Fig. 2From: Pre-coded LDPC coding for physical layer securityExamples of an information puncturing and scrambling schemesBack to article page