“…To meet this challenge, a variety of encryption schemes have been illustrated [2,3,7,11,14]. Recently, along with the rapid development of theory and application of chaos, many researchers are now focusing on the chaotic cryptography, since it has shown some exceptionally good properties in many concerned aspects regarding security, complexity, speed, computing power and computational overhead, etc [9,10,12].…”