Research Article
On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm
Algorithm 1
Cracking CIEA-HCNN by using chosen-plaintext attack.
| Input: | | Output: Recover the plaintext image from the given ciphertext image | | (1) | | | (2) | According to equation (11), | | (3) | | | (4) | According to equation (11) and , | | (5) | | | (6) | for to do | | (7) | for to do | | (8) | for to do | | (9) | | | (10) | | | (11) | end for | | (12) | end for | | (13) | end for | | (14) | | | (15) | | | (16) | | | (17) | | | (18) | | | (19) | return |
|