Вы находитесь на странице: 1из 10

1 INTRODUCTION

Applications of the fractional Fourier


transform
Cary Yang
Carnegie Mellon University
caryy@andrew.cmu.edu

Abstract

Images are widely used to convey information in an easy to understand format; however, the conventional
representation of an image as 3 channels per pixel per image creates difficulty in implementing certain
widely used classes of algorithms. In this paper, we summarize two different applications of the fractional
Fourier transform, which transforms the representation of the data in the image and therefore allows us to
perform novel techniques in this new domain. This allows for effective and efficient solutions to problems
that were difficult or inefficient to solve previously.

1 Introduction
ffective and efficient image processing

E algorithms for certain domains of prob-


lems are difficult due to the traditional
representation of image as intensity at a posi-
tion, which fails to capture that pixels relation-
ship with other pixels and colors in the image. (a) Modified image. (b) Original image.
In this paper, we investigate the application of
the fractional Fourier transform to 2 different Figure 1: Comparing a picture with every other pixel
areas of image processing and highlight the changed to a random color with the original
benefits of these applications. image.

1.1 Image Encryption This same idea holds for encryption algo-
rithms as well.
Compared to plain text, images have signifi- Additionally, because images contain a sig-
cantly more information, have more local simi- nificant amount of data, conventional encryp-
larities, and are less sensitive to mutations in tion techniques that work well on plain-text can
the data. For example, if we replaced every take significant amounts of time on images.
other letter in a sentence with a random char-
acter, it would be extremely difficult to piece
back together the original meaning, as in the 1.2 Noise Removal
following:
Another difficult image processing problem to
Tsenqjigklbeomnyfkxtjdmbet yvvrftke efficiently solve given the traditional represen-
llzy yoo. tation of an image is noise removal, since noise
The quick brown fox jumped over the only makes sense in relation to neighboring
lazy dog. pixels. One way to deal with noise that has
a constant frequency throughout the image is
However, if we changed every other pixel in the Fourier transform; however, for noise that
an image to a random color, the image would varies in frequency in the image, the fractional
still be easily discernible, as in Figure 1. Fourier transform must be used instead.

1
2 OVERVIEW OF MATHEMATICAL CONCEPTS

In this paper, we will present summaries to the units of are hertz (Hz), or cycles per sec-
solutions for both of these problems: ond, as:
We will give intuitive and in-depth expla-
nations of the more esoteric mathematical
concepts that are key to understanding Z
the algorithm proposed (Section 2). F ( ) = f (t)ei2t dt (1)

Give a brief intuitive explanation of the al-
gorithm before diving into the actual im-
plementation of the algorithm and show-
ing that it solves the problems outlined And its sibling, the (continuous) Inverse
above (Sections 3.1 and 3.2 for image en- Fourier transform:
cryption, Sections 4.1 and 4.2 for noise
removal).
Analyze the cryptographic effectiveness Z
of the algorithm being proposed and f (t) = F ( )ei2t dt (2)

show that it is reasonably difficult to de-
crypt the image without the proper keys
(Section 3.3).
These equations are rather dense, so we
Show the effectiveness of the noise re-
will give an intuitive explanation of the Fourier
moval algorithm, especially in compari-
transform before diving into the actual mathe-
son to the noise removal applied with the
matics surrounding the equation.
ordinary Fourier transform (Section 4.3).
Consider the function f (t) = sin(3t) +
sin(7t) + sin(12t), graphed in Figure 2:
2 Overview of Mathematical
Concepts 3
f (t)
Many mathematical concepts that this paper 2
relies on will be described in detail in the fol-
lowing sections. Only working knowledge of 1
concepts up to calculus is assumed.
t
2 4 6
2.1 Fourier Transform 1
The Fourier transform is a mathematical trans-
2
formation that converts between two represen-
tations of a signal:
The time-domain representation, or the Figure 2: Graph of sin(3t) + sin(7t) + sin(12t).
value of the signal as a function of time.
The frequency-domain representation, or
the amplitude and phase of the signal as
a function of frequency. This function is composed of 3 sin waves
with frequencies of 3 Hz, 7 Hz, and 12 Hz and
Note that phase has the same definition
a 0 phase angle.
here as it does for waves it is the angle offset
at which we begin drawing a wave. Now, consider the same equation graphed
We can express the (continuous) Fourier in the polar coordinate system instead, using t
transform F of a function f : R C, where as the angular coordinate (Figure 3).

2
2.1 Fourier Transform 2 OVERVIEW OF MATHEMATICAL CONCEPTS

Why isnt the distance to the origin of this


point exactly the amplitude? The mathematical
1
reason for this is a bit complicated, but it turns
out that the Fourier transform splits the ampli-
0 tude of a wave of some frequency evenly be-
tween the transformed functions value at some
1 frequency, and its value at that same negative
frequency. That is, if we graphed all points
2 of the form ( f (t), 3t) in the polar coordinate
system, we would get the same graph reflected
over the y-axis and find the average point again
3
2 1 0 1 2 at 0.5 distance from the origin. Summing these
two values gives us the original amplitude of
Figure 3: Graph of = t, r = sin(3t) + sin(7t) + 1.
sin(12t). Thus, we have derived the general proce-
dure for the Fourier transform of a function
Note that if we were to take the average f (t): given a frequency in hertz , it essen-
of the location of all the points on that line, tially finds the average location of all the points
we would end up with the red point, which is along f (t) when it is graphed on the polar axis
squarely at the origin. times as fast as normal. The distance of this
Next, consider the previous graph, but average location from the origin is half the am-
drawn 3 times as fast. That is, given a point plitude, and its angle from the vertical is the
( f (t), t) from the previous graph, graph it now phase angle.
at ( f (t), 3t), effectively making 3 complete cy- Now, well go deeper into the mathematics
cles as we graph the same equation (Figure 4). surrounding the equation.
First, we know by Eulers Theorem that we
can represent any complex number in polar
coordinates as:
2
z = rei (3)
1
Using the analogy of complex numbers be-
ing coordinates on a plane, we can see that to
0 graph a function f (t) in the polar coordinate
system on the complex plane with angular co-
ordinate t, we would have the function:
1
2 1 0 1 2 g(t) = f (t)eit (4)
Figure 4: Graph of = 3t, r = sin(3t) + sin(7t) + Now, if we wanted to find average of the lo-
sin(12t) cation of all the points on this curve, we would
just take the integral over all time values with
Note that this time, the average location of respect to time. However, this would only give
all the points ends up a distance of 0.5 from the us the amplitude and phase angle of the signal
origin and 0 angle from the vertical. Coinci- if we drew it at normal speed. To get the am-
dentally, the equation f (t) that were graphing plitude and phase angle at any frequency, we
has a sin component with a frequency of 3 Hz would have to add a 2 term in the exponent,
that has unit amplitude and a 0 phase angle! where would be the frequency at which we

3
2.2 Fractional Fourier Transform 2 OVERVIEW OF MATHEMATICAL CONCEPTS

sample the signal. Thus, we arrive at: uous Fourier transform can be thought of as
Z rotating a signal /2 radians from its time- or
F ( ) = f (t)ei2t dt (5) spatial-domain representation to its frequency-
domain representation. Generalizing this to
Note that Equation 5 is almost exactly the any angle of rotation, the fractional Fourier
Fourier transformation from Equation 2, and it transform can transform a function to inter-
follows the intuition discussed before exactly! mediate domains between the time- or spatial-
The only difference occurs in the exponent, domain and frequency domain.
which is negative in the original presentation To put it more formally, let the a-th or-
of the Fourier transform. der FrFT of a function f ( x ) be denoted as
As it turns out, this negative sign is a mat- F a { f ( x )}( x a ). Note that the a-th order FrFT
ter of convention, and can go on either the corresponds to an = a/2 radian rotation
forward or inverse Fourier transform as long in the time-frequency plane. From our above
as it is kept consistent [10]. Intuitively, we can discussion, we can see that F1 is simply the
think of it as following the circles in one direc- continuous Fourier transform. Going further,
tion in the forward transform and the opposite we can see that F2 of a function f (t) would
direction in the inverse transform, reversing rotate the function into the frequency domain
the operation. Because most texts express the and then back into the time domain, mapping
Fourier transform with the negative sign on the function f (t) 7 f (t). F3 would simply
the forward direction, we will do the same. be the Fourier transform of this inverse time
One detail of importance is that because of domain, and F4 would rotate a full circle and
the ei2t component in the Fourier transform, result in the original function.
the result F ( ) = | F ( )|ei ( ) is a complex num- The mathematical definition is convention-
ber, where the magnitude | F ( )| is the ampli- ally expressed as:
tude of the signal at the given frequency and
( ) is the phase angle. Z
Note that above, we only go into the math- F a { f ( x )}( x a ) = Ka ( x, x a ) f ( x ) dx (6)
ematics of the Fourier transform. Computa-

tionally, evaluating the full integral is some-


Where Ka ( x, x a ), the fractional kernel, is
what expensive, but can be estimated using the
defined as:
Fast Fourier Transform algorithm in O(n log n)
asymptotic time. However, continuous Fourier
transforms can also be physically computed
A exp[i ( x2 cot
instantly with spectrometers or prisms, which

2xx + x2 cot )]

has interesting implications for the runtime a a 0 < | a| < 2
Ka ( x, x a ) = ,
of applications that use the Fourier transform

( x x a ) a=0
if special purpose hardware is designed that

( x + x )
a a = 2
takes advantage of this fact.
A = exp[isgn(sin )/4 + i/2],
= a/2, and
2.2 Fractional Fourier Transform is the Dirac delta function.
A generalization of the Fourier transform is (7)
the fractional Fourier transform (FrFT). Recall
that the continuous Fourier transform converts While the above equation is included for
between the time- or spatial-domain represen- completeness, it is not particularly intuitive.
tation of a signal and the frequency-domain Fortunately, this paper relies only on certain
representation of a signal. If we consider these properties of the FrFT.
two domains as orthogonal, then the contin- One important property to note is the addi-

4
2.3 Two-Dimensional Fractional Fourier Transform 3 IMAGE ENCRYPTION

tive property of the FrFT. Formally, correct fractional order is known.


Therefore, one idea to encrypt an image
Fb {F a { f }} = F a+b { f } = F a {Fb { f }} (8) might be to apply the FrFT on it. However,
because the FrFT is periodic over the range of
Intuitively, we can explain the above as
fractional orders 0 to 4, it might be possible
one rotation of angle = a/2 in the time-
to brute force the correct fractional order in a
frequency plane followed by another rotation
short amount of time. A logical follow-up to
of angle = b/2. By the basic properties
this would be to iteratively apply FrFTs on
of rotations, these can be combined into a sin-
the image. However, this cannot be done di-
gle rotation of angle + , or applied in the
rectly since FrFTs have an additive property, as
reverse order, and still describe the same trans-
discussed previously, and therefore, multiple
formation.
FrFTs applied on an image one after another
Additionally, fractional Fourier Transforms
would be the same as a single FrFT.
are unitary, which means, among other things,
that the inner product of two values is pre- Therefore, for our above idea to work, we
served. should perform some transformation in each
Also, note that because the FrFT is a gen- fractional plane before applying the next FrFT
eralization of the Fourier transform, it too can so that the fractional orders cannot be simply
be computed in real-time with special purpose added. This paper will use the Jigsaw transfor-
optics hardware. Therefore, any algorithm that mation, which takes an image, divides it into
uses this transformation has the potential for tiles of the same size, and then randomly per-
massive speedups if this hardware is used. mutes these tiles. For example, in Figure 6a, the
original 64x64 image was broken into 8x8 tiles,
2.3 Two-Dimensional Fractional and then these tiles were permuted randomly
to produce the arrangement seen. Because a
Fourier Transform
total ordering can be put on all the different
Because this paper deals with images, the func- possible permutations, we can encode the Jig-
tions we deal with will be two-dimensional saw transformation as a single number, which
functions. Fortunately, the above definition of would be the index into the list of all possible
the FrFT naturally extends into multiple dimen- permutations in their total ordering.
sions. Namely, for the two-dimensional case,
We also need to multiply the original image
we have:
by a random phase mask before the repeated
Jigsaw transformations and FrFTs are applied.
F ax ,ay { f ( x, y)}( x ax , y ay ) = The math for this will be discussed in the next
Z Z
section, but what is important to note is that
Kax ( x, x ax )Kay (y, y ay ) f ( x, y) dx dy
multiplying by this random phase mask essen-
(9) tially turns the image into white noise, remov-
ing the correlation between nearby pixels that
Note that this is simply the multiplication
is common in images, without changing the
of two fractional kernels with possibly different
amplitude of a function.
fractional orders, one in each dimension.
Given the above definitions, the procedure
to encrypt the image proceeds as follows [3]:
3 Image Encryption
1. Multiply the image to be encrypted by a
3.1 The Idea random phase mask.
2. For i = 1...3
Given the FrFT, we can perform image trans- Apply the jigsaw transformation with
3.
formations that cannot be undone unless the index bi .

5
3.2 Detailed Description 3 IMAGE ENCRYPTION

Then, apply a FrFT of order ai . Note Next, we present the mathematical defini-
that this is in reality two FrFT, one tion of the random phase mask described ear-
4. in the x direction and one in the y lier, which is simply Equation 10, for some
direction, and each with their own function n( x ) that generates random numbers
fractional orders aix and aiy . uniformly distributed in [0, 1) based on its in-
In reality, we could continue this loop fur- put parameter.
ther and further, but the diminishing returns
in security and increasing computation time ei2n( x) (10)
make this option unattractive.
We can see that if we multiply f ( x ) by this
The decryption process would be essen-
phase mask, we get the polar representation
tially the same procedure in the opposite direc-
of a complex number in the complex plane,
tion, that is:
with an amplitude of f ( x ) and a phase angle
1. For i = 3...1 of 2n( x ). Because the phase angle is ran-
2. Apply a FrFT of order ai . dom, any correlations between adjacent pixels
Reverse the jigsaw transformation is erased, and the image can be considered
3.
with index bi . white noise after this step.
4. Use the amplitude at each location as the Now, denote the Jigsaw transform with in-
color of the pixel in the decrypted image. dex b as Jb {} and its inverse as Jb {}. If we
Note that we do not need to know the ran- apply it to the image multiplied by the random
dom phase mask used during the encryption phase mask, we have Equation 11.
phase to decrypt the image since the ampli-
tude of the image at a pixel is the color of that Jb1 { f ( x )ei2n( x) } (11)
pixel, and the phase mask does not change the
amplitude of the pixel. However, the phase Now, apply the FrFT of order a1 . Recall
mask is still necessary to whiten the image to that this is actually two transformations, one
be encrypted and remove the effect that the in the x direction and one in the y direction
sharp color differences between jigsaw pieces with two different fractional orders a1x and a1y .
would have on the FrFT result. Without this This results in Equation 12.
phase mask, the encryption result would look
like Figure 6f, which has undesirable patterns F a1 { Jb1 { f ( x )ei2n(x) }} (12)
in the noise. Now, repeating this procedure twice more,
Therefore, the decryption process requires we get the final encrypted image g( x ):
the knowledge of 9 keys in total: 3 indices for
the 3 jigsaw transformations, and 6 fractional
orders, 1 in x and 1 in y for each FrFT. g( x ) = F a3 { Jb3 {F a2 { Jb2 {F a1 { Jb1 { f ( x )ei2n( x) }}}}}}
(13)
We can see the result of this equation in
3.2 Detailed Description Figure 6c when a1x = a1y = a2x = a2y = a3x =
a3y = 0.5.
We will go over the algorithm outlined above in Decryption following our intuition is given
more detail and firmly develop a mathematical by Equation 14.
basis for our claims.
First, to make this section more concise, de-
note the image with a function of one input f ( x ) = Jb1 {F a1 { Jb2 {F a2 { Jb3 {Fa3 { g( x )}}}}}}
f ( x ). Note that all of the below results would (14)
still apply given the conventional representa- Note that as before, we can leave out the
tion of an image as a function of two inputs random phase mask from our decryption step
since the FrFT naturally extends to two dimen- since we can just take the amplitude of the
sions, as discussed previously. function as the color of each pixel.

6
3.3 Results 3 IMAGE ENCRYPTION

3.3 Results to test, which would take a significant amount


of time.
Performance of this encryption algorithm is an-
alyzed in terms of Mean Squared Error (MSE)
between the original image and the encrypted
image. Mathematically [4],

MSE = ||in out||2


n n
1 (15)
=
N2 |out(i, j) in(i, j)|2
i =1 j =1

To visualize the sensitivity of the fractional


order parameters a1x , a2x , and a3x (or, equiva-
On top of this, there are still the permuta-
lently, a x1 , a x2 , and a x3 ), we have included in
tion indices to get correct. With just 64 tiles,
Figure 5 a plot of the MSE of decryption at-
there are 64! = 1.27 1089 possible permuta-
tempts as a function of that parameters differ-
tions, a search space that is far outside the
ence from the correct value, where, in each case,
reach of any brute force program. In fact,
all other parameters used are correct. Changes
the jigsaw problem has been show to be NP-
in a1x are graphed as the thickest line, changes
complete [1]. If just one of the three applied
in a2x are graphed as the next thickest line, and
permutations is incorrect, as in Figure 6d, the
changes in a3x are graphed as the thinnest line.
resulting image is still completely encrypted.
While not depicted, changes in a1y , a2y , and a3y
Thus, given the above two calculations, it is
exhibit the same behavior as the changes in a x1 ,
likely that brute-forcing an image encrypted
a x2 , and a x3 respectively in the graph.
with the technique outlined in this paper is
entirely unfeasible.

Figure 5
One final point to note here is that this al-
As we can see from the attempted decryp- gorithm can be implemented very efficiently
tion in Figure 6e and from the graph above, an in hardware, and in fact, the original paper
error of 0.05 in a fractional order still results in proposes a schematic for a possible optical im-
a completely encrypted image. An individual plementation [3]. Because the Jigsaw transfor-
attempting to brute force the keys would have mation portions of this algorithm are very easy
to go at a resolution of at least 0.05 through the to compute in software, and the difficult FrFT
range of fractional orders [0, 4), which means can be computed with optical hardware at es-
they would have to test 4/0.05 = 80 values sentially instantaneous speeds, this algorithm
for each of the 6 fractional orders, resulting in has the potential to perform extremely well,
806 = 262, 144, 000, 000 combination of values even on large images.

7
4 NOISE REMOVAL

images that is not constant throughout.


Note that the ordinary Fourier transform
is excellent at removing noise that is constant
through an image, simply by transforming the
image into the frequency domain, removing
the culprit frequencies, and then transform-
ing back. A similar idea can be applied with
(a) (b) the FrFT, but without the limitation that the
noise is constant. As we can see in Figure ??,
if we rotate the function in the time-frequency
plane by angle a, then we can perform a simple
multiplicative filter to remove the noise as in
the ordinary Fourier transform case and then
transform the image back.

(c) (d)

(e) (f)

Figure 6: a) An example of the Jigsaw transformation


applied on the original image. b) Correctly
decrypted image, MSE = 0.00. c) Fully en-
crypted image, a1x = a1y = a2x = a2y =
a3x = a3y = 0.5, MSE = 3943.14. d) In-
correctly decrypted with randomly incorrect
permutation for b3 , MSE = 5441.89. e) In-
correctly decrypted with a1x = a1y = a2x = Figure 7: Removing noise from an image with the FrFT.
a2y = a3y = 0.5 and a3x = 0.55, MSE =
5690.98. f) Encrypted without the initial ran-
dom phase mask multiplication step, MSE = Thus, we have a general procedure for our
5937.99. noise removal algorithm.

4 Noise Removal 4.2 Detailed Description


Now, for a more formal representation of the al-
4.1 The Idea
gorithm, suppose we have a signal represented
Because the FrFT can transform a function into by f obs (u) that we want to remove noise from.
domains between the time- or spatial-domain We estimate the original signal f (u) with a fil-
and the frequency-domain, it naturally lends tering operation in a fractional Fourier domain,
itself to simplifying applications where the sig- represented by the following equation:
nals frequency varies over time or space. Of
particular interest is the reduction of noise in f est (u) = (Fa g F a ) f obs (u) (16)

8
4.3 Results 4 NOISE REMOVAL

Where g represents the operator corre- Expanding this definition by distributing


sponding to multiplication by a filter function and linearity of expectations, we have:
g(u), and a is the optimal fractional Fourier
domain for this filtering. Thus, to optimally MSE( gopt ) = E[( f a )2 ] 2gopt E[ f a f obsa ]
estimate the original signal, we must find the (20)
optimal filtering function gopt (u) and the opti- + ( gopt )2 E[( f obsa )2 ]
mal fractional Fourier domain for the filtering. Taking the derivative of this with respect
Solving for gopt (u) analytically, we find that to gopt and setting it to 0 to find critical points,
[6], we have:
gopt (u) =
Ka (u, u a )K a (u0 , u a ) R f f obs (u, u0 ) du0 du 0 = 2E[ f a f obsa ] + 2gopt E[( f obsa )2 ]
RR
(21)
Ka (u, u a )Ka (u0 , u a ) R f obs f obs (u, u0 ) du0 du
RR
And solving for gopt :
(17)
E[ f a f obsa ] R f a f obsa
Where the correlation functions R f f obs (u, u0 ) gopt = = (22)
E[( f obsa )2 ] R f obsa f obsa
and R f obs f obs (u, u0 ) can be computed from
the auto-correlation functions R f f (u, u0 ) and However, we only have R f f obs and R f obs f obs
Rnn (u, u0 ) of the signal and the noise, which and not R f a f obsa and R f obsa f obsa , so transform it to
are assumed to be known. the spatial domain, then back to the fractional
The derivation of this optimal function is a domain a, giving us exactly Equation 17!
bit complex, but it relies on a couple of fairly Also note that the second derivative is
simple concepts. 2E[( f obsa )2 ], which will always be positive, and
Recall from statistics that the mean-squared therefore, we have indeed found a local min-
error of an estimation f est of a signal f is de- imum. Because it is the only critical point, it
fined as: is also the absolute minimum of the MSE func-
tion.
To find a, the optimal fractional Fourier do-
MSE( f est ) = E[|| f f est ||2 ] main to apply this filter, we simply test all frac-
(18)
= E[h f f est , f f est i] tional Fourier domains in [0, 4) at some fixed
resolution and pick the one that results in the
Where hi represents the inner product and
greatest reduction of noise.
|| || represents the norm.
Because we are trying to remove the noise
from our observed signal, it makes sense that 4.3 Results
our objective would be to minimize the value Similar to the evaluation of our results from
of this function. image encryption, we will also evaluate the
Additionally, since the fractional Fourier effectiveness of the noise removal by measure
transform is unitary, as discussed earlier, the of MSE. However, in this case, the MSE values
MSE applies directly in the fractional Fourier will be normalized by ||in||2 , resulting in the
domain a: equation:

MSE( f est ) = E[|| f a f esta ||2 ] ||in out||2


MSE = (23)
(19) ||in||2
MSE( gopt ) = E[|| f a gopt f obsa ||2 ]
Our first case study will be Figure 8, the im-
Where f a , f esta , and f obsa represent the func- age of a plane that is intentionally corrupted,
tions f , f est , and f obs respectively in the frac- and then recovered using the algorithm dis-
tional Fourier domain a, and the second defini- cussed above. As we can see, the method de-
tions follows by our definition of f est . scribed is significantly more effective than the

9
REFERENCES

ordinary Fourier transform, resulting in an al- Additionally, the fractional Fourier trans-
most 10-fold improvement. form has been adapted to a variety of other
fields, such as digital watermarking, image
compression, and more [8].

References
[1] Erik D Demaine and Martin L Demaine.
Jigsaw puzzles, edge matching, and poly-
omino packing: Connections and complex-
ity. Graphs and Combinatorics, 23(1):195208,
2007.

[2] B Hennelly and John T Sheridan. Optical


image encryption by random shifting in
fractional fourier domains. Optics Letters,
28(4):269271, 2003.

[3] Bryan M Hennelly and John T Sheridan.


Image encryption and the fractional fourier
transform. Optik-International Journal for
Light and Electron Optics, 114(6):251265,
Figure 8: a) Original image. b) Image with added noise,
SNR (Signal to Noise Ratio) 1. c) Fil- 2003.
ter in the optimum fractional Fourier domain
[4] Madhusudan Joshi, Kehar Singh, et al.
(a x = 0.4, ay = 0.6), MSE = 0.003. d) Fil-
Color image encryption and decryption us-
tered in the ordinary Fourier domain, MSE =
0.035. ing fractional fourier transform. Optics com-
munications, 279(1):3542, 2007.

Thus, we can see that filtering with the frac- [5] M Alper Kutay and Haldun M Ozaktas.
tional Fourier transform produces significant Optimal image restoration with the frac-
benefits in image quality over filtering with the tional fourier transform. JOSA A, 15(4):825
standard Fourier transform for many types of 833, 1998.
noise with no additional computational cost.
While not depicted, the original paper tested [6] Ervin Sejdic, Igor Djurovic, and LJubia
a couple more of image degradation, all with Stankovic. Fractional fourier transform
superior results for the FrFT method over the as a signal processing tool: An overview
ordinary Fourier transform method [6]. of recent developments. Signal Processing,
91(6):13511369, 2011.

[7] Ran Tao, Yi Xin, and Yue Wang. Double


5 Further Work image encryption based on random phase
encoding in the fractional fourier domain.
The application of fractional Fourier trans- Optics Express, 15(24):1606716079, 2007.
forms to image encryption has been further
extended to color image encryption [5] and [8] T Theul. Sampling and reconstruc-
the simultaneous encryption of two images [9], tion in volume visualization. See at:
along with the usage of different transforma- http://www.cg.tuwien.ac.at/theussl/DA/ the-
tions in the fractional Fourier domain [4]. sis.html, page 28, 2000.

10

Вам также может понравиться