Research Article

Mimic Encryption Box for Network Multimedia Data Security

Figure 5

Full-pipeline architecture of the hash algorithm.