Research Article

Mimic Encryption Box for Network Multimedia Data Security

Figure 18

Comparison of the file encryption and decryption transmission performance between the CPU and the mimic encryption box.