A New Scheme for Removing Duplicate Files from Smart Mobile Devices

Images as a Case Study

  • Ammar Asaad Department of Computer Science, Education College for Pure Science, University of Basrah, Basra, Iraq https://orcid.org/0000-0003-4285-9254
  • Ali Adil Yassin Alamri Department of Computer Science, Education College for Pure Science, University of Basrah, Basra, Iraq.
Keywords: Duplicating images, Hash code, Mobile device, Performance, Storage management

Abstract

The continuous development of the information technology and mobile communication world and the potentials available in the smart devices make these devices widely used in daily life. The mobile applications with the internet are distinguished simple, essay to use in any time/anywhere, communication between relatives and friends in different places in the world. The social application networks make these devices received several of the duplicate files daily which lead to many drawbacks such inefficient use of storage, low performance of CPU, RAM, and increasing consumption battery. In this paper, we present a good scheme to remove from the duplicate files, and we focus on image files as a common case in social apps. Our work overcomes on the above-mentioned issues and focuses to use hash function and Huffman code to build unique code for each image. Our experiments improve the performance from 1046770, 1995808 ns to 950000, and 1981154 ns in Galaxy and HUAWEI, respectively. In the storage side, the proposed scheme saves storage space from 1.9 GB, 1.24 GB to 2 GB, and 1.54 GB, respectively.

Downloads

Download data is not yet available.

References

C. R. Shyu, C. Brodley, A. Kak, A. Kosaka, A. Aisen and L. Broderick. “Local Versus Global Features for Content-based Image Retrieval”. In Proceedings. IEEE Workshop on ContentBased Access of Image and Video Libraries (Cat. No. 98EX173), 1998, pp. 30-34.

D. A. Lisin, M. A. Mattar, M. B. Blaschko, E. G. Learned-Miller and M. C. Benfield. “Combining Local and Global Image Features for Object Class Recognition”. In 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05)-Workshops, 2005, pp. 47-47.

M. Agarwal, A. Singhal and B. Lall. “3D local ternary co-occurrence patterns for natural, texture, face and bio medical image retrieval”. Neurocomputing, vol. 313, pp. 333-345, 2018.

S. S. Hwang and S. H. Hong. “Pre-extraction of features and environment variable-based database filtering for fast image matching on mobile”. Mobile and Wireless Technologies, vol. 2016, pp. 223-230, 2016.

J. Machajdik and A. Hanbury. “Affective Image Classification Using Features Inspired by Psychology and Art Theory”. In Proceedings of the 18th ACM International Conference on Multimedia, 2010, pp. 83-92.

N. Lee, C. Kim, W. Choi, M. Pyeon and Y. Kim. “Development of indoor localization system using a mobile data acquisition platform and BoW image matching”. KSCE Journal of Civil

Engineering, vol. 21, pp. 418-430, 2017.

L. Wang and H. Wang. “Improving feature matching strategies for efficient image retrieval”. Signal Processing: Image Communication, vol. 53, pp. 86-94, 2017.

K. Miller, F. Franz, M. Rittinghaus, M. Hillenbrand and F. Bellosa. “{XLH}: More Effective Memory Deduplication Scanners Through Cross-layer Hints”. In Presented as Part of the 2013 {USENIX} Annual Technical Conference ({USENIX}{ATC} 13), 2013, pp. 279-290.

T. Liu, F. Chen, Y. Ma and Y. Xie. “An energy-efficient task scheduling for mobile devices based on cloud assistant”. Future Generation Computer Systems, vol. 61, pp. 1-12, 2016.

R. N. Widodo, H. Lim and M. Atiquzzaman. “SDM: Smart deduplication for mobile cloud storage”. Future Generation Computer Systems, vol. 70, pp. 64-73, 2017.

E. Ahmed, A. Gani, M. Sookhak, S. H. Ab Hamid and F. Xia. “Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges”. Journal of Network and Computer Applications, vol. 52, pp. 52-68, 2015.

M. W. Storer, K. Greenan, D. D. Long and E. L. Miller. “Secure Data Deduplication”. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, 2008, pp. 1-10.

N. Haustein, C. A. Klein, U. Troppens and D. J. Winarski. “Method of and System for Adaptive Selection of a Deduplication Chunking Technique”. Google Patents, 2009.

B. Zhu, K. Li and R. H. Patterson. “Avoiding the Disk Bottleneck in the Data Domain Deduplication File System”. In Fast USENIX Conference, 2008, pp. 1-14.

D. Meister and A. Brinkmann. “Multi-level Comparison of Data Deduplication in a Backup Scenario”. In Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, 2009, p. 8.

Y. Won, R. Kim, J. Ban, J. Hur, S. Oh and J. Lee. “Prun: Eliminating Information Redundancy for Large Scale Data Backup System”. In 2008 International Conference on Computational Sciences and Its Applications, 2008, pp. 139-144.

M. Sharma. “Compression using huffman coding”. IJCSNS International Journal of Computer Science and Network Security, vol. 10, pp. 133-141, 2010.

R. Li, Y. Zhao, Q. Xu and X. Qi. “Research of Subnetting Based on Huffman Coding”. In International Conference on Cloud Computing and Security, 2018, pp. 606-616.

O. Yue-Long, L.N. Zhang and N. Yu. “Researching on MD5’s characteristics based on software reversing”. The Journal of China Universities of Posts and Telecommunications, vol. 17, pp. 127-130, 2010.

I. C. Lin and L. C. Yang. “A Noise Generation Scheme Based on Huffman Coding for Preserving Privacy”. In International Conference on Security with Intelligent Computing and Big-data Services, 2017, pp. 149-160.

R. Patel, V. Kumar, V. Tyagi and V. Asthana. “A Fast and Improved Image Compression Technique Using Huffman Coding”. In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 2283-2286.

S. H. Kim, J. Jeong and J. Lee. “Selective memory deduplication for cost efficiency in mobile smart devices”. IEEE Transactions on Consumer Electronics, vol. 60, pp. 276-284, 2014.

Y. Tian, K. Zhang, P. Wang, Y. Zhang and J. Yang. Add “Salt” MD5 algorithm’s FPGA implementation. Procedia Computer Science, vol. 131, pp. 255-260, 2018.

D. Pamula and A. Ziebinski. “Hardware Implementation of the MD5 Algorithm”. 9th IFAC Workshop on Programmable Devices and Embedded Systems, Roznov pod Radhostem, Czech Republic, Feb. 2009.

Published
2019-08-20
How to Cite
1.
Asaad A, Alamri A. A New Scheme for Removing Duplicate Files from Smart Mobile Devices. cuesj [Internet]. 20Aug.2019 [cited 25Apr.2024];3(2):5-3. Available from: https://journals.cihanuniversity.edu.iq/index.php/cuesj/article/view/104
Section
Research Article