“…Ensuring that these images remain confidential during transmission, safeguarding against theft or leakage has become a prominent research focus. 4 , 5 , 6 However, due to the distinctiveness of digital images, 7 , 8 , 9 such as high correlation of adjacent pixel points, scattering distribution of critical information, and high information redundancy, cryptographic protection using traditional text encryption algorithms struggles to meet real-time performance requirements. Furthermore, chaos itself exhibits inherent qualities 10 , 11 , 12 , 13 such as high sensitivity to initial conditions and control parameters, excellent pseudo-randomness, ergodicity, and long-term unpredictability of orbits, and it has many similarities with confusion, diffusion, and so on in cryptography.…”