Research Article

Mimic Encryption Box for Network Multimedia Data Security

Table 9

Comparison between this scheme and other schemes.

SchemeDynamicDiversityIntrusion detectionEncrypted transmissionVirtualizationHardware protectionDefensive effect

Aydeger et al. [9]Defend against crossfire attacks

Aydeger et al. [10]Resist crossfire attacks and provide network forensics

Wang et al. [12]Increase the scanning space

Zhao et al. [15]Defend against sniffer attack

Tang et al. [26]Provide dynamic encryption; resist both exhaustive and analysis attacks

Lin et al. [34]Detect the security of packets

Our systemProvide dynamic network and encryption and access control filtering; resist ciphertext-only and key exhaustion attacks