Research Article

Protecting Private Data by Honey Encryption

Figure 5

Performance in application with a nonuniform distributed message space.