“…Previously, various encryption techniques that are dependent on chaos have been examined and broadly contemplated. Image encryption algorithms have been constructed based on a logistic and two-dimensional (2D) chaotic economic map [ 6 ], variable length codes that are based on Collatz conjecture [ 7 ], 2D discrete wavelet transform and Arnold mapping [ 8 ], logistic mapped convolution and cellular automata [ 9 ], cat map [ 10 ], 2D Chebyshev-sine map [ 11 ], 2D Sine Logistic modulation map [ 12 ], one-dimensional (1D) delay with linearly coupled Logistic chaotic map [ 13 ], a hyper-chaotic system that combines Dynamic Filtering, DNA computing, and Latin Cubes (DFDLC) [ 14 ], Arnold Transform followed by Qubit Random Rotation [ 15 ], 2D Baker’s map with diffusion process based on XORing [ 16 ], ant colony optimization [ 17 ], Chebyshev Map followed by Rotation Equation [ 18 ], an algorithm combining Julia fractal and Hilbert curve [ 19 ], four-dimensional (4D) hyper-chaotic nonlinear Rabinovich system [ 20 ], Josephus traversing and mixed chaotic map [ 21 ], 2D logistic-modulated-sine-coupling-logistic chaotic map [ 22 ], multiple permutation of pixels followed by the 2D Chebyshev function [ 23 ], chaos map with pixel permutation [ 24 ], improved hyperchaotic sequences [ 25 ], high-dimension Lorenz chaotic system with a perceptron model [ 26 ], rotation matrix bit-level permutation with block diffusion [ 27 ], and discrete Chirikov map with chaos-based fractional random transform [ 28 ].…”