“…Numerous routes have been taken in the design and innovation of current chaotic image encryption schemes, such as introducing and using S-box [ 5 , 6 , 7 ], Latin square [ 8 , 9 , 10 ], multiple data-level encryption operations [ 11 , 12 , 13 ], and different chaotic systems [ 14 , 15 , 16 ]. Additionally, chaotic systems can also take on various forms, such as continuous systems [ 17 , 18 ], fractional-order systems [ 19 , 20 ], complex systems [ 21 , 22 ], and discrete systems [ 23 , 24 , 25 ]. They have advantages such as pseudorandomness, synchronization, ergodicity, and extreme sensitivity to initial values and parameters, and some of these properties are beneficial for image encryption [ 26 ].…”