Research Article
On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm
Algorithm 1
Cracking CIEA-HCNN by using chosen-plaintext attack.
Input: | Output: Recover the plaintext image from the given ciphertext image | (1) | | (2) | According to equation (11), | (3) | | (4) | According to equation (11) and , | (5) | | (6) | for to do | (7) | for to do | (8) | for to do | (9) | | (10) | | (11) | end for | (12) | end for | (13) | end for | (14) | | (15) | | (16) | | (17) | | (18) | | (19) | return |
|