Research Article
Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System
Figure 7
Hamming distance between different mixed degree documents and original secret-related documents. (a) KbS fingerprint Hamming distance. (b) PbS fingerprint Hamming distance.
(a) |
(b) |