Fig. 4
From: Research on neural network chaotic encryption algorithm in wireless network security communication

The improved algorithm flow chart. The figure shows the improved algorithm encryption algorithm, which is mainly based on Aihara neural network and introduces chaotic mapping