Research Article

Mimic Encryption Box for Network Multimedia Data Security

Figure 17

Throughput of each encryption algorithm.