Fig. 7From: Speech encryption using chaotic shift keying for secured speech communicationHistogram of reconstructed parameters L 0, L 1, L 2, and L 3 Back to article page