Research Article
On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm
Figure 3
Zero plaintext image and its corresponding ciphertext image . (a) Zero plaintext image . (b) Its corresponding ciphertext image .
(a) |
(b) |