Research Article

WFRFT Secure Communication Method Based on Chaotic Parameter Pool

Figure 7

The detection probability results with the change of . (a) N = 2. (b) N = 3. (c) N = 6. (d) N = 12.
(a)
(b)
(c)
(d)