Estimation flow of the leaked information
Fig. 1b
Result for task 1-b