Research Article

On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm

Figure 3

Zero plaintext image and its corresponding ciphertext image . (a) Zero plaintext image . (b) Its corresponding ciphertext image .
(a)
(b)