Fig. 2From: Speech encryption using chaotic shift keying for secured speech communicationBlock diagram of encryption methodBack to article page