“…For instance, chaos is applied in communication systems in An et al (2011), Eisencraft et al (2012), Hu et al (2010), Jiang et al (2011), Kaddoum et al (2010), Kang et al (2014), Ryu and Lee (2013), Türk and Oğraş (2011), Yang et al (2015), Yang and Zhu (2013); used for image cryptosystems in , Z. L. Zhu et al (2011), Murillo-Escobar et al (2015), Oğraş and Türk (2016), Patidar et al (2011), Telem et al (2014), Wang et al (2011), Ye (2011), Ye and Guo (2014), N. Zhou et al (2011), and H. Zhu et al (2013); for power systems in Yibei et al (2011), Ginarsa et al (2013), Yau et al (2015), Ghasemi et al,(2014), ; X. Zhou et al (2012); Tur and Ogras (2021); for Steganographic systems in Ogras (2019), Kar et al (2018), Bilal et al (2014), Battikh et al (2014), and Saeed (2013). There are also some important studies using chaotic systems as secret key or bit generators in cryptography (Addabbo et al, 2009;Alhadawi et al, 2019;Moysis et al, 2020;Oğraş & Mustafa, 2017).…”