Research Article

Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System

Figure 7

Hamming distance between different mixed degree documents and original secret-related documents. (a) KbS fingerprint Hamming distance. (b) PbS fingerprint Hamming distance.
(a)
(b)