“…Image encryption methods are currently available using various techniques, such as chaotic systems [ 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ], DNA coding [ 18 , 19 , 20 , 21 ], substitution boxes [ 22 , 23 , 24 ], and cellular automata [ 25 , 26 , 27 , 28 ]. Chaotic phenomena [ 29 , 30 ] are seemingly random irregular motions that occur in a deterministic system—a system described by a deterministic theory that behaves in an uncertain, irreducible, and unpredictable manner.…”