Netinfo Security ›› 2015, Vol. 15 ›› Issue (2): 66-70.doi: 10.3969/j.issn.1671-1122.2015.02.011

Previous Articles     Next Articles

Research on Digital Fingerprinting Generation Scheme and Key Algorithm

LIU Wen-long, LI Hui(), JIN Dong-xun   

  1. School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2014-11-25 Online:2015-02-10 Published:2015-07-05

Abstract:

As a new digital copyright protection technology, digital fingerprinting technology plays an important role in plagiarism detection. Still, the fingerprinting generation algorithm directly determines the performance of the digital fingerprinting scheme. In this article, we expound several kinds of commonly used digital fingerprinting algorithms—MD5, SHA1, Rabin fingerprinting algorithm, and introduce the basic theories of the three algorithms. At the same time, we test the performance of each digital fingerprinting algorithm through experiment. To test the difference of the three algorithms in performance, we create many different sample test files whose sizes between 20KB and 20MB. In the experiment, we preprocess all the test files at first, remove all the irrelevant characters. Then we generate digital fingerprints of preprocessed files with block strategy, and test the generation efficiency of the three algorithms in different block strategies and different size files. The result indicates that hash function has better generation performance in terms of large files, while in terms of small files, hash function and Rabin fingerprint algorithm has the same performance. The experiment results provide experimental support for selecting proper fingerprinting generation algorithm in the next new fingerprinting scheme.

Key words: digital fingerprinting, Hash function, Rabin algorithm, plagiarism detection

CLC Number: