“…In order to deal with this problem, the popular technique of chaos-based image encryption has been widely discussed and applied by researchers [ 2 , 3 , 4 ]. Numerous routes have been taken in the design and innovation of current chaotic image encryption schemes, such as introducing and using S-box [ 5 , 6 , 7 ], Latin square [ 8 , 9 , 10 ], multiple data-level encryption operations [ 11 , 12 , 13 ], and different chaotic systems [ 14 , 15 , 16 ]. Additionally, chaotic systems can also take on various forms, such as continuous systems [ 17 , 18 ], fractional-order systems [ 19 , 20 ], complex systems [ 21 , 22 ], and discrete systems [ 23 , 24 , 25 ].…”