Review Article

The Weighted Fractional Fourier Transform and Its Application in Image Encryption

Figure 8

(a) Original image, (b) encrypted image, (c) image decrypted with the correct key , and (d) image decrypted with the wrong key .

(a)
(b)
(c)
(d)