Fig. 2From: Application of chaotic encryption algorithm based on variable parameters in RFID securityIterative distribution graph with the control parameter 3.9Back to article page