Research Article

Mimic Encryption Box for Network Multimedia Data Security

Figure 8

ECC algorithm overall architecture.