Abstract

With the rapid development of information, the requirements for the security and reliability of cryptosystems have become increasingly difficult to meet, which promotes the development of the theory of a class of fractional Fourier transforms. In this paper, we present a review of the development and applications of the weighted fractional Fourier transform (WFRFT) in image encryption. Relationships between the algorithms are established using the generalized permutation matrix group in theoretical analysis. In addition, the advantages and potential weaknesses of each algorithm in image encryption are analyzed and discussed. It is expected that this review will provide a clear picture of the current developments of the WFRFT in image encryption and may shed some light on future developments.

1. Introduction

In 1995, Refregier and Javidi proposed an optical image encryption scheme based on the 4f system [1], which attracted researchers’ attention. Later, the scheme was extended to the fractional Fourier transform (FRFT) domain by Unnikrishnan et al. [2]. The transform order was also used as the encryption key in addition to the random phase matrix, which improved the security of the system. The FRFT was a generalized Fourier transform (FT) and had more flexibility and research value. In 1995, Shih first proposed the WFRFT, a new version of the FRFT [3]. Zhu et al. proposed the optical image encryption method based on multifractional Fourier transforms (MFRFT) [4], a generalized WFRFT, which allowed the cycle to also be used as a key. Before long, Ran et al. generalized the definition of the WFRFT by extending it [35], which was called the high-order generalized permutational fractional Fourier transform (HGPFRFT) [6]. They then proposed the general MFRFT method based on the generalized permutation matrix group [7]. In the years that followed, new theories based on the FRFT were presented for image encryption. Pei et al. proposed an image encryption method based on the multiple-parameter discrete fractional Fourier transform (MPDFRFT) [8], and this new encryption method significantly enhanced data security since it exploited the order parameters of the MPDFRFT as extra keys for decryption. Liu et al. proposed a random fractional Fourier transform (RFRFT) by using random phase modulations, and the optical implementation of the RFRFT was based on the Lohmann-type FRFT configuration [9]. However, these two definitions [8, 9] are not variants of the WFRFT. Prior to 2008, Tao et al. proposed an image encryption scheme based on the multiparameter fractional Fourier transform (MPFRFT) [10], which greatly improved the security of the system without increasing hardware costs. Then, Ran et al. analyzed the security and the reliability of the encryption schemes based on the MPFRFT, and the modified multiparameter fractional Fourier transform (m-MPFRFT) was proposed [11]. Hence, image encryption schemes were proposed based on the m-MPFRFT, which greatly enriched image encryption research [1221]. Recently, Ran and Zhao et al. proposed the vector power multiparameter fractional Fourier transform (VPMPFRFT) [22, 23], which can widen the key space and has greater security; this method widened the research and application of the generalized WFRFT.

In conclusion, the WFRFT has been widely applied in image encryption, and researchers have continuously proposed new transformation theories to improve security. This paper reviews the existing WFRFT methods and analyzes the correlation and diversity among the algorithms.

2. Theoretical Analysis

There are multiple different variants of the FRFT, and we analyze a class of the WFRFT. Its earliest definition was proposed by Shih [3], after which various types of WFRFTs emerged. In the theoretical analysis, we will establish the correlation between the various WFRFTs using the generalized permutation matrix.

2.1. Shih’s Weighted Fractional Fourier Transform

In 1987, McBride and Kerr perfected and generalized the concept of Namias [24] and defined the integral form of the FRFT [25]. In the space , the FRFT of any signal isThe integral kernel is

In 1995, Shih proposed the WFRFT by using a superposition method of the state function [3], and it was simply referred to as the SWFRFT. It can be defined as a linear combination of the four state functions, namely, the primitive function and the first-, second-, and third-order FTs. Based on this logic, it is independent of the previous various definitions. The definition is as follows:Here, , , , and .

In Figure 1, the gate function is selected as an original function, which is different from the weighted fractional order Fourier transform. When the order is 1, the SWFRFT equates to the Fourier transform of the signal.

After that, Liu et al. proposed the generalized WFRFT (GWFRFT) [5] by expanding Shih’s definition. It is shown to have -periodic eigenvalues with respect to the order of the Hermite–Gaussian functions.

2.2. Multifractional Fourier Transforms

Zhu et al. proposed the MFRFT, which is mainly used in image encryption [4]. It is defined as follows:Here, , and the weighting coefficient isso the MFRFT can be represented as

Compared with the previous GWFRFT, the image encryption based on the MFRFT is more secure because it added to the key .

The encryption keys are M=5 and . Figures 2(a) and 2(b) show the original image and the encrypted image, respectively, and Figure 2(c) shows the intensity distribution of the encrypted image.

Next, Ran et al. proposed the generalized multifractional Fourier transform (GMFRFT) [7] and explained the SWFRFT using the generalized permutation matrix group. The weighting coefficient can be expressed aswhere and . When , the following equation is obtained. That is to say, SWFRFT is a special case.From (8), we obtainwhere . Therefore, the weighted coefficient is

The definitions (SWFRFT [3], GWFRFT [5], and MFRFT [4]) are demonstrated using the generalized permutation matrix group and are also further explained in [7].

2.3. Multiparameter Fractional Fourier Transform

Here, if , the weighted coefficient is obtained using (10) asTherefore, a new generalized WFRFT is obtained—the MPFRFT [10] and its definition can be written asThe algorithm is applied to image encryption and the parameters can be used as the encryption keys, which greatly improves the security of the system.

In 2009, Ran et al. studied the function and proposed the equivalent definition function . Then, the new weighted coefficient can be obtained using (10) asso the modified MPFRFT (m-MPFRFT) is obtained [11] asThe modified MPFRFT has the same basis function , where

The m-MPFRFT overcame the periodicity by extending the parameter range to the real number field, which had higher security. Hence, many image encryption schemes were proposed based on the m-MPFRFT [1221]. In Figure 3, the simulation results are presented, and the parameters are selected as the encryption keys. Figures 3(a) and 3(b) show the original image and the encrypted image, respectively, and Figure 3(c) shows the intensity distribution of the encrypted image.

2.4. Vector Power Multiparameter Fractional Fourier Transform

Recently, a new generalized WFRFT is proposed, which is called the VPMPFRFT [22]. First of all, the function , where is defined by the arguments and . According to the inverse transformation of the discrete Fourier transform, we havewhere . The expression isand then the VPMPFRFT isThe basis function is , where .

In Figure 4, the simulation results are presented, and the parameters are selected as the encryption keys. Figures 4(a) and 4(b) show the original image and the encrypted image, respectively, and Figure 4(c) shows the intensity distribution of the encrypted image.

The VPMPFRFT retains the parameter , and the order is extended from real numbers to real vectors. It overcomes the deficiency that a group of encryption keys has many different groups of decryption keys. The algorithm is a generalized WFRFT, which is of great theoretical significance and application value.

In short, the diversity of the WFRFT is essentially the difference in the eigenvalues. A complete set of eigenfunctions of the FRFT are produced by the Hermite-Gaussian function:where is the -th order Hermite polynomial. The diversity between each algorithm’s eigenvalue is shown in Table 1.

3. Security Analysis

Image encryption has 4 periodicities based on the SWFRFT [3] and its key space is limited to . As such, the encryption key is , and the ciphertext is shown in Figure 5(b). The decryption key can be or , and the decryption results are shown in Figures 5(c) and 5(d), respectively.

Next, we provide some theoretical elaboration. From formula (4), we obtainThen, for , we haveIt turns out that the SWFRFT has 4 periodicities.

Then, the MFRFT was proposed [4]. It expands the key space , where , , and improves the security. However, the algorithm still has periodicity (the period is M), which means that, for the encryption key , the decryption keys can be and .

Conversely, the MPFRFT [10] is presented with two vector parameters that are added as keys, and it has higher security than the previous algorithms. However, in another study, it was found that the algorithm has potential security flaws (due to periodicity and parameter redundancy).

In terms of the periodicity for the encryption key , the decryption keys can be or . From weighted coefficient formula (12), we findwhere and . Then, we obtainTherefore,This proves that the MPFRFT is periodic.

On the other hand, the MPFRFT has the potential risk of parameter redundancy in image encryption. For example, the encryption key is Therefore, the decryption keys can be The simulation results are shown in Figure 6.

Formula (12) leads towhere and the two parameters and can be replaced by one parameter .

Therefore, the modified MPFRFT is proposed, which can overcome parameter redundancy. Furthermore, when the parameter , it overcomes the periodicity risk in image encryption. The theoretical analysis of formula (14) is as follows: where . Therefore, , and we have .

Since then, the m-MPFRFT has been widely used in image encryption, and it can be combined with other encryption methods to obtain higher security [1221].

With further research, we find that the transformation has a security vulnerability that one group of encryption keys can result in many different groups of keys correctly decrypting the encrypted image. For example, take the encryption keyThe decryption keys can be

The simulation results are shown in Figure 7. The original image and the encrypted image are shown in Figures 7(a) and 7(b), respectively. The decrypted images are shown in Figures 7(c) and 7(d), which use the decryption keys and , respectively.

Next, we analyze weighted coefficient formula (14). Let . Then, we obtain We observe thatThus,Then,Therefore,This results inFor the amplitude plaintext , this security risk will always exist.

Recently, the VPMPFRFT was proposed to overcome this security problem [23]. The principle is that the order is transformed from a real number to a set of real vectors.

From formula (17), we obtainwhere , . When , this transformation overcomes the risk of parameter translation in image encryption.

We select the encryption key Then, the decryption keys are

The simulation results are shown in Figure 8. The original image and the encrypted image are shown in Figures 8(a) and 8(b), respectively. The decrypted images are shown in Figures 8(c) and 8(d), respectively. As seen from Figure 8(d), the VPMPFRFT overcomes the security risk of parameter translation.

At this point, we analyze the diversity of the WFRFT with respect to the image encryption security. The security demands of the system promote the continuous development of WFRFT theory; however, the application of the algorithms in other fields requires further study.

4. Conclusions

The FT is widely used in many fields. The FRFT is a generalized form of the FT that has become the focus of researchers’ attention. We presented a review of the applications of the WFRFT in image encryption. Via theoretical analysis, the relationship between the generalized WFRFTs is established using the generalized permutation matrix group, and a simulation verification is presented for image encryption. The significant advantages and potential weaknesses of each generalized WFRFT are being analyzed and illustrated with respect to their security. It is expected that, through these comparisons, a clear picture of the current developments in image encryption has been presented and some light has been shed on future developments.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

The authors would like to thank the reviewers for their valuable comments. This study was supported by the National Natural Science Foundation of China (no. 61702088), the Central University Basic Research Service Fees of China, (no. N172303014), and the School Ph.D. Fund of Northeastern University, Qinhuangdao, China (XNB201708).