“…While traditional pseudo-random sequences are generated by multi-level shift registers or other delay elements through linear feedback [10] , chaotic sequences can be generated with only one model and initial conditions, which is very convenient and can effectively reduce the hardware resource consumption. Chaotic cryptography is used in several applications, such as medical, radar [11] , spread spectrum communication [12] , secure communication [13] , ultra-wideband communication [14] , multimedia information encryption [15][16][17][18] , etc., and is usually combined with traditional encryption methods, such as Arnold map, RSA algorithm [19] , AES algorithm [20] , to increase the overall cryptosystem complexity and security of the whole encryption system. The literature [21] uses chaotic sequences combined with fractal structures, cellular automata and linear feedback shift registers for medical images to perform multiple diffusion operations, and the complex encryption system is implemented in hardware.…”