Fig. 6
From: Speech encryption using chaotic shift keying for secured speech communication

Histogram of permuted and substituted parameters L 0, L 1, L 2, and L 3
From: Speech encryption using chaotic shift keying for secured speech communication
Histogram of permuted and substituted parameters L 0, L 1, L 2, and L 3