Review Article

The Weighted Fractional Fourier Transform and Its Application in Image Encryption

Figure 7

The security vulnerability of the m-MPFRFT: (a) original image, (b) encrypted image, (c) image decrypted with the correct key , and (d) image decrypted with the wrong key .

(a)
(b)
(c)
(d)