“…To meet this challenge, a variety of encryption schemes have been proposed, (Chen et al 2004;Wang et al, 2016;Tang et al, 2016;Yang et al, 2010;Fu et al, 2011;Mannai et al, 2015;Chen et al, 2015;Zhao et al, 2015;Kanso & Ghebleh, 2015), recently there has been a growing interest in chaotic based image encryption, because they offer good properties in many concerned aspects regarding speed, security, computing power, complexity and computational overhead. The security of the cryptosystems based on chaotic stands on the used chaotic map and the adopted architecture, some chaotic based methods have security problems which are related to the small size of secret key and to the used chaotic map properties (Bechikh et al, 2015;Akhavan, 2015;Rhouma, 2008;Li, & Xuan, 2002).…”