Review Article
The Weighted Fractional Fourier Transform and Its Application in Image Encryption
Figure 8
(a) Original image, (b) encrypted image, (c) image decrypted with the correct key , and (d) image decrypted with the wrong key .
(a)
(b)
(c)
(d)