Research Article
Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System
Figure 6
Hamming distance between documents with different degrees of deletion and original secret-related documents. (a) KbS fingerprint Hamming distance. (b) PbS fingerprint Hamming distance.
(a) |
(b) |