Fig. 5From: Speech encryption using chaotic shift keying for secured speech communicationHistogram of splitted signals L 0, L 1, L 2, and L 3 Back to article page