Research Article

Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System

Figure 6

Hamming distance between documents with different degrees of deletion and original secret-related documents. (a) KbS fingerprint Hamming distance. (b) PbS fingerprint Hamming distance.
(a)
(b)