Abstract: The security of a chaos-based image encryption (IE) systems is based upon chaotic map’s performance and the encryption algorithm’s permutation and diffusion strategies. Nevertheless, ...