Fig. 3From: Application of chaotic encryption algorithm based on variable parameters in RFID securityBifurcation diagram of segmented Logistic mappingBack to article page