F. Breitinger, Security Aspects of Fuzzy Hashing, 2011.

F. Breitinger, K. Astebol, H. Baier, and C. Busch, mvHash-B - A New Approach for Similarity Preserving Hashing, 2013 Seventh International Conference on IT Security Incident Management and IT Forensics, pp.33-44, 2013.
DOI : 10.1109/IMF.2013.18

F. Breitinger and H. Baier, Performance issues about contexttriggered piecewise hashing, Proceedings of the Third International ICST Conference on Digital Forensics and Cyber Crime, pp.141-155, 2011.
DOI : 10.1007/978-3-642-35515-8_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.657.5169

F. Breitinger and H. Baier, Security aspects of piecewise hashing in computer forensics, Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, pp.21-36, 2011.

F. Breitinger and H. Baier, A fuzzy hashing approach based on random sequences and Hamming distance, Proceedings of the Conference on Digital Forensics, Security and Law, 2012.

F. Breitinger and H. Baier, Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2, Proceedings of the Fourth International ICST Conference on Digital Forensics and Cyber Crime, 2012.
DOI : 10.1145/362686.362692

F. Breitinger, G. Stivaktakis, and H. Baier, FRASH: A framework to test algorithms of similarity hashing, Digital Investigation, pp.50-58, 2013.
DOI : 10.1016/j.diin.2013.06.006

L. Chen and G. Wang, An Efficient Piecewise Hashing Method for Computer Forensics, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008), pp.635-638, 2008.
DOI : 10.1109/WKDD.2008.80

P. Jaccard, Distribution de la flore alpine dans le bassin des drouces et dans quelques regions voisines, Bulletin de la Société Vaudoise des Sciences Naturelles, pp.241-272, 1901.

J. Kornblum, Identifying almost identical files using context triggered piecewise hashing, Digital Investigation, pp.91-97, 2006.
DOI : 10.1016/j.diin.2006.06.015

V. Levenshtein, Binary codes capable of correcting deletions, insertions and reversals, Soviet Physics Doklady, vol.10, issue.8, pp.707-710, 1966.

M. Rabin, Fingerprinting by Random Polynomials, 1981.

R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, 1992.

V. Roussev, Building a better similarity trap with statistically improbable features, Proceedings of the Forty-Second Hawaii International Conference on System Sciences, 2009.

V. Roussev, Data Fingerprinting with Similarity Digests, Advances in Digital Forensics VI, pp.207-226, 2010.
DOI : 10.1007/978-3-642-15506-2_15

URL : https://hal.archives-ouvertes.fr/hal-01060620

V. Roussev, An evaluation of forensic similarity hashes, Digital Investigation, pp.34-41, 2011.
DOI : 10.1016/j.diin.2011.05.005

V. Roussev, Managing terabyte-scale investigations with similarity digests, in Advances in Digital Forensics VIII, pp.19-34, 2012.

K. Seo, K. Lim, J. Choi, K. Chang, and S. Lee, Detecting Similar Files Based on Hash and Statistical Analysis for Digital Forensic Investigation, 2009 2nd International Conference on Computer Science and its Applications, 2009.
DOI : 10.1109/CSA.2009.5404198

G. Ziroff, Approaches to Similarity-Preserving Hashing, 2012.