To see the other types of publications on this topic, follow the link: Hash Map.

Journal articles on the topic 'Hash Map'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hash Map.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Laborde, Pierre, Steven Feldman, and Damian Dechev. "A Wait-Free Hash Map." International Journal of Parallel Programming 45, no. 3 (2015): 421–48. http://dx.doi.org/10.1007/s10766-015-0376-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Колесніков, В. A. "VISUALIZATION OF HASH MAP DATA STRUCTURE." Visnyk of Zaporizhzhya National University Physical and Mathematical Sciences, no. 1 (May 30, 2024): 66–74. http://dx.doi.org/10.26661/2786-6254-2024-1-08.

Full text
Abstract:
In today’s data-centric world, understanding the intricate relationships within complex data structures is essential for making informed decisions and deriving meaningful insights. This article delves into the development of an application tailored for visualizing hash map data structures. Hash maps, a fundamental data structure in computer science, are widely used for efficient data storage and retrieval. However, comprehending the internal workings of hash maps can be challenging due to their dynamic nature and underlying complexities. The application discussed in this article offers a solut
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Gangyi, Jian Li, and Xinguo Wei. "Star Identification Based on Hash Map." IEEE Sensors Journal 18, no. 4 (2018): 1591–99. http://dx.doi.org/10.1109/jsen.2017.2772272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yu-Jie Liu, Yu-Jie Liu, Jian-Dong Liu Yu-Jie Liu, Ming Zhong Jian-Dong Liu, Bo Li Ming Zhong, and Hao-Qiang Xu Bo Li. "Design and Analysis of Hash Function Based on Two-dimensional Integer Chaotic Map." 電腦學刊 33, no. 3 (2022): 085–97. http://dx.doi.org/10.53106/199115992022063303007.

Full text
Abstract:
<p>Combining two-dimensional coupled map lattice and dynamic integer tent map, a hash function construction scheme with variable length output is proposed. The dynamic integer tent map is used as the nonlinear function of two-dimensional coupled map lattice, and dynamic parameters are added to the two-dimensional coupled map lattice, the bit logic decision function of the dynamic integer tent map is used to control the change of the dynamic parameters. At the same time, the dynamic parameters are evolved by the cyclic displacement mode, which enhances the correlation between the plaintex
APA, Harvard, Vancouver, ISO, and other styles
5

Rani, P. Jhansi, and S. Durga Bhavani. "Keyed hash function using Bernoulli shift map." International Journal of Information and Computer Security 9, no. 3 (2017): 250. http://dx.doi.org/10.1504/ijics.2017.085141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhavani, S. Durga, and P. Jhansi Rani. "Keyed hash function using Bernoulli shift map." International Journal of Information and Computer Security 9, no. 3 (2017): 250. http://dx.doi.org/10.1504/ijics.2017.10005909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Shihong, and Gang Hu. "Hash function based on chaotic map lattices." Chaos: An Interdisciplinary Journal of Nonlinear Science 17, no. 2 (2007): 023119. http://dx.doi.org/10.1063/1.2735812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shan, Xue, Pingping Liu, Guixia Gou, Qiuzhan Zhou, and Zhen Wang. "Deep Hash Remote Sensing Image Retrieval with Hard Probability Sampling." Remote Sensing 12, no. 17 (2020): 2789. http://dx.doi.org/10.3390/rs12172789.

Full text
Abstract:
As satellite observation technology improves, the number of remote sensing images significantly and rapidly increases. Therefore, a growing number of studies are focusing on remote sensing image retrieval. However, having a large number of remote sensing images considerably slows the retrieval time and takes up a great deal of memory space. The hash method is being increasingly used for rapid image retrieval because of its remarkably fast performance. At the same time, selecting samples that contain more information and greater stability to train the network has gradually become the key to imp
APA, Harvard, Vancouver, ISO, and other styles
9

Qi, Mingrui, and Dongdong Wang. "Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map." Mathematics 13, no. 11 (2025): 1890. https://doi.org/10.3390/math13111890.

Full text
Abstract:
For image data, the processing of each pixel using a cryptographic hash function is linear, and the existing cryptographic hash function lacks parallel processing of image width and height. In order to improve the computational efficiency and ensure the security of the hash function in image cryptography, we design a 2D hyperchaotic map, whose good chaotic dynamics and randomness fully meet the needs of the hash function. Based on the proposed mapping, we propose an image-specific chaotic hash function for confusion diffusion and extraction in both width and height dimensions in parallel. The
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Zhuo, Yong Wang, Gongkun Jiang, and Leo Yu Zhang. "Design and Analysis on a Parallel Chaos-Based Hash Function." International Journal of Bifurcation and Chaos 30, no. 13 (2020): 2050188. http://dx.doi.org/10.1142/s0218127420501886.

Full text
Abstract:
The inherent random-like behavior and one-way property of iteration in chaotic systems provide a good basis for designing Hash function. In the era of big data, due to the increasing data capacity in applications, fast Hash functions with parallel mode are highly desirable when authenticating data integrity. We analyze the issue of how to parallelize Hash function with iterative structure. Some security requirements on parallel Hash function are presented. In addition, using chaotic map and block cipher, we construct a keyed parallel Hash function. The message blocks are firstly processed in p
APA, Harvard, Vancouver, ISO, and other styles
11

Fan, Zheng, Tian Xiao-Jian, Li Xue-Yan, and Wu Bin. "Hash function based on the generalized Henon map." Chinese Physics B 17, no. 5 (2008): 1685–90. http://dx.doi.org/10.1088/1674-1056/17/5/025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kanso, A., H. Yahyaoui, and M. Almulla. "Keyed hash function based on a chaotic map." Information Sciences 186, no. 1 (2012): 249–64. http://dx.doi.org/10.1016/j.ins.2011.09.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Akhavan, A., A. Samsudin, and A. Akhshani. "Hash function based on piecewise nonlinear chaotic map." Chaos, Solitons & Fractals 42, no. 2 (2009): 1046–53. http://dx.doi.org/10.1016/j.chaos.2009.02.044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shan, Xue, Pingping Liu, Yifan Wang, Qiuzhan Zhou, and Zhen Wang. "Deep Hashing Using Proxy Loss on Remote Sensing Image Retrieval." Remote Sensing 13, no. 15 (2021): 2924. http://dx.doi.org/10.3390/rs13152924.

Full text
Abstract:
With the improvement of various space-satellite shooting methods, the sources, scenes, and quantities of remote sensing data are also increasing. An effective and fast remote sensing image retrieval method is necessary, and many researchers have conducted a lot of work in this direction. Nevertheless, a fast retrieval method called hashing retrieval is proposed to improve retrieval speed, while maintaining retrieval accuracy and greatly reducing memory space consumption. At the same time, proxy-based metric learning losses can reduce convergence time. Naturally, we present a proxy-based hash r
APA, Harvard, Vancouver, ISO, and other styles
15

Wei, Peng Cheng, and Jun Jian Huang. "Using Segment Number Parameter of Piecewise Linear Chaotic Map Construct Novel Hash Scheme." Materials Science Forum 694 (July 2011): 479–84. http://dx.doi.org/10.4028/www.scientific.net/msf.694.479.

Full text
Abstract:
A novel keyed Hash function is presented based on the dynamic S-boxes. The proposed approach can give a chaotic Hash value by means of the lookup table of functions and chaotic dynamic S-box. Compared with the existing chaotic Hash functions, this method improves computational performance of Hash system by using the chaotic S-box substitution. Theoretical and experimental results show that the proposed method has not only strong one way property, sensitivity to initial conditions and chaotic system’s parameters, but also high speed.
APA, Harvard, Vancouver, ISO, and other styles
16

Oliveira, Manuelle R. T., Marcos T. Melo, Ignacio Llamas‐Garro, and Alfredo G. Neto. "Reconfigurable cross dipole: hash frequency selective surface." IET Microwaves, Antennas & Propagation 12, no. 2 (2018): 224–29. http://dx.doi.org/10.1049/iet-map.2017.0544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Hongjun, Abdurahman Kadir, Chao Ma, and Chengbo Xu. "Constructing Keyed Hash Algorithm Using Enhanced Chaotic Map with Varying Parameter." Mathematical Problems in Engineering 2020 (July 20, 2020): 1–10. http://dx.doi.org/10.1155/2020/4071721.

Full text
Abstract:
A keyed hash algorithm is proposed based on 1-D enhanced quadratic map (EQM) with varying parameter. Three measures, including assigning unique one-time keys, key expansion, and hash length extension, are taken to enhance its security. First, the message is transformed into a parameter sequence for the EQM to be absorbed, and then the extended keys are generated as the initial values of the EQM. Finally, the EQM is iterated with redundant loops to transform the variable values into a hash value. The algorithm is so flexible that it can generate hash value with different lengths of 256, 512, 10
APA, Harvard, Vancouver, ISO, and other styles
18

Ma, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen, and Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning." Entropy 21, no. 5 (2019): 449. http://dx.doi.org/10.3390/e21050449.

Full text
Abstract:
Person re-identification in the image processing domain has been a challenging research topic due to the influence of pedestrian posture, background, lighting, and other factors. In this paper, the method of harsh learning is applied in person re-identification, and we propose a person re-identification method based on deep hash learning. By improving the conventional method, the method proposed in this paper uses an easy-to-optimize shallow convolutional neural network to learn the inherent implicit relationship of the image and then extracts the deep features of the image. Then, a hash layer
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Dan. "Recognition and Error Correction Techniques for Piano Playing Music Based on Convolutional Cyclic Hashing Method." Wireless Communications and Mobile Computing 2022 (April 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/5660961.

Full text
Abstract:
Music as a sound symbol can express what people think; music is both a form of social behavior and can promote people’s emotional communication; music is also a form of entertainment and can enrich people’s spiritual life. In this paper, we propose a new convolutional recurrent hashing method CRNNH, which uses multilayer RNN to learn to discriminate piano playing music using convolutional feature map sequences. Firstly, a convolutional feature map sequence learning preserving similarity hash function is designed consisting of multilayer convolutional feature maps extracted from multiple convol
APA, Harvard, Vancouver, ISO, and other styles
20

Zhen, Ping, Geng Zhao, Lequan Min, and Xiaodong Li. "Novel Hash Function Based on Coupled Chaotic Map Lattices." Chinese Journal of Electronics 23, no. 4 (2014): 836–41. https://doi.org/10.23919/cje.2014.10851995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Wang, Yong, Kwok-Wo Wong, and Di Xiao. "Parallel hash function construction based on coupled map lattices." Communications in Nonlinear Science and Numerical Simulation 16, no. 7 (2011): 2810–21. http://dx.doi.org/10.1016/j.cnsns.2010.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

KWOK, H. S., and WALLACE K. S. TANG. "A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION." International Journal of Bifurcation and Chaos 15, no. 12 (2005): 4043–50. http://dx.doi.org/10.1142/s0218127405014489.

Full text
Abstract:
In this paper, a chaos-based cryptographic hash function is proposed for message authentication where a fixed length message digest can be generated from any messages with arbitrary length. The compression function in-use is developed according to the diffusion and confusion properties of a novel high-dimensional discrete chaotic map. A symmetric key structure can also be easily embedded based on the high sensitivity to initial conditions and system parameters of the map. As demonstrated in experiments, the throughput of the proposed scheme is about 1.5 times of that with MD5, and the hash val
APA, Harvard, Vancouver, ISO, and other styles
23

El-Meligy, Nada E., Tamer O. Diab, Ashraf S. Mohra, Ashraf Y. Hassan, and Wageda I. El-Sobky. "A Novel Dynamic Mathematical Model Applied in Hash Function Based on DNA Algorithm and Chaotic Maps." Mathematics 10, no. 8 (2022): 1333. http://dx.doi.org/10.3390/math10081333.

Full text
Abstract:
This paper aims to improve SHA-512 security without increasing complexity; therefore, we focused on hash functions depending on DNA sequences and chaotic maps. After analysis of 45 various chaotic map types, only 5 types are selected in this proposal—namely, improved logistic, cosine logistic map, logistic sine system, tent sine system, and hybrid. Using DNA features and binary coding technology with complementary rules to hide information is a key challenge. This article proposes improving SHA-512 in two aspects: the modification of original hash buffer values, and the modification of additiv
APA, Harvard, Vancouver, ISO, and other styles
24

Lv, Yin, Xuanrui Zhang, and Yong Wang. "Saliency Detection via Fusing Color Contrast and Hash Fingerprint." Journal of Electrical and Computer Engineering 2022 (September 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/9476111.

Full text
Abstract:
Saliency detection is a technique for automatically extracting regions of interest from the background and has been widely used in the computer vision field. This study proposes a simple and effective saliency detection method combining color contrast and hash fingerprint. In our solution, the input image is segmented into nonoverlapping superpixels, so as to perform the saliency detection at the region level to reduce computational complexity. A background optimization selection is used to construct an accurate background template. Based on this, a saliency map that highlights the whole salie
APA, Harvard, Vancouver, ISO, and other styles
25

Qin, Ke, and B. John Oommen. "On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/468567.

Full text
Abstract:
This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it i
APA, Harvard, Vancouver, ISO, and other styles
26

Rahardja, Untung, Achmad Nizar Hidayanto, Ninda Lutfiani, Dyah Ayu Febiani, and Qurotul Aini. "Immutability of Distributed Hash Model on Blockchain Node Storage." Scientific Journal of Informatics 8, no. 1 (2021): 137–43. http://dx.doi.org/10.15294/sji.v8i1.29444.

Full text
Abstract:
The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the distributed hash model for immutable blockchain node storageThe methodology used in the preparation of this research is mind mapping and literature review, namely the collection of scientific journals, articles and ebooks. Storage of nodes on the blockchain using a distributed hash model. The distributed hash model only stores a portion of the block data
APA, Harvard, Vancouver, ISO, and other styles
27

Yang, Huaqian, Kwok-Wo Wong, Xiaofeng Liao, Yong Wang, and Degang Yang. "One-way hash function construction based on chaotic map network." Chaos, Solitons & Fractals 41, no. 5 (2009): 2566–74. http://dx.doi.org/10.1016/j.chaos.2008.09.056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jabbar, Amira K., Ashwaq T. Hashim, and Qusay F. Al-Doori. "Secured Medical Image Hashing Based on Frequency Domain with Chaotic Map." Engineering and Technology Journal 39, no. 5A (2021): 711–22. http://dx.doi.org/10.30684/etj.v39i5a.1786.

Full text
Abstract:
Recently, online-medicine got increased global interest, particularly during COVID19 pandemic. Data protection is important in the medical field since when promoting telemedicine applications, it is necessary to protect the patient data and personal information. A secured process is needed to transmit medical images over the Internet. In this paper hash algorithm is employed to protect the data by using powerful features from the coupled frequency domains of the Slantlet Transformation (SLT) and the Discrete Cosine Transform (DCT). The Region of Interest (ROI) is localized from an MRI image th
APA, Harvard, Vancouver, ISO, and other styles
29

ZHDANOV, D. D., A. I. LYSYKH, R. R. KHALIMOV, I. E. KINEV, and A. D. ZHDANOV. "USING MULTILEVEL HASH TABLES TO SPEED UP RENDERING." Программирование, no. 3 (May 1, 2023): 37–48. http://dx.doi.org/10.31857/s013234742303007x.

Full text
Abstract:
In this paper, we analyze realistic rendering methods in terms of their efficiency in calculating caustic and indirect illumination. As the basic approach to realistic rendering, we choose bidirectional progressive ray tracing with backward photon maps. The main factors that reduce the efficiency of this method are analyzed. It is shown that the main factor that affects its performance is slow access to photon map data. Different techniques for construction of spatial acceleration structures are considered, their advantages and disadvantages are investigated. As the main approaches, we select
APA, Harvard, Vancouver, ISO, and other styles
30

Cao, Xinle, Weiqi Feng, Jian Liu, et al. "Towards Practical Oblivious Map." Proceedings of the VLDB Endowment 18, no. 3 (2024): 688–701. https://doi.org/10.14778/3712221.3712235.

Full text
Abstract:
Oblivious map (OMAP) is an important component in encrypted databases, utilized to prevent the server inferring sensitive information about client's encrypted databases based on access patterns. Despite its widespread usage and importance, existing OMAP solutions face practical challenges, including the need for a large number of interaction rounds between the client and server, as well as substantial communication bandwidth. For example, the SOTA protocol OMIX++ in VLDB 2024 still requires O (log n ) interaction rounds and O (log 2 n ) communication bandwidth per access, where n denotes the t
APA, Harvard, Vancouver, ISO, and other styles
31

Chen, Yaxiong, and Xiaoqiang Lu. "A Deep Hashing Technique for Remote Sensing Image-Sound Retrieval." Remote Sensing 12, no. 1 (2019): 84. http://dx.doi.org/10.3390/rs12010084.

Full text
Abstract:
With the rapid progress of remote sensing (RS) observation technologies, cross-modal RS image-sound retrieval has attracted some attention in recent years. However, these methods perform cross-modal image-sound retrieval by leveraging high-dimensional real-valued features, which can require more storage than low-dimensional binary features (i.e., hash codes). Moreover, these methods cannot directly encode relative semantic similarity relationships. To tackle these issues, we propose a new, deep, cross-modal RS image-sound hashing approach, called deep triplet-based hashing (DTBH), to integrate
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Wei, Xiaojing Yao, and Jing Chen. "A Map Tile Data Access Model Based on the Jump Consistent Hash Algorithm." ISPRS International Journal of Geo-Information 11, no. 12 (2022): 608. http://dx.doi.org/10.3390/ijgi11120608.

Full text
Abstract:
Tiled maps are one of the key GIS technologies used in the development and construction of WebGIS in the era of big data; there is an urgent need for high-performance tile map services hosted on big data GIS platforms. To address the current inefficiency of massive tile map data management and access, this paper proposes a massive tile map data access model that utilizes the jump consistent hash algorithm. Via the uniformity and consistency of a certain seed of a pseudo-random function, the algorithm can generate a storage slot for each tile data efficiently. By recording the slot information
APA, Harvard, Vancouver, ISO, and other styles
33

Ma, Tingchen, Lingxin Kong, Yongsheng Ou, and Sheng Xu. "Accurate 3D LiDAR SLAM System Based on Hash Multi-Scale Map and Bidirectional Matching Algorithm." Sensors 24, no. 12 (2024): 4011. http://dx.doi.org/10.3390/s24124011.

Full text
Abstract:
Simultaneous localization and mapping (SLAM) is a hot research area that is widely required in many robotics applications. In SLAM technology, it is essential to explore an accurate and efficient map model to represent the environment and develop the corresponding data association methods needed to achieve reliable matching from measurements to maps. These two key elements impact the working stability of the SLAM system, especially in complex scenarios. However, previous literature has not fully addressed the problems of efficient mapping and accurate data association. In this article, we prop
APA, Harvard, Vancouver, ISO, and other styles
34

Setiadi, De Rosal Ignatius Moses, and Nova Rijati. "An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations." Computation 11, no. 9 (2023): 178. http://dx.doi.org/10.3390/computation11090178.

Full text
Abstract:
Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic methods are the 2D Logistic-adjusted-Sine map (2D-LASM), the 2D Logistic-sine-coupling map (2D-LSCM), and the 2D Logistic ICMIC cascade map (2D-LICM). The encryption method’s design consists of six stages of encryption, involving permutation operations based on chaotic order, substitution based on modulus and bitXOR, and hash functions. Hash functions a
APA, Harvard, Vancouver, ISO, and other styles
35

Zou, Li, Baozhen Ge, and Lei Chen. "Range image registration based on hash map and moth-flame optimization." Journal of Electronic Imaging 27, no. 02 (2018): 1. http://dx.doi.org/10.1117/1.jei.27.2.023015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Yong, Xiaofeng Liao, Di Xiao, and Kwok-Wo Wong. "One-way hash function construction based on 2D coupled map lattices." Information Sciences 178, no. 5 (2008): 1391–406. http://dx.doi.org/10.1016/j.ins.2007.10.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Mengyuan, and Wenchao Hu. "Research on BatSLAM Algorithm for UAV Based on Audio Perceptual Hash Closed-Loop Detection." International Journal of Pattern Recognition and Artificial Intelligence 33, no. 01 (2018): 1959002. http://dx.doi.org/10.1142/s021800141959002x.

Full text
Abstract:
This research is aimed at the optimization of a two-dimensional (2D) empirical graph under a certain height and dark conditions for a UAV, using the bionic sonar system to replace the visual sensor’s BatSLAM mode and audio perceptual hash closed-loop detection. The BatSLAM model uses Sum of Absolute Difference (SAD) image processing methods to update the bionic sonar template. This method only judges whether the appearance of the two cochlear images is consistent and does not have geometric processing and feature extraction. Because the cochlear images produce various noises during the acquisi
APA, Harvard, Vancouver, ISO, and other styles
38

Nkouankou, Aboubakar, Fotso Clarice, Wadoufey Abel, and René Ndoundam. "Pre-image attack of the MD5 hash function by proportional logic." International Journal of Research and Innovation in Applied Science 07, no. 08 (2022): 20–25. http://dx.doi.org/10.51584/ijrias.2022.7802.

Full text
Abstract:
Hash functions are important cryptographic primitives that map arbitrary length messages to fixed length message summaries such that: it is easy to compute the digest given a message, while invert the hash process (for example, finding a message that maps a summary of a specific message) is difficult. An attack against a hash function is an algorithm that nevertheless manages to invert the hash process. Hash functions are used in authentication, digital signature, and key exchange systems. The most widely used hash function in many applications is the Message Digest-5 (MD5) algorithm. In this
APA, Harvard, Vancouver, ISO, and other styles
39

Ismael Abdul Sattar Jabbar, Hassan Kassim Albahadilyr, and Alaa A. Jabbar Altaay. "Design and Implementation Digital Invitation System Based on Secure Hash Algorithm 3." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 05 (2023): 105–16. http://dx.doi.org/10.3991/ijoe.v19i05.37583.

Full text
Abstract:
Digital invitation system become one of the important systems due to the pandemic consequences specially in E-learning domains. The digital invitation needed to be secure enough for several reasons specially in the user demands. In this paper designed and implemented a digital invitation system based on secure hash algorithm which achieving multilevel of security. The first security level, that is the hash code generated for the digital invitation link used in the encryption process not only for the invitation date but also for the invitation time. on the other hand, the second security level
APA, Harvard, Vancouver, ISO, and other styles
40

Fang, Xuan, Cai Qiong, and Lan Fang. "A Hash Algorithm Construction Based on Generalized Chaotic Maps." Applied Mechanics and Materials 325-326 (June 2013): 1502–7. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1502.

Full text
Abstract:
Due to the single chaotic map on finite precisions chaotic characteristics emerge degradation,the length of cycle become shorter, the Hash algorithm constructed by it is easily forecast, the security is not strong.In this paper, the nonlinear devices in the traditional block cipher S-box is used to construct variable parameters Hash algorithm composed of multiple chaotic maps. By using the original message, intermediate values of iteration and number of iterations as the input of the S-box, output of S-box is used to determine the parameters of chaotic maps, on this account to change the chaot
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Yong, Shucui Xie, and Jianzhong Zhang. "A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map." Entropy 24, no. 2 (2022): 287. http://dx.doi.org/10.3390/e24020287.

Full text
Abstract:
A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensional Henon map. The improved Henon map is called 2D-ICHM, and its chaotic performance is analyzed. Compared with some existing chaotic maps, 2D-ICHM has larger parameter space, continuous chaotic range, and more complex dynamic behavior. Second, an image encryption structure based on diffusion–scrambling–diffusion and spatial domain–frequency domai
APA, Harvard, Vancouver, ISO, and other styles
42

Dong, Chang’e. "Asymmetric color image encryption scheme using discrete-time map and hash value." Optik 126, no. 20 (2015): 2571–75. http://dx.doi.org/10.1016/j.ijleo.2015.06.035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Da, Gang Hu, and Shihong Wang. "A keyed hash function based on the modified coupled chaotic map lattice." Communications in Nonlinear Science and Numerical Simulation 17, no. 6 (2012): 2579–87. http://dx.doi.org/10.1016/j.cnsns.2011.10.030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Liu, Pingping, Zetong Liu, Xue Shan, and Qiuzhan Zhou. "Deep Hash Remote-Sensing Image Retrieval Assisted by Semantic Cues." Remote Sensing 14, no. 24 (2022): 6358. http://dx.doi.org/10.3390/rs14246358.

Full text
Abstract:
With the significant and rapid growth in the number of remote-sensing images, deep hash methods have become a research topic. The main work of deep hash method is to build a discriminate embedding space through the similarity relation between sample pairs and then map the feature vector into Hamming space for hashing retrieval. We demonstrate that adding a binary classification label as a kind of semantic cue could further improve the retrieval performance. In this work, we propose a new method, which we called deep hashing, based on classification label (DHCL). First, we propose a network arc
APA, Harvard, Vancouver, ISO, and other styles
45

Sharma, Dr Sanjay. "Crowd Funding Android App Using Block Chain." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45072.

Full text
Abstract:
This Crowdfunding has emerged as a vital financial support system for students in need of educational funding. However, traditional crowdfunding platforms suffer from lack of transparency, security concerns, and high transaction fees, which reduce donor confidence. To address these issues, this project proposes a Blockchain-Based Crowdfunding Platform that leverages SHA-256 hashing with a Hash Map-based blockchain to ensure tamper-proof, transparent, and decentralized transactions. The platform is implemented as an Android application integrated with Firebase for real-time data management. Stu
APA, Harvard, Vancouver, ISO, and other styles
46

Mohamed, Marwa Hussien, Mohamed Helmy Khafagy, and Mohamed Hasan Ibrahim. "Hash Semi Join Map Reduce to Join Billion Records in a Reasonable Time." Indian Journal of Science and Technology 11, no. 18 (2018): 1–9. http://dx.doi.org/10.17485/ijst/2018/v11i18/119112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

XIAO, D., X. LIAO, and S. DENG. "One-way Hash function construction based on the chaotic map with changeable-parameter." Chaos, Solitons & Fractals 24, no. 1 (2005): 65–71. http://dx.doi.org/10.1016/s0960-0779(04)00456-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Li, Yantao. "Collision analysis and improvement of a hash function based on chaotic tent map." Optik 127, no. 10 (2016): 4484–89. http://dx.doi.org/10.1016/j.ijleo.2016.01.176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Shihong, and Gang Hu. "Coupled map lattice based hash function with collision resistance in single-iteration computation." Information Sciences 195 (July 2012): 266–76. http://dx.doi.org/10.1016/j.ins.2012.01.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Wang Ji-Zhi, Wang Mei-Qin, and Wang Ying-Long. "The collision of one keyed Hash function based on chaotic map and analysis." Acta Physica Sinica 57, no. 5 (2008): 2737. http://dx.doi.org/10.7498/aps.57.2737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!