Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
by
Li, Yantao
, Ge, Guangfu
in
Communication
/ Computing time
/ Cryptography
/ Diffusion rate
/ Digital signatures
/ Hash based algorithms
/ Lattices
/ Multimedia
/ Multimedia communications
/ Parameters
/ Performance evaluation
2019
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
by
Li, Yantao
, Ge, Guangfu
in
Communication
/ Computing time
/ Cryptography
/ Diffusion rate
/ Digital signatures
/ Hash based algorithms
/ Lattices
/ Multimedia
/ Multimedia communications
/ Parameters
/ Performance evaluation
2019
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
by
Li, Yantao
, Ge, Guangfu
in
Communication
/ Computing time
/ Cryptography
/ Diffusion rate
/ Digital signatures
/ Hash based algorithms
/ Lattices
/ Multimedia
/ Multimedia communications
/ Parameters
/ Performance evaluation
2019
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
Journal Article
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
2019
Request Book From Autostore
and Choose the Collection Method
Overview
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash values), which can be used in a wide range of multimedia applications for communication security, such as integrity protection, message authentication and digital signature. In this paper, we present a cryptographic and parallel chaotic hash function based on the cross coupled map lattices for multimedia communication security. More specifically, we first utilize the piecewise linear chaotic map with secret keys to generate initial parameter sequence for the cross coupled map lattices and an initial hash value. Then, we extend the original message into a message matrix to enhance the correlation of message characters. Next, we process each of the message blocks in the matrix in parallel as the space domain input of the cross coupled map lattices and the initial parameters as the time domain input to generate intermediate hash values. After all message blocks are processed in parallel, the final h-bit hash value is obtained by logical operations with the initial and intermediate hash values. Finally, we evaluate the performance of the proposed hash function in terms of uniform distribution of hash values, sensitivity of the hash value to subtle changes of the original message, secret keys, and images, confusion and diffusion properties, collision tests, efficiency of computation speed. The cryptanalytic results demonstrate that the proposed hash algorithm has statistical properties with B̄=64.0022\\(\\bar {B} = 64.0022\\) and P = 50.0017%, collision resistance with d = 85.3944, average computation speed of 132.0 Mbps, and better statistical performance compared with existing chaotic hash functions, which are suitable for multimedia communication security.
Publisher
Springer Nature B.V
This website uses cookies to ensure you get the best experience on our website.