Fig. 3From: Speech encryption using chaotic shift keying for secured speech communicationBlock diagram of decryption methodBack to article page