Chaos-based hash function with both modification detection and localization capabilities

Document Type

Syllabus

Publication Date

1-1-2017

Abstract

As one of the cores of Cryptography, hashing is a basic technique for information security (Schneier, 1996; Stinson, 1995). A cryptographic hash function is used to compress the message data to a fixed-size hash value in such a way that any alternation to the data will generate a different hash value. Chaos is a kind of deterministic random-like process provided by nonlinear dynamic systems. Chaotic systems are systems that are random-like, but in fact are not random. They are governed by physical laws to make the accurate prediction almost impossible. It is a promising direction to utilize the characteristics of chaos to design hash function.

Identifier

85052574167 (Scopus)

ISBN

[9781439873311, 9781439873328]

Publication Title

Multimedia Security Watermarking Steganography and Forensics

External Full Text Location

https://doi.org/10.1201/b12697

First Page

313

Last Page

325

This document is currently not available here.

Share

COinS