Fig. 5From: On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystreamThe success probability of legitimate recipient and adversary for a given K Back to article page