Over the past few decades, advancement in digital technologies has made people’s lives more comfortable and faster. With all their charms, digital technologies, however, possess certain limitations to their robust utilization. Data transmission and reception over the internet is not secure in most cases. The problem can be resolved by applying encryption procedures to ensure that the data is only received by the intended user and even if the data is intercepted by an unauthorized or unintended user, the contents of the data should not make sense to him/her. Encryption is a process to disguise the information in such a way that only the intended user with a certain private key or code could be able to retrieve the actual data from the encrypted information (Acharya
et al.,
2008; Jakimoski and Subbalakshmi,
2008; Schneier,
1996; William,
2006), which is called decryption, the reverse process of encryption. Symmetric key algorithms use the same keys for encryption and decryption, whereas different keys are used for encryption and decryption in public key algorithms. The traditional symmetric algorithms like Advanced Encryption Standard (AES), Data Encryption Standard (DES) and International Data Encryption Standard (IDES) encrypt text data in an efficient way (Bruce,
1996; Stallings,
2006; Leong
et al.,
2000). These traditional algorithms, however, fail to provide efficient encryption of image data due to its associated high redundancy, strong correlation and bulk capacity (Khan
et al.,
2017a; Ahmad
et al.,
2017). In 1989, Mathews presented the concept of chaotic encryption (Matthews,
1984). Following Mathew’s novel idea, many researchers have turned their attention towards chaos-based image encryption and S-box construction techniques (Ahmad and Hwang,
2016; Anees
et al.,
2014a; Khan
et al.,
2015a; Ahmad and Hwang,
2015; Ahmad
et al.,
2015; Younas and Ahmad,
2014; Anees
et al.,
2014b; Dawei
et al.,
2004; Ahmad
et al.,
2016; Huang and Guan,
2005; Li and Zheng,
2002; Ahmad and Ahmed,
2010; Rehman
et al.,
2016; Khan
et al.,
2015b; Habib
et al.,
2017). These chaos-based image encryption algorithms have lots of merits, such as the large key space, ergodicity and sensitivity to the secret keys. Chung and Chang (
1998) designed a new approach for encrypting binary images. They utilized different scan patterns at the same level in the scan tree structure and then applied a
$2D$ run-encoding technique
$(2\mathit{DRE})$. However, Chang and Yu (
2002) present cryptanalysis of the above scheme. Belkhouche and Qidwai proposed binary image encoding based on
$1D$ chaotic map (Belkhouche and Qidwai,
2003). In 2014, Amir
et al. utilized the chaotic behaviour of Logistic map and used more than one substitution box. Logistic chaotic map generates random values that randomly select S-box which is employed in the substitution process. In this paper, we first examine Amir
et al.’s algorithm (Anees
et al.,
2014a) and then improve it on the basis of the security parameters suggested in Ahmad
et al. (
2015), Khan
et al. (
2017b). To improve the security characteristics of the Amir’s scheme for binary images, bitwise XOR operation is applied on image pixels. In order to verify the security of the proposed algorithm, various statistical analyses and histogram tests are applied on encrypted images.