Research Article

Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

Figure 6

The number of secret key bits we can distill from each source message bit versus Eve’s BER.