Research Article
On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm
Figure 4
Plaintext image , the corresponding ciphertext image , and the temporary permutation encryption image . (a) Plaintext image . (b) The corresponding ciphertext image . (c) The temporary permutation encryption image .
(a) |
(b) |
(c) |