Chaos-based hash function with both modification detection and localization capabilities

Di Xiao, Frank Y. Shih, Xiaofeng Liao

Research output: Chapter in Book/Report/Conference proceedingChapter


As one of the cores of Cryptography, hashing is a basic technique for information security (Schneier, 1996; Stinson, 1995). A cryptographic hash function is used to compress the message data to a fixed-size hash value in such a way that any alternation to the data will generate a different hash value. Chaos is a kind of deterministic random-like process provided by nonlinear dynamic systems. Chaotic systems are systems that are random-like, but in fact are not random. They are governed by physical laws to make the accurate prediction almost impossible. It is a promising direction to utilize the characteristics of chaos to design hash function.

Original languageEnglish (US)
Title of host publicationMultimedia Security
Subtitle of host publicationWatermarking, Steganography, and Forensics
PublisherCRC Press
Number of pages13
ISBN (Electronic)9781439873328
ISBN (Print)9781439873311
StatePublished - Jan 1 2017

All Science Journal Classification (ASJC) codes

  • General Computer Science
  • General Engineering


Dive into the research topics of 'Chaos-based hash function with both modification detection and localization capabilities'. Together they form a unique fingerprint.

Cite this