Result for task 1-b

Estimation flow of the leaked information

Fig. 1bResult for task 1-b