Research Article

Mimic Encryption Box for Network Multimedia Data Security

Figure 9

Key generation process.