I. Introduction
It has become crucial to protect digital photographs from leaks in recent years due to the constant movement of digital images throughout the globe via transmission means. Many applications, such as image databases, video classification for a secure storage and transmission method that is quick, dependable, and effective. The development of strong encryption algorithms is a result of the necessity to meet the security requirements of digital images. In the last ten years, a wide range of encryption algorithms [1] based on different ideas have been proposed in the literature. Given that they offer a fine balance of speed, high security, moderate computational overheads and power, chaos-based encryption methods are among those that are deemed suitable for practical usage.