“…Among the chaos-based encryption schemes, onedimensional and two-dimensional chaotic systems, such as logistic map [8,9], skew tent map [10], Arnold map [7,11], baker map [4], piecewise linear chaotic map [12,13], piecewise nonlinear chaotic maps [14] and standard map [15][16][17], were applied widely owing to the advantage of simple implementation. However, there are fundamental drawbacks in these chaotic systems, such as small key space, slow performance speed and weak security.…”