Fig. 4From: On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystreamThe success probability of legitimate recipient and adversary for a given M Back to article page