Research Article

Mimic Encryption Box for Network Multimedia Data Security

Figure 2

Comparison of normal and encrypted packet formats.