Return to Article Details Line based hash analysis of source code infringement Download Download PDF