A New Scheme for Removing Duplicate Files from Smart Mobile Devices
Images as a Case Study
Abstract
The continuous development of the information technology and mobile communication world and the potentials available in the smart devices make these devices widely used in daily life. The mobile applications with the internet are distinguished simple, essay to use in any time/anywhere, communication between relatives and friends in different places in the world. The social application networks make these devices received several of the duplicate files daily which lead to many drawbacks such inefficient use of storage, low performance of CPU, RAM, and increasing consumption battery. In this paper, we present a good scheme to remove from the duplicate files, and we focus on image files as a common case in social apps. Our work overcomes on the above-mentioned issues and focuses to use hash function and Huffman code to build unique code for each image. Our experiments improve the performance from 1046770, 1995808 ns to 950000, and 1981154 ns in Galaxy and HUAWEI, respectively. In the storage side, the proposed scheme saves storage space from 1.9 GB, 1.24 GB to 2 GB, and 1.54 GB, respectively.
Downloads
References
C. R. Shyu, C. Brodley, A. Kak, A. Kosaka, A. Aisen and L. Broderick. “Local Versus Global Features for Content-based Image Retrieval”. In Proceedings. IEEE Workshop on ContentBased Access of Image and Video Libraries (Cat. No. 98EX173), 1998, pp. 30-34.
D. A. Lisin, M. A. Mattar, M. B. Blaschko, E. G. Learned-Miller and M. C. Benfield. “Combining Local and Global Image Features for Object Class Recognition”. In 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05)-Workshops, 2005, pp. 47-47.
M. Agarwal, A. Singhal and B. Lall. “3D local ternary co-occurrence patterns for natural, texture, face and bio medical image retrieval”. Neurocomputing, vol. 313, pp. 333-345, 2018.
S. S. Hwang and S. H. Hong. “Pre-extraction of features and environment variable-based database filtering for fast image matching on mobile”. Mobile and Wireless Technologies, vol. 2016, pp. 223-230, 2016.
J. Machajdik and A. Hanbury. “Affective Image Classification Using Features Inspired by Psychology and Art Theory”. In Proceedings of the 18th ACM International Conference on Multimedia, 2010, pp. 83-92.
N. Lee, C. Kim, W. Choi, M. Pyeon and Y. Kim. “Development of indoor localization system using a mobile data acquisition platform and BoW image matching”. KSCE Journal of Civil
Engineering, vol. 21, pp. 418-430, 2017.
L. Wang and H. Wang. “Improving feature matching strategies for efficient image retrieval”. Signal Processing: Image Communication, vol. 53, pp. 86-94, 2017.
K. Miller, F. Franz, M. Rittinghaus, M. Hillenbrand and F. Bellosa. “{XLH}: More Effective Memory Deduplication Scanners Through Cross-layer Hints”. In Presented as Part of the 2013 {USENIX} Annual Technical Conference ({USENIX}{ATC} 13), 2013, pp. 279-290.
T. Liu, F. Chen, Y. Ma and Y. Xie. “An energy-efficient task scheduling for mobile devices based on cloud assistant”. Future Generation Computer Systems, vol. 61, pp. 1-12, 2016.
R. N. Widodo, H. Lim and M. Atiquzzaman. “SDM: Smart deduplication for mobile cloud storage”. Future Generation Computer Systems, vol. 70, pp. 64-73, 2017.
E. Ahmed, A. Gani, M. Sookhak, S. H. Ab Hamid and F. Xia. “Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges”. Journal of Network and Computer Applications, vol. 52, pp. 52-68, 2015.
M. W. Storer, K. Greenan, D. D. Long and E. L. Miller. “Secure Data Deduplication”. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, 2008, pp. 1-10.
N. Haustein, C. A. Klein, U. Troppens and D. J. Winarski. “Method of and System for Adaptive Selection of a Deduplication Chunking Technique”. Google Patents, 2009.
B. Zhu, K. Li and R. H. Patterson. “Avoiding the Disk Bottleneck in the Data Domain Deduplication File System”. In Fast USENIX Conference, 2008, pp. 1-14.
D. Meister and A. Brinkmann. “Multi-level Comparison of Data Deduplication in a Backup Scenario”. In Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, 2009, p. 8.
Y. Won, R. Kim, J. Ban, J. Hur, S. Oh and J. Lee. “Prun: Eliminating Information Redundancy for Large Scale Data Backup System”. In 2008 International Conference on Computational Sciences and Its Applications, 2008, pp. 139-144.
M. Sharma. “Compression using huffman coding”. IJCSNS International Journal of Computer Science and Network Security, vol. 10, pp. 133-141, 2010.
R. Li, Y. Zhao, Q. Xu and X. Qi. “Research of Subnetting Based on Huffman Coding”. In International Conference on Cloud Computing and Security, 2018, pp. 606-616.
O. Yue-Long, L.N. Zhang and N. Yu. “Researching on MD5’s characteristics based on software reversing”. The Journal of China Universities of Posts and Telecommunications, vol. 17, pp. 127-130, 2010.
I. C. Lin and L. C. Yang. “A Noise Generation Scheme Based on Huffman Coding for Preserving Privacy”. In International Conference on Security with Intelligent Computing and Big-data Services, 2017, pp. 149-160.
R. Patel, V. Kumar, V. Tyagi and V. Asthana. “A Fast and Improved Image Compression Technique Using Huffman Coding”. In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 2283-2286.
S. H. Kim, J. Jeong and J. Lee. “Selective memory deduplication for cost efficiency in mobile smart devices”. IEEE Transactions on Consumer Electronics, vol. 60, pp. 276-284, 2014.
Y. Tian, K. Zhang, P. Wang, Y. Zhang and J. Yang. Add “Salt” MD5 algorithm’s FPGA implementation. Procedia Computer Science, vol. 131, pp. 255-260, 2018.
D. Pamula and A. Ziebinski. “Hardware Implementation of the MD5 Algorithm”. 9th IFAC Workshop on Programmable Devices and Embedded Systems, Roznov pod Radhostem, Czech Republic, Feb. 2009.
Copyright (c) 2019 Ammar Asaad, Ali Adil Yassin Alamri

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).