Research Article
On the Security Analysis of a Hopfield Chaotic Neural Network-Based Image Encryption Algorithm
Figure 4
Plaintext image , the corresponding ciphertext image , and the temporary permutation encryption image . (a) Plaintext image . (b) The corresponding ciphertext image . (c) The temporary permutation encryption image .
| (a) |
| (b) |
| (c) |