Fig. 6From: Speech encryption using chaotic shift keying for secured speech communicationHistogram of permuted and substituted parameters L 0, L 1, L 2, and L 3 Back to article page