“…There are some papers focusing on designing S-box with chaotic maps [9,10,11,12]. In [6,13,14,15,16,17,18,19,20], the analyzed image encryption schemes are fixed to withstand the proposed attacking methods. Due to the seemingly similar properties of a chaotic system and a secure pseudo-random number generator (PRNG), a large number of image encryption schemes use various chaotic maps to generate PRNS, which is used to control combination of some basic encryption operations, e.g.…”