Research Article

Mimic Encryption Box for Network Multimedia Data Security

Figure 13

Memory read and write control optimization.