Research Article

WFRFT Secure Communication Method Based on Chaotic Parameter Pool

Figure 8

The processing time results with the change of L. (a) The scanning method. (b) The CPP method.
(a)
(b)