Research Article

On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm

Figure 4

Plaintext image , the corresponding ciphertext image , and the temporary permutation encryption image . (a) Plaintext image . (b) The corresponding ciphertext image . (c) The temporary permutation encryption image .
(a)
(b)
(c)