pHash is an implementation of various perceptual Hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
program which uses Hashing techniques for storing and retrieving the data.
Input to the program: Some random numbers. Input will be from a file.
Output: First the program reads all the input and store it properly using some hash techniques.
Once your program reads the complete input,it waits for the user input (prompt to the user).
User now enters some number.program displays if this number exists in the list or not.
it also display the time taken in the search operation.
This standard describes a keyed-hash message authentication code (HMAC), a
mechanism for message authentication using cryptographic hash functions. HMAC can
be used with any iterative Approved cryptographic hash function, in combination with a
shared secret key. The cryptographic strength of HMAC depends on the properties of the
underlying hash function. The HMAC specification in this standard is a generalization of
Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI
X9.71, Keyed Hash Message Authentication Code.