Yongwen Fan, Weijun Zhu, ShaoHuan Ban, Junfeng Wang
{"title":"一种基于模拟防御的图像加密新方法","authors":"Yongwen Fan, Weijun Zhu, ShaoHuan Ban, Junfeng Wang","doi":"10.1109/ICCCAS.2018.8768938","DOIUrl":null,"url":null,"abstract":"Aiming at the security problem of traditional image encryption, this paper propose a mimic image encryption based on mimic defense try to improve the security of image encryption. Firstly, the encryption and decryption pools were built according to the working principle of mimic defense technology. Secondly, the redundancy execution bodies were dynamically scheduling through central controller. And the result of decryption were decided by consistency decision mechanism. The experimental results show that the new method can effectively improve the security of image encryption. And compared with traditional image encryption, the combination of consistency decision mechanism and dynamical scheduling make the new method more security.","PeriodicalId":166878,"journal":{"name":"2018 10th International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A New Method of Image Encryption Based on Mimic Defense\",\"authors\":\"Yongwen Fan, Weijun Zhu, ShaoHuan Ban, Junfeng Wang\",\"doi\":\"10.1109/ICCCAS.2018.8768938\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Aiming at the security problem of traditional image encryption, this paper propose a mimic image encryption based on mimic defense try to improve the security of image encryption. Firstly, the encryption and decryption pools were built according to the working principle of mimic defense technology. Secondly, the redundancy execution bodies were dynamically scheduling through central controller. And the result of decryption were decided by consistency decision mechanism. The experimental results show that the new method can effectively improve the security of image encryption. And compared with traditional image encryption, the combination of consistency decision mechanism and dynamical scheduling make the new method more security.\",\"PeriodicalId\":166878,\"journal\":{\"name\":\"2018 10th International Conference on Communications, Circuits and Systems (ICCCAS)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 10th International Conference on Communications, Circuits and Systems (ICCCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCAS.2018.8768938\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 10th International Conference on Communications, Circuits and Systems (ICCCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCAS.2018.8768938","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Method of Image Encryption Based on Mimic Defense
Aiming at the security problem of traditional image encryption, this paper propose a mimic image encryption based on mimic defense try to improve the security of image encryption. Firstly, the encryption and decryption pools were built according to the working principle of mimic defense technology. Secondly, the redundancy execution bodies were dynamically scheduling through central controller. And the result of decryption were decided by consistency decision mechanism. The experimental results show that the new method can effectively improve the security of image encryption. And compared with traditional image encryption, the combination of consistency decision mechanism and dynamical scheduling make the new method more security.