Research Article
Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System
Figure 8
Hamming distance value between the documents under different modified situations and the original confidential documents. (a) The maximum Hamming distance between KbS and PbS under different deletion degrees. (b) The maximum Hamming distance between KbS and PbS under different mixing degrees.
(a) |
(b) |