“…However, most of these algorithms have disadvantages when dealing with image data in terms of small key space, low level of security and high computational complexity [11,12]. To tackle these challenges in image protection, many chaos-based cryptographic algorithms have been suggested [12][13][14][15]. These chaos-based security methods have many useful security properties: aperiodicity, unpredictable and non-linearity, high sensitivity to initial conditions and parameters, ergodicity, pseudorandomness, and other high permutation and diffusion properties [16].…”