Fig. 8From: Application of chaotic encryption algorithm based on variable parameters in RFID securityDistribution map of multiple groups of chaotic sequencesBack to article page