Fig. 1From: Speech encryption using chaotic shift keying for secured speech communicationFlowchart of encryption methodBack to article page