A Fingerprint Method for Scientific Data Verification
Conference paper
- 8 Citations
- 12 Mentions
- 1.1k Downloads
Abstract
This article discusses an algorithm (called "UNF") for verifying digital data matrices. This algorithm is now used in a number of software packages and digital library projects. We discuss the details of the algorithm, and offer an extension for normalization of time and duration data.
Keywords
Hash Function Digital Library Digital Object Character String Hash Algorithm
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- 1.P. Cano, E. Batle, T. Kalker, J. Haistma, "A Reiview of Algorithms for Audio Fingerprinting", IEEE Workshop on Multimedia Signal Processing,,IEEE Press, 2002, pp. 169-173.Google Scholar
- 2.J. Oostveen, T. Kalker, J. Haitsma, "Feature Extaction and a Databse Stategy for Video Fingerprinting", Lecture Notes in Computer Science, vol 2314, Heidelburg: Springer Berlin, 2002.Google Scholar
- 3.P. Meerwald, and A. Uhl,. "A Survey of Wavelet-Domain Watermarking Algorithms" inProceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 4314, 2001, pp. 506-516.Google Scholar
- 4.M. Altman M, J. Gill , M.P. McDonald, Numerical Issues in Statistical Computing for the Social Scientist. New York: John Wiley & Sons, 2003CrossRefGoogle Scholar
- 5.R development Core Team, "R: A language and environment for statistical computing." R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0. 2004.Google Scholar
- 6.M Altman, L. Andreev, M. Diggory, M. Krot., G. King, D. Kiskis, E. Kolster, A. Sone., S. Verba. "An Introduction to the Virtual Data Center Project and Software." in Proceedings of the First ACM+IEEE Joint Conference on Digital Libraries. ACM Press, New York. 2001.Google Scholar
- 7.G. King, . 2007. "An Introduction to the Dataverse Network as an Infrastructure for Data Sharing", Sociological Methods and Research. Forthcoming 2007.Google Scholar
- 8.Altman, M., King, G. 2007. "A proposed Standard for the Scholarly Citation of Quantitative Data", D-Lib 13(3/4).Google Scholar
- 9.M. Altman , J. Crabtree., D. Donakowski,, M. Maynard, , "Data Preservation Alliance for the Social Sciences: A Model for Collaboration". Paper presented at DigCCurr 2007, Chapel Hill, N.C. 2007.Google Scholar
- 10.M. Vardigan, C. Whiteman, “ICPSR meets OAIS: applying the OAIS reference model in the social science archive context”, Archival Science, 7(1) 2007. pp 73-87.CrossRefGoogle Scholar
- 11.K.J. Renze, J.H. Oliver JH, "Generalized Unstructured Decimation." IEEE Computer Graphics and Applications, vol. 16, Cole, Vardigan, Archival Science, ICPSR meets OAIS: applying the OAIS reference model to the social science archive contex, pp 24-32.Google Scholar
- 12.IEEE, Programs for Digital Signal Processing, New York: IEEE Press, 1979.Google Scholar
- 13.Unicode Consortium , The Unicode Standard, Version 4.0.0. Boston: Addison-Wesley, 2003.Google Scholar
- 14.National Institute of Standards and Technology (NIST), (2002). "Secure Hash Algorithm." NIST FIPS 180-2.Google Scholar
- 15.Josefsson, S , "The Base16, Base32, and Base64 Data Encodings’ RFC 3548. 2003.Google Scholar
- 16.A. Joux, “Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.”in Lecture Notes in Computer Science 3152. Springer Berlin: Heidelberg, 2004, pp. 206-317Google Scholar
- 17.Q. Dang, Recommendation for Using Approved Hash Algorithms, NIST Special Publication 800-107.Nastional Institute of Standards and Technology. (Draft, July 2007)Google Scholar
- 18.International Studies Organization. Data elements and interchange formats Information interchange Representation of dates and times. ISO Standard 8601, (3d ed.). 2004Google Scholar
- 19.International Studies Organization. Abstract Syntax Notation One (ASN.1), b Google Scholar
Copyright information
© Springer Science+Business Media B.V. 2008