{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:45:45Z","timestamp":1775187945551,"version":"3.50.1"},"reference-count":128,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11227-017-2210-8","type":"journal-article","created":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T14:15:25Z","timestamp":1513779325000},"page":"2035-2085","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":90,"title":["Data deduplication techniques for efficient cloud storage management: a systematic review"],"prefix":"10.1007","volume":"74","author":[{"given":"Ravneet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Inderveer","family":"Chana","sequence":"additional","affiliation":[]},{"given":"Jhilik","family":"Bhattacharya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"issue":"5","key":"2210_CR1","doi-asserted-by":"publisher","first-page":"e177","DOI":"10.1038\/lsa.2014.58","volume":"3","author":"M Gu","year":"2014","unstructured":"Gu M, Li X, Cao Y (2014) Optical storage arrays: a perspective for future big data storage. Light Sci Appl 3(5):e177. https:\/\/doi.org\/10.1038\/lsa.2014.58","journal-title":"Light Sci Appl"},{"key":"2210_CR2","doi-asserted-by":"publisher","unstructured":"Tian Y, Khan SM, Jim\u00e9nez DA, Loh GH (2014) Last-level cache deduplication. In: Proceedings of the 28th ACM International Conference on Supercomputing, pp 53\u201362. https:\/\/doi.org\/10.1145\/2597652.2597655","DOI":"10.1145\/2597652.2597655"},{"key":"2210_CR3","doi-asserted-by":"publisher","unstructured":"Hovhannisyan H, Qi W, Lu K, Yang R, Wang J (2016) Whispers in the cloud storage: a novel cross-user deduplication-based covert channel design. Peer-to-Peer Networking and Applications, pp 1\u201310. https:\/\/doi.org\/10.1007\/s12083-016-0483-y","DOI":"10.1007\/s12083-016-0483-y"},{"key":"2210_CR4","doi-asserted-by":"publisher","unstructured":"Mandagere N, Zhou P, Smith MA, Uttamchandani S (2008) Demystifying data deduplication. In: Proceedings of the ACM\/IFIP\/USENIX Middleware\u201908 Conference Companion, pp 12\u201317. https:\/\/doi.org\/10.1145\/1462735.1462739","DOI":"10.1145\/1462735.1462739"},{"issue":"1","key":"2210_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2611778","volume":"47","author":"J Paulo","year":"2014","unstructured":"Paulo J, Pereira J (2014) A survey and classification of storage deduplication systems. ACM Comput Surv (CSUR) 47(1):1\u201330. https:\/\/doi.org\/10.1145\/2611778","journal-title":"ACM Comput Surv (CSUR)"},{"key":"2210_CR6","doi-asserted-by":"publisher","unstructured":"Mao B, Jiang H, Wu S, Fu Y, Tian L (2014) Read-performance optimization for deduplication-based storage systems in the cloud. In: ACM Transactions on Storage (TOS), vol 10(2). https:\/\/doi.org\/10.1145\/2512348","DOI":"10.1145\/2512348"},{"key":"2210_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.comcom.2016.01.011","volume":"82","author":"R Pietro Di","year":"2016","unstructured":"Di Pietro R, Sorniotti A (2016) Proof of ownership for deduplication systems: a secure, scalable, and efficient solution. Comput. Commun. 82:71\u201382. https:\/\/doi.org\/10.1016\/j.comcom.2016.01.011","journal-title":"Comput. Commun."},{"issue":"3","key":"2210_CR8","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s41019-016-0018-9","volume":"1","author":"J Wang","year":"2016","unstructured":"Wang J, Chen X (2016) Efficient and secure storage for outsourced data: a survey. Data Sci Eng 1(3):178\u2013188. https:\/\/doi.org\/10.1007\/s41019-016-0018-9","journal-title":"Data Sci Eng"},{"key":"2210_CR9","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2014.01.015","volume":"275","author":"CP Chen","year":"2014","unstructured":"Chen CP, Zhang CY (2014) Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf Sci 275:314\u2013347. https:\/\/doi.org\/10.1016\/j.ins.2014.01.015","journal-title":"Inf Sci"},{"key":"2210_CR10","doi-asserted-by":"publisher","unstructured":"Venish A, Sankar KS (2015) Framework of data deduplication: a survey. Indian J Sci Technol. https:\/\/doi.org\/10.17485\/ijst\/2015\/v8i26\/80754","DOI":"10.17485\/ijst\/2015\/v8i26\/80754"},{"issue":"9","key":"2210_CR11","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1109\/JPROC.2016.2571298","volume":"104","author":"W Xia","year":"2016","unstructured":"Xia W, Jiang H, Feng D, Douglis F, Shilane P, Hua Y, Fu M, Zhang Y, Zhou Y (2016) A comprehensive study of the past present and future of data deduplication. Proc IEEE 104(9):1681\u20131710. https:\/\/doi.org\/10.1109\/JPROC.2016.2571298","journal-title":"Proc IEEE"},{"issue":"3","key":"2210_CR12","first-page":"139","volume":"3","author":"AJ Maan","year":"2013","unstructured":"Maan AJ (2013) Analysis and comparison of algorithms for lossless data compression. Int J Inf Comput Technol 3(3):139\u201346","journal-title":"Int J Inf Comput Technol"},{"key":"2210_CR13","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.peva.2014.07.016","volume":"79","author":"W Xia","year":"2014","unstructured":"Xia W, Jiang H, Feng D, Tian L, Fu M, Zhou Y (2014) Ddelta: a deduplication-inspired fast delta compression approach. Perform Eval 79:258\u2013272. https:\/\/doi.org\/10.1016\/j.peva.2014.07.016","journal-title":"Perform Eval"},{"issue":"3","key":"2210_CR14","first-page":"68","volume":"1","author":"S Shanmugasundaram","year":"2011","unstructured":"Shanmugasundaram S, Lourdusamy R (2011) A comparative study of text compression algorithms. Int J Wisdom Based Comput 1(3):68\u201376","journal-title":"Int J Wisdom Based Comput"},{"key":"2210_CR15","doi-asserted-by":"crossref","unstructured":"Bhadade US, Trivedi AI (2011) Lossless text compression using dictionaries. Int J Comput Appl Algorithms 13(8):27\u201334","DOI":"10.5120\/1799-1767"},{"issue":"6","key":"2210_CR16","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1145\/214762.214771","volume":"30","author":"IH Witten","year":"1987","unstructured":"Witten IH, Neal RM, Cleary JG (1987) Arithmetic coding for data compression. Commun ACM 30(6):520\u201340. https:\/\/doi.org\/10.1145\/214762.214771","journal-title":"Commun ACM"},{"issue":"4","key":"2210_CR17","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.jss.2006.07.009","volume":"80","author":"P Brereton","year":"2007","unstructured":"Brereton P, Kitchenham BA, Budgen D, Turner M, Khalil M (2007) Lessons from applying the systematic literature review process within the software engineering domain. J Syst Softw 80(4):571\u201383. https:\/\/doi.org\/10.1016\/j.jss.2006.07.009","journal-title":"J Syst Softw"},{"issue":"1","key":"2210_CR18","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering\u2014a systematic literature review. Inf Softw Technology 51(1):7\u201315. https:\/\/doi.org\/10.1016\/j.infsof.2008.09.009","journal-title":"Inf Softw Technology"},{"key":"2210_CR19","unstructured":"IDC REPROT ON EXPONENTIAL DATA Gantz J, Reinsel D (2012) The digital universe in 2020: big data, bigger digital shadows, and biggest growth in the far east. In: IDC iView: IDC Analyze the Future,pp 1\u20136. http:\/\/www.emc.com\/collateral\/analyst-reports\/idc-digital-universe-united-states.pdf"},{"issue":"7","key":"2210_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/2699414","volume":"58","author":"DA Reed","year":"2015","unstructured":"Reed DA, Dongarra J (2015) Exascale computing and big data. Commun ACM 58(7):56\u201368. https:\/\/doi.org\/10.1145\/2699414","journal-title":"Commun ACM"},{"key":"2210_CR21","doi-asserted-by":"crossref","unstructured":"Barreto J, Ferreira P (2009) Efficient locally trackable deduplication in replicated systems. In: Proceedings of the 10th ACM\/IFIP\/USENIX International Conference on Middleware. Springer-Verlag New York, Inc. USA, p 6","DOI":"10.1007\/978-3-642-10445-9_6"},{"key":"2210_CR22","doi-asserted-by":"publisher","unstructured":"Meyer DT, Bolosky WJ (2012) A study of practical deduplication. ACM Trans Storage (TOS). https:\/\/doi.org\/10.1145\/2078861.2078864","DOI":"10.1145\/2078861.2078864"},{"issue":"5","key":"2210_CR23","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1016\/j.ipm.2011.01.009","volume":"47","author":"EN Borges","year":"2011","unstructured":"Borges EN, de Carvalho MG, Galante R, Gon\u00e7alves MA, Laender AH (2011) An unsupervised heuristic-based approach for bibliographic metadata deduplication. Inf Process Manag 47(5):706\u2013718. https:\/\/doi.org\/10.1016\/j.ipm.2011.01.009","journal-title":"Inf Process Manag"},{"key":"2210_CR24","unstructured":"Alvarez C (2011) NetApp deduplication for FAS and V-Series deployment and implementation guide. In: Technical ReportTR-3505"},{"key":"2210_CR25","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.jss.2016.02.021","volume":"121","author":"J Xu","year":"2016","unstructured":"Xu J, Zhang W, Zhang Z, Wang T, Huang T (2016) Clustering-based acceleration for virtual machine image deduplication in the cloud environment. J Syst Softw 121:144\u2013156. https:\/\/doi.org\/10.1016\/j.jss.2016.02.021","journal-title":"J Syst Softw"},{"key":"2210_CR26","doi-asserted-by":"publisher","unstructured":"Paulo J, Pereira J (2014) Distributed Exact Deduplication for Primary Storage Infrastructures. In Magoutis K., Pietzuch P. (eds) Distributed applications and interoperable systems DAIS 2014, vol 8460, LNCS Springer, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-662-43352-2_5","DOI":"10.1007\/978-3-662-43352-2_5"},{"issue":"3","key":"2210_CR27","first-page":"364","volume":"3","author":"AF Banu","year":"2012","unstructured":"Banu AF, Chandrasekar C (2012) A survey on deduplication methods. Int J Comput Trends Technol 3(3):364\u2013368","journal-title":"Int J Comput Trends Technol"},{"key":"2210_CR28","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/FITME.2010.5656539","volume":"1","author":"Q He","year":"2010","unstructured":"He Q, Li Z, Zhang X (2010) Data deduplication techniques. IEEE Int Conf Future Inf Technol Manag Eng (FITME) 1:430\u2013433. https:\/\/doi.org\/10.1109\/FITME.2010.5656539","journal-title":"IEEE Int Conf Future Inf Technol Manag Eng (FITME)"},{"key":"2210_CR29","doi-asserted-by":"publisher","unstructured":"Zhou R, Liu M, Li T (2013) Characterizing the efficiency of data deduplication for big data storage management. In: IEEE International Symposium on Workload Characterization (IISWC), pp 98\u2013108: https:\/\/doi.org\/10.1109\/IISWC.2013.6704674","DOI":"10.1109\/IISWC.2013.6704674"},{"issue":"7","key":"2210_CR30","doi-asserted-by":"publisher","first-page":"2473","DOI":"10.1007\/s11227-015-1400-5","volume":"71","author":"RW Ahmad","year":"2015","unstructured":"Ahmad RW, Gani A, Ab. Hamid SH et al (2015) Virtual machine migration in cloud data centers: a review, taxonomy, and open research issue. J Supercomput 71(7):2473\u20132515. https:\/\/doi.org\/10.1007\/s11227-015-1400-5","journal-title":"J Supercomput"},{"key":"2210_CR31","doi-asserted-by":"publisher","unstructured":"Hu Y, Li C, Liu L, Li T (2016) Hope: enabling efficient service orchestration in software-defined data centers. In: Proceedings of the 2016 International Conference on Supercomputing, p 10 ACM. https:\/\/doi.org\/10.1145\/2925426.2926257","DOI":"10.1145\/2925426.2926257"},{"key":"2210_CR32","unstructured":"Srinivasan K, Bisson T, Goodson GR, Voruganti K (2012) iDedup: latency-aware, inline data deduplication for primary storage. In: Proceedings of the USENIX Conference on File and Storage Technologies, vol 12, pp 24\u201324"},{"issue":"6","key":"2210_CR33","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/TC.2015.2455979","volume":"65","author":"B Mao","year":"2016","unstructured":"Mao B, Jiang H, Wu S, Tian L (2016) Leveraging data deduplication to improve the performance of primary storage systems in the cloud. IEEE Trans Comput 65(6):1775\u20131788. https:\/\/doi.org\/10.1109\/TC.2015.2455979","journal-title":"IEEE Trans Comput"},{"key":"2210_CR34","doi-asserted-by":"publisher","unstructured":"Kim C, Park KW, Park KH (2012) GHOST: GPGPU-offloaded high performance storage I\/O deduplication for primary storage system. In: Proceedings of the 2012 International Workshop on Programming Models and Applications for Multicores and Manycores ACM, pp 17\u201326. https:\/\/doi.org\/10.1145\/2141702.2141705","DOI":"10.1145\/2141702.2141705"},{"key":"2210_CR35","unstructured":"Lillibridge M, Eshghi K, Bhagwat D, Deolalikar V, Trezis G, Camble P (2009) Sparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality. In Proceedings of the 7th USENIX Conference on File and Storage Technologies, vol 9, pp 111\u2013123"},{"key":"2210_CR36","first-page":"1","volume":"8","author":"B Zhu","year":"2008","unstructured":"Zhu B, Li K, Patterson RH (2008) Avoiding the disk bottleneck in the data domain deduplication file system. Proc USENIX Conf File Storage Technol 8:1\u201314","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"2210_CR37","unstructured":"Dubnicki C, Gryz L, Heldt L, Kaczmarczyk M, Kilian W, Strzelczak P, Szczepkowski J, Ungureanu C, Welnicki M (2009) HYDRAstor: A scalable secondary storage. In: 7th USENIX Conference on File and Storage Technologies (FAST), vol 9, pp 197\u2013210"},{"issue":"1","key":"2210_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2641572","volume":"11","author":"YK Li","year":"2015","unstructured":"Li YK, Xu M, Ng CH, Lee PP (2015) Efficient hybrid inline and out-of-line deduplication for backup storage. ACM Trans Storage (TOS) 11(1):1\u201321. https:\/\/doi.org\/10.1145\/2641572","journal-title":"ACM Trans Storage (TOS)"},{"issue":"4","key":"2210_CR39","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/TC.2014.2308181","volume":"64","author":"W Xia","year":"2015","unstructured":"Xia W, Jiang H, Feng D, Hua Y (2015) Similarity and locality based indexing for high performance data deduplication. IEEE Trans Comput 64(4):1162\u20131176. https:\/\/doi.org\/10.1109\/TC.2014.2308181","journal-title":"IEEE Trans Comput"},{"key":"2210_CR40","doi-asserted-by":"crossref","unstructured":"Ng CH, Ma M, Wong TY, Lee PP, Lui J (2011) Live deduplication storage of virtual machine images in an open-source cloud. In: Proceedings of the 12th International Middleware Conference. International Federation for Information Processing, pp 80\u201399","DOI":"10.1007\/978-3-642-25821-3_5"},{"issue":"5","key":"2210_CR41","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1109\/TPDS.2013.173","volume":"25","author":"X Zhao","year":"2013","unstructured":"Zhao X, Zhang Y, Wu Y, Chen K, Jiang J, Li K (2013) Liquid: a scalable deduplication file system for virtual machine images. IEEE Trans Parallel Distrib Syst 25(5):1257\u20131266. https:\/\/doi.org\/10.1109\/TPDS.2013.173","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2210_CR42","doi-asserted-by":"publisher","unstructured":"Waldspurger CA (2002) Memory resource management in VMware ESX server. In: ACM Proceedings of the 5th Symposium on Operating Systems Design and Implementation SIGOPS, vol 36(SI), pp 181\u2013194. https:\/\/doi.org\/10.1145\/844128.844146","DOI":"10.1145\/844128.844146"},{"key":"2210_CR43","unstructured":"Clements AT, Ahmad I, Vilayannur M, Li J (2009) Decentralized Deduplication in SAN Cluster File Systems. In: USENIX Annual Technical Conference, pp 101\u2013114"},{"issue":"4","key":"2210_CR44","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/1594977.1592580","volume":"39","author":"A Anand","year":"2009","unstructured":"Anand A, Sekar V, Akella A (2009) SmartRE: an architecture for coordinated network-wide redundancy elimination. ACM SIGCOMM Comput Commun Rev 39(4):87\u201398. https:\/\/doi.org\/10.1145\/1594977.1592580","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"2210_CR45","unstructured":"Agarwal B, Akella A, Anand A, Balachandran A, Chitnis P, Muthukrishnan C, Ramjee R, Varghese G (2010). EndRE: An End-system redundancy elimination service for enterprises. In: NSDI, pp 419\u2013432"},{"key":"2210_CR46","unstructured":"Katiyar A, Weissman JB (2011) ViDeDup: an application-aware framework for video de-duplication. In: Proceedings of the 3rd USENIX Conference on Hot Topics in Storage and File Systems (Hot Storage), pp 1\u20135"},{"key":"2210_CR47","unstructured":"Li C, Shilane P, Douglis F, Shim H, Smaldone S, Wallace G (2014) Nitro: a Capacity-optimized SSD cache for primary storage. In: USENIX Annual Technical Conference, pp 501\u2013512"},{"key":"2210_CR48","unstructured":"Shen HT, Zhou X, Huang Z, Shao J, Zhou X (2007) UQLIPS: a real-time near-duplicate video clip detection system. In: Proceedings of the 33rd International Conference on Very Large Data Bases VLDB Endowment, pp 1374\u20131377"},{"key":"2210_CR49","unstructured":"Chen F, Luo T, Zhang X (2011) CAFTL: A content-aware flash translation layer enhancing the lifespan of flash memory based solid state drives. In: Proceedings of 9th USENIX Conference on File Storage Technology (FAST), vol 11, pp 77\u201390"},{"issue":"4","key":"2210_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1629080.1629084","volume":"5","author":"M Vrable","year":"2009","unstructured":"Vrable M, Savage S, Voelker GM (2009) Cumulus: filesystem backup to the cloud. ACM Trans Storage (TOS) 5(4):1\u201314. https:\/\/doi.org\/10.1145\/1629080.1629084","journal-title":"ACM Trans Storage (TOS)"},{"key":"2210_CR51","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-319-11197-1_35","volume-title":"Algorithms and architectures for parallel processing. LNCS","author":"R Lai","year":"2014","unstructured":"Lai R, Hua Y, Feng D, Xia W, Fu M, Yang Y (2014) A near-exact defragmentation scheme to improve restore performance for cloud backup systems. In: Sun X et al (eds) Algorithms and architectures for parallel processing. LNCS, vol 8630. Springer, Cham, pp 457\u2013471. https:\/\/doi.org\/10.1007\/978-3-319-11197-1_35"},{"key":"2210_CR52","doi-asserted-by":"publisher","DOI":"10.1145\/2512348","author":"B Mao","year":"2014","unstructured":"Mao B, Jiang H, Wu S, Fu Y, Tian L (2014) Read-performance optimization for deduplication-based storage systems in the cloud. ACM Trans Storage. https:\/\/doi.org\/10.1145\/2512348","journal-title":"ACM Trans Storage"},{"key":"2210_CR53","doi-asserted-by":"crossref","unstructured":"Tan Y, Jiang H, Feng D, Tian L, Yan Z (2011) CABdedupe: a causality-based deduplication performance booster for cloud backup services. In: Parallel and Distributed Processing Symposium (IPDPS) IEEE International, pp 1266\u20131277","DOI":"10.1109\/IPDPS.2011.76"},{"issue":"3","key":"2210_CR54","first-page":"12","volume":"5","author":"Yusof Nbt","year":"2016","unstructured":"Nbt Yusof, Ismail A, Majid NAA (2016) Deduplication image middleware detection comparison in standalone cloud database. Int J Adv Comput Sci Technol (IJACST) 5(3):12\u201318","journal-title":"Int J Adv Comput Sci Technol (IJACST)"},{"key":"2210_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11194-0_24","volume-title":"Algorithms and architectures for parallel processing ICA3PP LNCS","author":"Z Nie","year":"2014","unstructured":"Nie Z, Hua Y, Feng D, Li Q, Sun Y (2014) Efficient storage support for real-time near-duplicate video retrieval. In: Sun X et al (eds) Algorithms and architectures for parallel processing ICA3PP LNCS, vol 8631. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-11194-0_24"},{"issue":"11","key":"2210_CR56","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.4304\/jcp.8.11.2768-2775","volume":"8","author":"M Chen","year":"2013","unstructured":"Chen M, Wang S, Tian L (2013) A high-precision duplicate image deduplication approach. J Comput 8(11):2768\u20132775. https:\/\/doi.org\/10.4304\/jcp.8.11.2768-2775","journal-title":"J Comput"},{"issue":"5","key":"2210_CR57","doi-asserted-by":"publisher","first-page":"2415","DOI":"10.1016\/j.eswa.2013.09.040","volume":"41","author":"G Wang","year":"2014","unstructured":"Wang G, Chen S, Lin M, Liu X (2014) SBBS: A sliding blocking algorithm with backtracking sub-blocks for duplicate data detection. Expert Syst Appl 41(5):2415\u20132423. https:\/\/doi.org\/10.1016\/j.eswa.2013.09.040","journal-title":"Expert Syst Appl"},{"issue":"4","key":"2210_CR58","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1145\/1210596.1210599","volume":"2","author":"DR Bobbarjung","year":"2006","unstructured":"Bobbarjung DR, Jagannathan S, Dubnicki C (2006) Improving duplicate elimination in storage systems. ACM Trans Storage (TOS) 2(4):424\u201348. https:\/\/doi.org\/10.1145\/1210596.1210599","journal-title":"ACM Trans Storage (TOS)"},{"key":"2210_CR59","unstructured":"Kruus E, Ungureanu C, Dubnicki C (2010) Bimodal content defined chunking for backup streams. In: Proceedings of the USENIX Conference on File and Storage Technologies (FAST), pp 239\u2013252"},{"issue":"6","key":"2210_CR60","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1016\/j.compeleceng.2011.06.007","volume":"37","author":"SH Lim","year":"2011","unstructured":"Lim SH (2011) DeFFS: Duplication-eliminated flash file system. Comput Electr Eng 37(6):1122\u20131136. https:\/\/doi.org\/10.1016\/j.compeleceng.2011.06.007","journal-title":"Comput Electr Eng"},{"key":"2210_CR61","doi-asserted-by":"publisher","unstructured":"Kaczmarczyk M, Barczynski M, Kilian W, Dubnicki C (2012) Reducing impact of data fragmentation caused by in-line deduplication. In: Proceedings of the 5th Annual International Systems and Storage Conference ACM, pp 1\u201312. https:\/\/doi.org\/10.1145\/2367589.2367600","DOI":"10.1145\/2367589.2367600"},{"key":"2210_CR62","doi-asserted-by":"publisher","unstructured":"Wildani A, Miller EL, Rodeh O (2013) Hands: A heuristically arranged non-backup in-line deduplication system. In: IEEE 29th International Conference on Data Engineering (ICDE), pp 446\u2013457. https:\/\/doi.org\/10.1109\/ICDE.2013.6544846","DOI":"10.1109\/ICDE.2013.6544846"},{"key":"2210_CR63","doi-asserted-by":"publisher","unstructured":"Nam YJ, Park D, Du DH (2012) Assuring demanded read performance of data deduplication storage with backup datasets. In: IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), pp 201\u2013208. https:\/\/doi.org\/10.1109\/MASCOTS.2012.32","DOI":"10.1109\/MASCOTS.2012.32"},{"issue":"1","key":"2210_CR64","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s11390-017-1680-8","volume":"32","author":"D Park","year":"2017","unstructured":"Park D, Fan Z, Nam YJ, Du DH (2017) A lookahead read cache: improving read performance for deduplication backup storage. J Comput Sci Technol 32(1):26\u201340. https:\/\/doi.org\/10.1007\/s11390-017-1680-8","journal-title":"J Comput Sci Technol"},{"issue":"6","key":"2210_CR65","doi-asserted-by":"publisher","first-page":"1692","DOI":"10.1109\/TC.2015.2456015","volume":"65","author":"W Xia","year":"2016","unstructured":"Xia W, Jiang H, Feng D, Tian L (2016) DARE: a deduplication-aware resemblance detection and elimination scheme for data reduction with low overheads. IEEE Trans Comput 65(6):1692\u20131705. https:\/\/doi.org\/10.1109\/TC.2015.2456015","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"2210_CR66","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TPDS.2015.2410781","volume":"27","author":"M Fu","year":"2016","unstructured":"Fu M, Feng D, Hua Y, He X, Chen Z, Liu J, Xia W, Huang F, Liu Q (2016) Reducing fragmentation for in-line deduplication backup storage via exploiting backup history and cache knowledge. IEEE Trans Parallel Distrib Syst 27(3):855\u2013868. https:\/\/doi.org\/10.1109\/TPDS.2015.2410781","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2210_CR67","first-page":"354","volume-title":"Middleware IFIP international federation for information processing. LNCS","author":"Y Fu","year":"2012","unstructured":"Fu Y, Jiang H, Xiao N (2012) A scalable inline cluster deduplication framework for big data protection. In: Narasimhan P, Triantafillou P (eds) Middleware IFIP international federation for information processing. LNCS, vol 7662. Springer, Berlin, pp 354\u2013373"},{"key":"2210_CR68","unstructured":"Rabin MO (1981) Fingerprinting by random polynomials. Harvard Aiken Computational Laboratory TR-15-81. URL: http:\/\/cr.yp.to\/bib\/entries.html"},{"key":"2210_CR69","doi-asserted-by":"publisher","unstructured":"Bhagwat D, Eshghi K, Long DD, Lillibridge M (2009) Extreme binning: scalable, parallel deduplication for chunk-based file backup. In: Proceedings of IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Computer Society, Washington, DC, vol 9, pp 1\u20139. https:\/\/doi.org\/10.1109\/MASCOT.2009.5366623","DOI":"10.1109\/MASCOT.2009.5366623"},{"issue":"5","key":"2210_CR70","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1631\/jzus.C0910445","volume":"11","author":"TM Yang","year":"2010","unstructured":"Yang TM, Feng D, Niu ZY, Wan YP (2010) Scalable high performance de-duplication backup via hash join. J Zhejiang Uni Sci C Springer 11(5):315\u2013327. https:\/\/doi.org\/10.1631\/jzus.C0910445","journal-title":"J Zhejiang Uni Sci C Springer"},{"issue":"6","key":"2210_CR71","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TC.2010.263","volume":"60","author":"J Min","year":"2011","unstructured":"Min J, Yoon D, Won Y (2011) Efficient deduplication techniques for modern backup operation. IEEE Trans Comput 60(6):824\u2013840. https:\/\/doi.org\/10.1109\/TC.2010.263","journal-title":"IEEE Trans Comput"},{"key":"2210_CR72","unstructured":"Guo F, Efstathopoulos P (2011) Building a high-performance deduplication system. In: Proceedings of USENIX Annual Technical Conference"},{"issue":"10","key":"2210_CR73","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ipl.2012.01.012","volume":"112","author":"J Barreto","year":"2012","unstructured":"Barreto J, Veiga L, Ferreira P (2012) Hash challenges: stretching the limits of compare-by-hash in distributed data deduplication. Inf Process Lett 112(10):380\u2013385. https:\/\/doi.org\/10.1016\/j.ipl.2012.01.012","journal-title":"Inf Process Lett"},{"issue":"9","key":"2210_CR74","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1109\/TKDE.2011.127","volume":"24","author":"P Christen","year":"2012","unstructured":"Christen P (2012) A survey of indexing techniques for scalable record linkage and deduplication. IEEE Trans Knowl Data Eng 24(9):1537\u20131555. https:\/\/doi.org\/10.1109\/TKDE.2011.127","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"2210_CR75","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1109\/TPDS.2013.167","volume":"25","author":"Y Fu","year":"2014","unstructured":"Fu Y, Jiang H, Xiao N, Tian L, Liu F, Xu L (2014) Application-aware local-global source deduplication for cloud backup services of personal storage. IEEE Trans Parall Distrib Syst 25(5):1155\u20131165. https:\/\/doi.org\/10.1109\/TPDS.2013.167","journal-title":"IEEE Trans Parall Distrib Syst"},{"issue":"6","key":"2210_CR76","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Secur Priv 8(6):40\u201347. https:\/\/doi.org\/10.1109\/MSP.2010.187","journal-title":"IEEE Secur Priv"},{"issue":"6","key":"2210_CR77","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615\u20131625. https:\/\/doi.org\/10.1109\/TPDS.2013.284","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2210_CR78","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-35795-4_32","volume-title":"Trustworthy Computing and Services. ISCTCS communications in computer and information science","author":"C Liu","year":"2013","unstructured":"Liu C, Liu X, Wan L (2013) Policy-based de-duplication in secure cloud storage. In: Yuan Y, Wu X, Lu Y (eds) Trustworthy Computing and Services. ISCTCS communications in computer and information science, vol 320. Springer, Berlin, pp 250\u2013262. https:\/\/doi.org\/10.1007\/978-3-642-35795-4_32"},{"key":"2210_CR79","doi-asserted-by":"publisher","unstructured":"Storer MW, Greenan K, Long DD, Miller EL (2008) Secure data deduplication. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, pp 1\u201310. https:\/\/doi.org\/10.1145\/1456469.14","DOI":"10.1145\/1456469.14"},{"issue":"12","key":"2210_CR80","doi-asserted-by":"publisher","first-page":"3569","DOI":"10.1109\/TC.2015.2401017","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan MM, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569\u20133579. https:\/\/doi.org\/10.1109\/TC.2015.2401017","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"2210_CR81","first-page":"3111","volume":"4","author":"NS Vishalakshi","year":"2017","unstructured":"Vishalakshi NS, Sridevi S (2017) Survey on secure de-duplication with encrypted data for cloud storage. Int J Adv Res Sci Eng Technol 4(1):3111\u20133117","journal-title":"Int J Adv Res Sci Eng Technol"},{"issue":"2","key":"2210_CR82","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.15680\/IJIRCCE.2017.0502105","volume":"5","author":"CB Bibawe","year":"2017","unstructured":"Bibawe CB, Baviscar V (2017) Secure authorized deduplication for data reduction with low overheads in hybrid cloud. Int J Innov Res Comput Commun Eng 5(2):1797\u20131804. https:\/\/doi.org\/10.15680\/IJIRCCE.2017.0502105","journal-title":"Int J Innov Res Comput Commun Eng"},{"key":"2210_CR83","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.future.2016.02.001","volume":"74","author":"S Wu","year":"2016","unstructured":"Wu S, Li KC, Mao B, Liao M (2016) DAC: improving storage availability with deduplication-assisted cloud-of-clouds. Future Gener Comput Syst 74:190\u2013198. https:\/\/doi.org\/10.1016\/j.future.2016.02.001","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"2210_CR84","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TST.2015.7040510","volume":"20","author":"J Wang","year":"2015","unstructured":"Wang J, Zhao Z, Xu Z, Zhang H, Li L, Guo Y (2015) I-sieve: an inline high performance deduplication system used in cloud storage. Tsinghua Sci Technol 20(1):17\u201327. https:\/\/doi.org\/10.1109\/TST.2015.7040510","journal-title":"Tsinghua Sci Technol"},{"key":"2210_CR85","doi-asserted-by":"publisher","unstructured":"Leesakul W, Townend P, Xu J (2014) Dynamic data deduplication in cloud storage. In: IEEE 8th International Symposium on Service Oriented System. Engineering, pp 320\u2013325: https:\/\/doi.org\/10.1109\/SOSE.2014.46","DOI":"10.1109\/SOSE.2014.46"},{"issue":"1","key":"2210_CR86","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3233\/ICA-120418","volume":"20","author":"Z Sun","year":"2013","unstructured":"Sun Z, Shen J, Yong J (2013) A novel approach to data deduplication over the engineering-oriented cloud systems. Integr Comput Aided Eng 20(1):45\u201357. https:\/\/doi.org\/10.3233\/ICA-120418","journal-title":"Integr Comput Aided Eng"},{"key":"2210_CR87","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-28034-9_28","volume-title":"Distributed computing and internet technology. LNCS","author":"P Neelaveni","year":"2016","unstructured":"Neelaveni P, Vijayalakshmi M (2016) FC-LID: file classifier based linear indexing for deduplication in cloud backup services. In: Bj\u00f8rner N, Prasad S, Parida L (eds) Distributed computing and internet technology. LNCS, vol 9581. Springer, Cham, pp 213\u2013222. https:\/\/doi.org\/10.1007\/978-3-319-28034-9_28"},{"issue":"8","key":"2210_CR88","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1016\/j.jcss.2014.12.026","volume":"81","author":"J Li","year":"2015","unstructured":"Li J, Chen X, Xhafa F, Barolli L (2015) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81(8):1532\u20131541. https:\/\/doi.org\/10.1016\/j.jcss.2014.12.026","journal-title":"J Comput Syst Sci"},{"issue":"4","key":"2210_CR89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3017428","volume":"49","author":"Y Shin","year":"2017","unstructured":"Shin Y, Koo D, Hur J (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv (CSUR) 49(4):1\u201338. https:\/\/doi.org\/10.1145\/3017428","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"3","key":"2210_CR90","doi-asserted-by":"publisher","first-page":"878","DOI":"10.17148\/IJARCCE.2017.63205","volume":"6","author":"MS Pokale","year":"2017","unstructured":"Pokale MS, Dhok S, Kasbe V, Joshi G, Shinde N (2017) Data deduplication and load balancing techniques on cloud systems. Int J Adv Res Comput Commun Eng 6(3):878\u2013883. https:\/\/doi.org\/10.17148\/IJARCCE.2017.63205","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"2210_CR91","unstructured":"Debnath BK, Sengupta S, Li J (2010) ChunkStash: speeding up inline storage deduplication using flash memory. In: Proceedings of USENIX Annual Technical Conference (ATC), pp 1\u201316"},{"key":"2210_CR92","unstructured":"Dong W, Douglis F, Li K, Patterson RH, Reddy S, Shilane P (2011) Tradeoffs in scalable data routing for deduplication clusters. In: Proceedings of USENIX Conference on File and Storage Technologies (FAST), vol 11, pp 15\u201329"},{"issue":"2","key":"2210_CR93","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1007\/s11042-014-2008-0","volume":"74","author":"J Li","year":"2015","unstructured":"Li J, Qian X, Li Q, Zhao Y, Wang L, Tang YY (2015) Mining near duplicate image groups. Multimed Tools Appl 74(2):655\u2013669","journal-title":"Multimed Tools Appl"},{"key":"2210_CR94","doi-asserted-by":"publisher","unstructured":"Ramaiah NP, Mohan CK (2011) De-duplication of photograph images using histogram refinement. In Recent Advances in Intelligent Computational Systems (RAICS) IEEE 391-395. https:\/\/doi.org\/10.1109\/RAICS.2011.6069341","DOI":"10.1109\/RAICS.2011.6069341"},{"key":"2210_CR95","doi-asserted-by":"publisher","unstructured":"Zargar AJ, Singh N, Rathee G, Singh AK (2015) Image data-deduplication using the block truncation coding technique. In: Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) International Conference on IEEE, pp 154\u2013158. https:\/\/doi.org\/10.1109\/ABLAZE.2015.7154986","DOI":"10.1109\/ABLAZE.2015.7154986"},{"key":"2210_CR96","doi-asserted-by":"publisher","unstructured":"Hua Y, He W, Liu X, Feng D (2015) SmartEye: real-time and efficient cloud image sharing for disaster environments. In: IEEE Conference on Computer Communications (INFOCOM), pp 1616\u20131624: https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218541","DOI":"10.1109\/INFOCOM.2015.7218541"},{"issue":"4","key":"2210_CR97","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1007\/s00500-015-1596-6","volume":"20","author":"X Li","year":"2016","unstructured":"Li X, Li J, Huang F (2016) A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Comput 20(4):1437\u20131448. https:\/\/doi.org\/10.1007\/s00500-015-1596-6","journal-title":"Soft Comput"},{"key":"2210_CR98","unstructured":"Deshmukh AS, Lambhate PD (2016) A methodological survey on mapreduce for identification of duplicate images. Int J Sci Res (IJSR) 5(1):206\u2013210"},{"key":"2210_CR99","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.jisa.2015.11.003","volume":"27","author":"F Rashid","year":"2016","unstructured":"Rashid F, Miri A, Woungang I (2016) Secure image deduplication through image compression. J Inf Secur Appl 27:54\u201364. https:\/\/doi.org\/10.1016\/j.jisa.2015.11.003","journal-title":"J Inf Secur Appl"},{"key":"2210_CR100","doi-asserted-by":"publisher","unstructured":"Zheng Y, Yuan X, Wang X, Jiang J, Wang C, Gui X (2015) Enabling encrypted cloud media center with secure deduplication. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp 63\u201372. https:\/\/doi.org\/10.1145\/2714576.271462","DOI":"10.1145\/2714576.271462"},{"key":"2210_CR101","doi-asserted-by":"publisher","unstructured":"Yang X, Zhu Q, Cheng KT (2009) Near-duplicate detection for images and videos. In: Proceedings of the First ACM workshop on Large-Scale Multimedia Retrieval and Mining, pp 73\u201380: https:\/\/doi.org\/10.1145\/1631058.1631073","DOI":"10.1145\/1631058.1631073"},{"key":"2210_CR102","doi-asserted-by":"publisher","unstructured":"Naturel X, Gros P (2005) A fast shot matching strategy for detecting duplicate sequences in a television stream. In: ACM Proceedings of the 2nd International Workshop on Computer Vision Meets Databases, pp 21\u201327. https:\/\/doi.org\/10.1145\/1160939.1160947","DOI":"10.1145\/1160939.1160947"},{"key":"2210_CR103","doi-asserted-by":"publisher","unstructured":"Li X, Lin J, Li J, Jin B (2016) A Video Deduplication Scheme with Privacy Preservation in IoT. In: International Symposium on Computational Intelligence and Intelligent Systems. Communications in Computer and Information Science, vol 575. Springer, Singapore, pp 409\u2013417. https:\/\/doi.org\/10.1007\/978-981-10-0356-1_43","DOI":"10.1007\/978-981-10-0356-1_43"},{"key":"2210_CR104","unstructured":"Velmurugan K, Baboo LD (2011) Content-based image retrieval using SURF and colour moments. Global J Comput Sci Technol 11(10)"},{"issue":"6","key":"2210_CR105","doi-asserted-by":"publisher","first-page":"829","DOI":"10.4304\/jmm.9.6.829-834","volume":"9","author":"L Li","year":"2014","unstructured":"Li L (2014) Image matching algorithm based on feature-point and DAISY descriptor. J Multim 9(6):829\u2013834. https:\/\/doi.org\/10.4304\/jmm.9.6.829-834","journal-title":"J Multim"},{"issue":"4","key":"2210_CR106","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2602186","volume":"10","author":"Y Lei","year":"2014","unstructured":"Lei Y, Qiu G, Zheng L, Huang J (2014) Fast near-duplicate image detection using uniform randomized trees. ACM Trans Multim Comput Commun Appl (TOMM) 10(4):1\u201315. https:\/\/doi.org\/10.1145\/2602186","journal-title":"ACM Trans Multim Comput Commun Appl (TOMM)"},{"key":"2210_CR107","doi-asserted-by":"publisher","unstructured":"Dong W, Wang Z, Charikar M, Li K (2012) High-confidence near-duplicate image detection. In: Proceedings of the 2nd ACM International Conference on Multimedia Retrieval ACM, NY, USA. https:\/\/doi.org\/10.1145\/2324796.2324798","DOI":"10.1145\/2324796.2324798"},{"key":"2210_CR108","doi-asserted-by":"crossref","unstructured":"Ke Y, Sukthankar R, Huston L, Ke Y, Sukthankar R (2004) Efficient near-duplicate detection and sub-image retrieval. In :ACM Multimedia, vol 4(1)","DOI":"10.1145\/1027527.1027729"},{"key":"2210_CR109","doi-asserted-by":"publisher","unstructured":"Thomee B, Huiskes MJ, Bakker EM, Lew MS (2013) An evaluation of content-based duplicate image detection methods for web search. In: IEEE International Conference on Multimedia and Expo (ICME), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICME.2013.6607451","DOI":"10.1109\/ICME.2013.6607451"},{"key":"2210_CR110","doi-asserted-by":"publisher","unstructured":"Foo JJ, Sinha R, Zobel J (2007) SICO: a system for detection of near-duplicate images during search. In: IEEE International Conference Multimedia and Expo, pp 595\u2013598. https:\/\/doi.org\/10.1109\/ICME.2007.4284720","DOI":"10.1109\/ICME.2007.4284720"},{"key":"2210_CR111","doi-asserted-by":"publisher","unstructured":"Chum O, Philbin J, Zisserman A (2008) Near Duplicate Image Detection: min-Hash and tf-idf Weighting. In: BMVC British Machine Vision Conference, vol 810, pp 812\u2013815. https:\/\/doi.org\/10.5244\/C.22.50","DOI":"10.5244\/C.22.50"},{"issue":"5","key":"2210_CR112","first-page":"557","volume":"8","author":"Z Li","year":"2013","unstructured":"Li Z, Feng X (2013) Near duplicate image detecting algorithm based on bag of visual word model. J Multimed 8(5):557\u2013565","journal-title":"J Multimed"},{"issue":"4","key":"2210_CR113","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.image.2003.12.001","volume":"19","author":"JS Seo","year":"2004","unstructured":"Seo JS, Haitsma J, Kalker T, Yoo CD (2004) A robust image fingerprinting system using the Radon transform. Signal Process Image Commun 19(4):325\u201339. https:\/\/doi.org\/10.1016\/j.image.2003.12.001","journal-title":"Signal Process Image Commun"},{"key":"2210_CR114","doi-asserted-by":"publisher","unstructured":"Yu X, Huang T (2008) An image fingerprinting method robust to complicated image modifications. In: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp 227\u2013230. https:\/\/doi.org\/10.1109\/IIH-MSP.2008.93","DOI":"10.1109\/IIH-MSP.2008.93"},{"issue":"4","key":"2210_CR115","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/TMM.2006.876290","volume":"8","author":"MA Gavrielides","year":"2006","unstructured":"Gavrielides MA, Sikudova E, Pitas I (2006) Color-based descriptors for image fingerprinting. IEEE Trans Multimed 8(4):740\u2013748. https:\/\/doi.org\/10.1109\/TMM.2006.876290","journal-title":"IEEE Trans Multimed"},{"key":"2210_CR116","doi-asserted-by":"publisher","unstructured":"Nikolaidis N, Pitas I (2009) Still image and video fingerprinting. In: IEEE Seventh International Conference on Advances in Pattern Recognition (ICAPR), pp 3\u20138. https:\/\/doi.org\/10.1109\/ICAPR.2009.83","DOI":"10.1109\/ICAPR.2009.83"},{"issue":"5","key":"2210_CR117","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1007\/s11042-015-2472-1","volume":"75","author":"F Nian","year":"2016","unstructured":"Nian F, Li T, Wu X, Gao Q, Li F (2016) Efficient near-duplicate image detection with a local-based binary representation. Multimed Tools Appl 75(5):2435\u20132452. https:\/\/doi.org\/10.1007\/s11042-015-2472-1","journal-title":"Multimed Tools Appl"},{"key":"2210_CR118","doi-asserted-by":"publisher","unstructured":"Srinivasan SH, Sawant N (2008) Finding near-duplicate images on the web using fingerprints. In: Proceedings of the 16th ACM International Conference on Multimedia, pp 881\u2013884. https:\/\/doi.org\/10.1145\/1459359.1459512","DOI":"10.1145\/1459359.1459512"},{"issue":"9","key":"2210_CR119","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/LSP.2014.2377795","volume":"22","author":"J Yao","year":"2015","unstructured":"Yao J, Yang B, Zhu Q (2015) Near-duplicate image retrieval based on contextual descriptor. IEEE Signal Process Lett 22(9):1404\u20131408. https:\/\/doi.org\/10.1109\/LSP.2014.2377795","journal-title":"IEEE Signal Process Lett"},{"key":"2210_CR120","doi-asserted-by":"publisher","unstructured":"Leutenegger S, Chli M, Siegwart RY (2011) BRISK: Binary robust invariant scalable keypoints. In: IEEE International Conference on Computer Vision (ICCV), pp 2548\u20132555: https:\/\/doi.org\/10.1109\/ICCV.2011.6126542","DOI":"10.1109\/ICCV.2011.6126542"},{"key":"2210_CR121","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jvcir.2015.02.014","volume":"30","author":"CC Chen","year":"2015","unstructured":"Chen CC, Hsieh SL (2015) Using binarization and hashing for efficient SIFT matching. J Vis Commun Image Represent 30:86\u201393. https:\/\/doi.org\/10.1016\/j.jvcir.2015.02.014","journal-title":"J Vis Commun Image Represent"},{"key":"2210_CR122","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-319-48674-1_29","volume-title":"Cloud Computing and Security ICCCS. LNCS","author":"F Huang","year":"2016","unstructured":"Huang F, Zhou Z, Liu T, Liu X (2016) Original image tracing with image relational graph for near-duplicate image elimination. In: Sun X, Liu A, Chao HC, Bertino E (eds) Cloud Computing and Security ICCCS. LNCS, vol 10040. Springer, Cham, pp 322\u2013336. https:\/\/doi.org\/10.1007\/978-3-319-48674-1_29"},{"key":"2210_CR123","doi-asserted-by":"crossref","unstructured":"Wang XJ, Zhang L, Liu C (2013) Duplicate discovery on 2 billion internet images. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp 429\u2013436","DOI":"10.1109\/CVPRW.2013.71"},{"key":"2210_CR124","doi-asserted-by":"publisher","unstructured":"Zhao J, Xue LJ, Men GZ (2010) Optimization matching algorithm based on improved Harris and SIFT. In: IEEE International Conference on Machine Learning and Cybernetics (ICMLC), vol 1, pp 258\u2013261. https:\/\/doi.org\/10.1109\/ICMLC.2010.5581057","DOI":"10.1109\/ICMLC.2010.5581057"},{"issue":"2","key":"2210_CR125","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s00530-005-0199-y","volume":"11","author":"CS Lu","year":"2005","unstructured":"Lu CS, Hsu CY (2005) Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multimed Syst 11(2):159\u2013173. https:\/\/doi.org\/10.1007\/s00530-005-0199-y","journal-title":"Multimed Syst"},{"key":"2210_CR126","doi-asserted-by":"publisher","unstructured":"Lei Y, Wang Y, Huang J (2011) Robust image hash in Radon transform domain for authentication. Signal Process Image Commun 26(6):280\u2013288. https:\/\/doi.org\/10.1016\/j.image.2011.04.007","DOI":"10.1016\/j.image.2011.04.007"},{"key":"2210_CR127","doi-asserted-by":"publisher","unstructured":"Hua Y, Jiang H, Feng D (2014) FAST: Near real-time searchable data analytics for the cloud. In: IEEE Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, pp 754\u2013765: https:\/\/doi.org\/10.1109\/SC.2014.67","DOI":"10.1109\/SC.2014.67"},{"issue":"2","key":"2210_CR128","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3078837","volume":"13","author":"J Ma","year":"2017","unstructured":"Ma J, Stones RJ, Ma Y, Wang J, Ren J, Wang G, Liu X (2017) Lazy exact deduplication. ACM Trans Storage (TOS) 13(2):1\u201326. https:\/\/doi.org\/10.1145\/3078837","journal-title":"ACM Trans Storage (TOS)"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-017-2210-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2210-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2210-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T06:07:33Z","timestamp":1570514853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-017-2210-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"references-count":128,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["2210"],"URL":"https:\/\/doi.org\/10.1007\/s11227-017-2210-8","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}