Applications of Injective Functions in Data Integrity, Cryptographic Security, and Signal Processing