Skip to main content

A Fingerprint Method for Scientific Data Verification

  • Conference paper

Abstract

This article discusses an algorithm (called "UNF") for verifying digital data matrices. This algorithm is now used in a number of software packages and digital library projects. We discuss the details of the algorithm, and offer an extension for normalization of time and duration data.

Keywords

  • Hash Function
  • Digital Library
  • Digital Object
  • Character String
  • Hash Algorithm

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-1-4020-8741-7_57
  • Chapter length: 6 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   139.00
Price excludes VAT (USA)
  • ISBN: 978-1-4020-8741-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   209.00
Price excludes VAT (USA)
Hardcover Book
USD   179.99
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Cano, E. Batle, T. Kalker, J. Haistma, "A Reiview of Algorithms for Audio Fingerprinting", IEEE Workshop on Multimedia Signal Processing,,IEEE Press, 2002, pp. 169-173.

    Google Scholar 

  2. J. Oostveen, T. Kalker, J. Haitsma, "Feature Extaction and a Databse Stategy for Video Fingerprinting", Lecture Notes in Computer Science, vol 2314, Heidelburg: Springer Berlin, 2002.

    Google Scholar 

  3. P. Meerwald, and A. Uhl,. "A Survey of Wavelet-Domain Watermarking Algorithms" inProceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 4314, 2001, pp. 506-516.

    Google Scholar 

  4. M. Altman M, J. Gill , M.P. McDonald, Numerical Issues in Statistical Computing for the Social Scientist. New York: John Wiley & Sons, 2003

    CrossRef  Google Scholar 

  5. R development Core Team, "R: A language and environment for statistical computing." R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0. 2004.

    Google Scholar 

  6. M Altman, L. Andreev, M. Diggory, M. Krot., G. King, D. Kiskis, E. Kolster, A. Sone., S. Verba. "An Introduction to the Virtual Data Center Project and Software." in Proceedings of the First ACM+IEEE Joint Conference on Digital Libraries. ACM Press, New York. 2001.

    Google Scholar 

  7. G. King, . 2007. "An Introduction to the Dataverse Network as an Infrastructure for Data Sharing", Sociological Methods and Research. Forthcoming 2007.

    Google Scholar 

  8. Altman, M., King, G. 2007. "A proposed Standard for the Scholarly Citation of Quantitative Data", D-Lib 13(3/4).

    Google Scholar 

  9. M. Altman , J. Crabtree., D. Donakowski,, M. Maynard, , "Data Preservation Alliance for the Social Sciences: A Model for Collaboration". Paper presented at DigCCurr 2007, Chapel Hill, N.C. 2007.

    Google Scholar 

  10. M. Vardigan, C. Whiteman, “ICPSR meets OAIS: applying the OAIS reference model in the social science archive context”, Archival Science, 7(1) 2007. pp 73-87.

    CrossRef  Google Scholar 

  11. K.J. Renze, J.H. Oliver JH, "Generalized Unstructured Decimation." IEEE Computer Graphics and Applications, vol. 16, Cole, Vardigan, Archival Science, ICPSR meets OAIS: applying the OAIS reference model to the social science archive contex, pp 24-32.

    Google Scholar 

  12. IEEE, Programs for Digital Signal Processing, New York: IEEE Press, 1979.

    Google Scholar 

  13. Unicode Consortium , The Unicode Standard, Version 4.0.0. Boston: Addison-Wesley, 2003.

    Google Scholar 

  14. National Institute of Standards and Technology (NIST), (2002). "Secure Hash Algorithm." NIST FIPS 180-2.

    Google Scholar 

  15. Josefsson, S , "The Base16, Base32, and Base64 Data Encodings’ RFC 3548. 2003.

    Google Scholar 

  16. A. Joux, “Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.”in Lecture Notes in Computer Science 3152. Springer Berlin: Heidelberg, 2004, pp. 206-317

    Google Scholar 

  17. Q. Dang, Recommendation for Using Approved Hash Algorithms, NIST Special Publication 800-107.Nastional Institute of Standards and Technology. (Draft, July 2007)

    Google Scholar 

  18. International Studies Organization. Data elements and interchange formats Information interchange Representation of dates and times. ISO Standard 8601, (3d ed.). 2004

    Google Scholar 

  19. International Studies Organization. Abstract Syntax Notation One (ASN.1), b

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2008 Springer Science+Business Media B.V.

About this paper

Cite this paper

Altman, M. (2008). A Fingerprint Method for Scientific Data Verification. In: Sobh, T. (eds) Advances in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8741-7_57

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8741-7_57

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8740-0

  • Online ISBN: 978-1-4020-8741-7

  • eBook Packages: Computer ScienceComputer Science (R0)