Skip to main content

Table 3 Parameter selection under different scenarios in Fig. 5

From: Secure spatial modulation based on two-dimensional generalized weighted fractional Fourier transform encryption

Figure

\((\phi _0,\phi _1)\)

\((\overline{\phi} _0,\overline{\phi} _1)\)

\(\mu\)

(a)

\((\pi /4,3\pi /4)\)

\((3\pi /4,\pi /4)\)

\(5^2=25\)

(b)

\((\pi /6,\pi /4)\)

\((\pi /4,\pi /3)\)

\(6^2=36\)

(c)

\((\pi /5,\pi /2)\)

\((\pi /6,2\pi /3)\)

\(7^2=49\)

(d)

\((\pi /5,\pi /4)\)

\((\pi /5,\pi /3)\)

\(8^2=64\)

(e)

\((0,\pi /6)\)

\((\pi /6,2\pi /3)\)

\(9^2=81\)

(f)

\((\pi /5,2\pi /3)\)

\((\pi /6,\pi /4)\)

\(10^2=100\)

(g)

\((\pi /4,0)\)

\((3\pi /4,0)\)

\(11^2=121\)

(h)

\((\pi /6,\pi /3)\)

\((\pi /6,\pi /3)\)

\(12^2=144\)

(i)

\((\pi /5,\pi /2)\)

\((\pi /5,0)\)

\(13^2=169\)

(j)

\((\pi /5,\pi /3)\)

\((\pi /3,\pi /2)\)

\(14^2=196\)

(k)

\((0,\pi /3)\)

\((\pi /6,0)\)

\(15^2=225\)

(l)

\((\pi /4,\pi /3)\)

\((\pi /4,0)\)

\(16^2=256\)