springer Berlin, 2002.

    Google Scholar 

  3. P. Meerwald, and A. Uhl,. "A Survey of Wavelet-Domain Watermarking Algorithms" inProceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 4314, 2001, pp. 506-516.

    Google Scholar 

  4. M. Altman M, J. Gill , M.P. McDonald, Numerical Issues in Statistical Computing for the Social Scientist. New York: John Wiley & Sons, 2003

    Book  Google Scholar 

  5. R development Core Team, "R: A language and environment for statistical computing." R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0. 2004.

    Google Scholar 

  6. M Altman, L. Andreev, M. Diggory, M. Krot., G. King, D. Kiskis, E. Kolster, A. Sone., S. Verba. "An Introduction to the Virtual Data Center Project and Software." in Proceedings of the First ACM+IEEE Joint Conference on Digital Libraries. ACM Press, New York. 2001.

    Google Scholar 

  7. G. King, . 2007. "An Introduction to the Dataverse Network as an Infrastructure for Data Sharing", Sociological Methods and Research. Forthcoming 2007.

    Google Scholar 

  8. Altman, M., King, G. 2007. "A proposed Standard for the Scholarly Citation of Quantitative Data", D-Lib 13(3/4).

    Google Scholar 

  9. M. Altman , J. Crabtree., D. Donakowski,, M. Maynard, , "Data Preservation Alliance for the Social Sciences: A Model for Collaboration". Paper presented at DigCCurr 2007, Chapel Hill, N.C. 2007.

    Google Scholar 

  10. M. Vardigan, C. Whiteman, “ICPSR meets OAIS: applying the OAIS reference model in the social science archive context”, Archival Science, 7(1) 2007. pp 73-87.

    Article  Google Scholar 

  11. K.J. Renze, J.H. Oliver JH, "Generalized Unstructured Decimation." IEEE Computer Graphics and Applications, vol. 16, Cole, Vardigan, Archival Science, ICPSR meets OAIS: applying the OAIS reference model to the social science archive contex, pp 24-32.

    Google Scholar 

  12. IEEE, Programs for Digital Signal Processing, New York: IEEE Press, 1979.

    Google Scholar 

  13. Unicode Consortium , The Unicode Standard, Version 4.0.0. Boston: Addison-Wesley, 2003.

    Google Scholar 

  14. National Institute of Standards and Technology (NIST), (2002). "Secure Hash Algorithm." NIST FIPS 180-2.

    Google Scholar 

  15. Josefsson, S , "The Base16, Base32, and Base64 Data Encodings’ RFC 3548. 2003.

    Google Scholar 

  16. A. Joux, “Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.”in Lecture Notes in Computer Science 3152. Springer Berlin: Heidelberg, 2004, pp. 206-317

    Google Scholar 

  17. Q. Dang, Recommendation for Using Approved Hash Algorithms, NIST Special Publication 800-107.Nastional Institute of Standards and Technology. (Draft, July 2007)

    Google Scholar 

  18. International Studies Organization. Data elements and interchange formats Information interchange Representation of dates and times. ISO Standard 8601, (3d ed.). 2004

    Google Scholar 

  19. International Studies Organization. Abstract Syntax Notation One (ASN.1), b

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media B.V.

About this paper

Cite this paper

Altman, M. (2008). A Fingerprint Method for Scientific Data Verification. In: Sobh, T. (eds) Advances in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8741-7_57

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8741-7_57

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8740-0

  • Online ISBN: 978-1-4020-8741-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics