Next Article in Journal
The Influence of Voids in the Vibrations of Bodies with Dipolar Structure
Next Article in Special Issue
Self-Optimizing Path Tracking Controller for Intelligent Vehicles Based on Reinforcement Learning
Previous Article in Journal
A Strong-Form Off-Lattice Boltzmann Method for Irregular Point Clouds
Previous Article in Special Issue
Research Risk Factors in Monitoring Well Drilling—A Case Study Using Machine Learning Methods
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Key Validity Using the Multiple-Parameter Fractional Fourier Transform for Image Encryption

Information Science Teaching and Research Section, School of Mathematics and Statistics, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China
*
Author to whom correspondence should be addressed.
Symmetry 2021, 13(10), 1803; https://doi.org/10.3390/sym13101803
Submission received: 2 September 2021 / Revised: 23 September 2021 / Accepted: 26 September 2021 / Published: 28 September 2021

Abstract

:
As a symmetric encryption algorithm, multiple-parameter fractional Fourier transform (MPFRFT) is proposed and applied to image encryption. The MPFRFT with two vector parameters has better security, which becomes the main technical means to protect information security. However, our study found that many keys of the MPFRFT are invalid, which greatly reduces its security. In this paper, we propose a new reformulation of MPFRFT and analyze it using eigen-decomposition-type fractional Fourier transform (FRFT) and weighted-type FRFT as basis functions, respectively. The results show that the effective keys are extremely limited. Furthermore, we analyze the extended encryption methods based on MPFRFT, which also have the security risk of key invalidation. Theoretical analysis and numerical simulation verify our point of view. Our discovery has important reference value for a class of generalized FRFT image encryption methods.

1. Introduction

With the rapid development of information technology, image transmission has become an important means of communication. Traditional symmetric encryption algorithms (such as DES, AES, etc.) are very time-consuming and costly when applied to image encryption. The development of new image encryption algorithms has become the focus of research. Therefore, many image encryption methods have been proposed [1,2]. These include image encryption methods based on multiple-parameter fractional Fourier transform (MPFRFT) [3]. In 2008, Tao et al. proposed an image encryption method based on multiple-parameter fractional Fourier transform (MPFRFT) [3]. In the encryption process, multiple keys are used to expand the key space of the system and thus have better security. Since then, the MPFRFT has become an important means to protect information security, and many research results have been proposed [4,5,6,7,8,9,10,11,12,13,14,15,16,17,18]. The MPFRFT is an extended definition of multifractional Fourier transform [19]. Compared with previous encryption schemes [19,20], the MPFRFT not only uses the period and the transformation order as the keys, but also introduces two vector parameters, and vector parameters increase with the increase of the period, so it has better security. The existing encryption schemes mainly focus on two aspects: One is to use the MPFRFT combined with other encryption methods to ensure security [4,5,6,7,8,9]. For example, its combination with chaos is currently the most used encryption strategy [4,5,6,7], and its combination with other scrambling techniques [8,9], and so on. The second is the improvement of the algorithm. The two vector parameters introduced by the MPFRFT are integers, which will face security risks in applications [10,11]. Therefore, some improved schemes have been proposed [10,11,12,13,14,15,16,17,18]. For example, Ran et al. proposed a modified MPFRFT (m-MPFRFT), which overcomes the security risk of parameter redundancy [10], Zhao et al. proposed the vector power MPFRFT (VPMPFRFT) to overcome the security risk of parameter translation [16], and Kang et al. presented a unified framework for the MPFRFT and proposed new types of transforms in signal processing and information security [17]. These new encryption methods improve the security of image encryption to a certain extent [10,15,16,17]. However, it is not difficult to find that such definitions have the same basis functions as MPFRFT. Whether the security risk of MPFRFT for image encryption affects these encryption methods is also the focus of this paper.
In this paper, we propose a new reformulation of MPFRFT. With the help of the proposed reformulation, the definition of MPFRFT is demonstrated to use eigen-decomposition-type FRFT and weighted-type FRFT as basis functions, respectively. However, our research shows that many parameter keys of either the MPFRFT or its modified schemes are invalid, and it cannot obtain a larger key space with the increase of the weighting term. This is determined by the periodicity of the basis function itself, and we will present a detailed analysis.

2. Reformulation of the MPFRFT

In order to demonstrate our point of view, we propose a new reformulation of the MPFRFT. Firstly, Tao et al. proposed the MPFRFT [3], which is defined as:
F M α ( M , N ) [ f ( t ) ] = l = 0 M 1 A l α ( M , N ) f l ( t ) ,
where the basic functions can be expressed as f l ( t ) = F 4 l / M [ f ( t ) ] ; l = 0 , 1 , 2 , , M 1 . The weighting coefficient, A l α ( M , N ) , is expressed as:
A l α ( M , N ) = 1 M k = 0 M 1 exp { 2 π i M [ ( m k M + 1 ) α ( k + n k M ) l k ] } ,
where M = ( m 0 , m 1 , , m M 1 ) M , N = ( n 0 , n 1 , , n M 1 ) M . According to Shih’s definition [21], the weighting coefficient, A l α , can also be expressed as:
( A 0 α A 1 α A M 1 α ) = 1 M ( u 0 × 0 u 0 × 1 u 0 × ( M 1 ) u 1 × 0 u 1 × 1 u 1 × ( M 1 ) u ( M 1 ) × 0 u ( M 1 ) × 1 u ( M 1 ) × ( M 1 ) ) ( B 0 α B 1 α B M 1 α ) ,
where u = exp ( 2 π i / M ) , and
B k α = exp [ 2 π i α ( m k M + 1 ) ( n k M + k ) M ] ,
where k = 0 , 1 , 2 , , M 1 , m k M and n k N .
Next, we will present a new reformulation of the MPFRFT, and Equation (1) can be re-expressed as:
F M α ( M , N ) [ f ( t ) ] = A 0 α ( M , N ) f 0 ( t ) + A 1 α ( M , N ) f 1 ( t ) + + A M 1 α ( M , N ) f M 1 ( t ) = A 0 α F 0 M [ f ( t ) ] + A 1 α F 4 M [ f ( t ) ] + + A M 1 α F 4 ( M 1 ) M [ f ( t ) ] = ( A 0 α I + A 1 α F 4 M + + A M 1 α F 4 ( M 1 ) M ) f ( t ) = ( I , F 4 M , , F 4 ( M 1 ) M ) ( A 0 α A 1 α A M 1 α ) f ( t ) .
From Equations (3) and (5), we can obtain:
F M α ( M , N ) [ f ( t ) ] = 1 M ( I , F 4 M , , F 4 ( M 1 ) M ) ( u 0 × 0 u 0 × 1 u 0 × ( M 1 ) u 1 × 0 u 1 × 1 u 1 × ( M 1 ) u ( M 1 ) × 0 u ( M 1 ) × 1 u ( M 1 ) × ( M 1 ) ) ( B 0 α B 1 α B M 1 α ) f ( t ) ,
where u = exp ( 2 π i / M ) and B k α is Equation (4). Here, we let:
{ Y 0 = u 0 × 0 I + u 1 × 0 F 4 M + + u ( M 1 ) × 0 F 4 ( M 1 ) M Y 1 = u 0 × 1 I + u 1 × 1 F 4 M + + u ( M 1 ) × 1 F 4 ( M 1 ) M Y 2 = u 0 × 2 I + u 1 × 2 F 4 M + + u ( M 1 ) × 2 F 4 ( M 1 ) M Y M 1 = u 0 × ( M 1 ) I + u 1 × ( M 1 ) F 4 M + + u ( M 1 ) × ( M 1 ) F 4 ( M 1 ) M
Therefore, a new reformulation of the MPFRFT is obtained, as:
F M α ( M , N ) [ f ( t ) ] = 1 M ( Y 0 , Y 1 , , Y M 1 ) ( B 0 α B 1 α B M 1 α ) f ( t ) = 1 M k = 0 M 1 Y k B k α f ( t ) .
where B k α is Equation (4).

3. Security Analysis

We know that the MPFRFT and the multifractional Fourier transform have the same basis function, F 4 l / M ; l = 0 , 1 , , M 1 . Fractional Fourier transform (FRFT) has diversity, so we will discuss the eigen-decomposition-type FRFT and linear weighted-type FRFT as basis functions, respectively.

3.1. Eigen-Decomposition-Type FRFT as a Basis Function

In [3], the basis function involved in the MPFRFT is defined as:
F α [ f ( t ) ] = K α ( u , t ) f ( t ) d t ,
where the transform kernel is given by:
K α ( u , t ) = { A α e i u 2 + t 2 2 cot ϕ i u t csc ϕ ,   α k π δ ( u t ) ,   α = 2 k π δ ( u + t ) ,   α = ( 2 k + 1 ) π .
where ϕ = α π / 2 is interpreted as a rotation angle in the phase plane and A α = ( 1 i cot α ) / 2 π .
As we know, Equation (9) is a continuous FRFT, and a discrete FRFT is used for numerical simulation. At present, the discrete definition [22] closest to the continuous FRFT is:
F α ( m , n ) = k = 0 N 1 v k ( m ) e i π 2 k α v k ( n ) ,
where v k ( n ) is an arbitrary orthonormal eigenvectors set of the N × N discrete Fourier transform (DFT). Equation (11) can be written as:
F α = V D α V H ,
where V = ( v 0 , v 1 , , v N 1 ) , v k is the kth order DFT Hermite eigenvector, and D α is a diagonal matrix defined as:
D α = diag ( 1 , e i π 2 α , , e i π 2 ( N 2 ) α , e i π 2 ( N 1 ) α ) , f o r   N   o d d ,
and
D α = diag ( 1 , e i π 2 α , , e i π 2 ( N 2 ) α , e i π 2 ( N ) α ) , f o r   N   e v e n .
We only prove that N is odd (when N is even, the proof process is the same). In [23,24], the eigenvalues of the DFT can be expressed as λ n = e n π i / 2 . Then, the possible values of the eigenvalue are λ n = { 1 , 1 , i , i } . Therefore, there is:
D α = diag ( ( 1 ) α , ( i ) α , ( 1 ) α , ( i ) α , ( 1 ) α , ( i ) α , ( 1 ) α , ( i ) α , , ( 1   o r 1 ) α ) .
Thus, Equation (7) can be written as:
Y k = u 0 × k × I + u 1 × k × F 4 M + + u ( M 1 ) × k × F 4 ( M 1 ) M ,
where u = exp ( 2 π i / M ) and k = 0 , 1 , , M 1 . The eigen-decomposition-type FRFT is used as the basis function, and Equation (17) is obtained as:
Y k = u 0 × k × F 0 + u 1 × k × F 4 M + + u ( M 1 ) × k × F 4 ( M 1 ) M = u 0 × k V D 0 V H + u 1 × k V D 4 M V H + + u ( M 1 ) × k V D 4 ( M 1 ) M V H = u 0 × k V ( 1 0 0 0 ( i ) 0 0 0 0 ( 1   o r 1 ) 0 ) V H + u 1 × k V ( 1 0 0 0 ( i ) 4 M 0 0 0 ( 1   o r 1 ) 4 M ) V H + + u ( M 1 ) × k V ( 1 0 0 0 ( i ) 4 ( M 1 ) M 0 0 0 ( 1   o r 1 ) 4 ( M 1 ) M ) V H .
Therefore, we obtain Equation (18) as:
Y k = V ( S ( 1 ) ( k ) 0 0 0 S ( i ) ( k ) 0 0 0 S ( 1   o r 1 ) ( k ) ) V H .
From Equation (18), the diagonal matrix only contains S ( 1 ) ( k ) , S ( i ) ( k ) , S ( 1 ) ( k ) , and S ( i ) ( k ) .
When the eigenvalue is 1, S ( 1 ) ( k ) can be expressed as:
S ( 1 ) ( k ) = u 0 × k 1 0 + u 1 × k 1 4 / M + + u ( M 1 ) × k 1 4 ( M 1 ) / M = 1 + e 2 π i 1 k / M + e 2 π i 2 k / M + + e 2 π i ( M 1 ) k / M = 1 ( e 2 π i k / M ) M 1 e 2 π i ( k 0 ) / M .
Therefore, we obtain:
S ( 1 ) ( k ) = { 0 k 0 mod M M k 0 mod M .
When the eigenvalue is i, S ( i ) ( k ) can be expressed as:
S ( i ) ( k ) = u 0 × k ( i ) 0 + u 1 × k ( i ) 4 / M + + u ( M 1 ) × k ( i ) 4 ( M 1 ) / M = 1 + e 2 π i 1 ( k 1 ) / M + e 2 π i 2 ( k 1 ) / M + + e 2 π i ( M 1 ) ( k 1 ) / M = 1 ( e 2 π i ( k 1 ) / M ) M 1 e 2 π i ( k 1 ) / M .
Therefore, there is:
S ( i ) ( k ) = { 0 k 1 mod M M k 1 mod M .
When the eigenvalue is −1, S ( 1 ) ( k ) can be expressed as:
S ( 1 ) ( k ) = u 0 × k ( 1 ) 0 + u 1 × k ( 1 ) 4 / M + + u ( M 1 ) × k ( 1 ) 4 ( M 1 ) / M = 1 + e 2 π i 1 ( k 2 ) / M + e 2 π i 2 ( k 2 ) / M + + e 2 π i ( M 1 ) ( k 2 ) / M = 1 ( e 2 π i ( k 2 ) / M ) M 1 e 2 π i ( k 2 ) / M .
Then, we can obtain:
S ( 1 ) ( k ) = { 0 k 2 mod M M k 2 mod M .
When the eigenvalue is −i, S ( i ) ( k ) can be expressed as:
S ( i ) ( k ) = u 0 × k ( i ) 0 + u 1 × k ( i ) 4 / M + + u ( M 1 ) × k ( i ) 4 ( M 1 ) / M = 1 + e 2 π i 1 ( k 3 ) / M + e 2 π i 2 ( k 3 ) / M + + e 2 π i ( M 1 ) ( k 3 ) / M = 1 ( e 2 π i ( k 3 ) / M ) M 1 e 2 π i ( k 3 ) / M .
Therefore, there is:
S ( i ) ( k ) = { 0 k 3 mod M M k 3 mod M .
From Equations (20), (22), (24), and (26), then, Equation (18) can be written as:
Y k = { Y k k = 0 , 1 , 2 , 3 0 k = 4 , 5 , , M 1 .
Thus, for Equation (8), the MPFRFT is expressed as:
F M α ( M , N ) [ f ( t ) ] = 1 M ( Y 0 , Y 1 , , Y M 1 ) ( B 0 α B 1 α B M 1 α ) f ( t ) = 1 M ( Y 0 , Y 1 , Y 2 , Y 3 , 0 , , 0 ) ( B 0 α B 1 α B M 1 α ) f ( t ) = 1 M ( Y 0 B 0 α + Y 1 B 1 α + Y 2 B 2 α + Y 3 B 3 α ) f ( t ) .
From Equation (28), we find that there are only four effective weighted terms. That is, for the vector parameters ( M , N ) of the MPFRFT, only ( m 0 , m 1 , m 2 , m 3 ; n 0 , n 1 , n 2 , n 3 ) can be used as valid encryption keys, and the other keys ( m 4 , m 5 , , m M 1 ; n 4 , n 5 , , n M 1 ) are invalid. This leads to the security of the MPFRFT being impaired.

3.2. Weighted-Type FRFT as a Basis Function

The MPFRFT is a generalized multifractional Fourier transform, which has the same basis function, F 4 l / M . The multifractional Fourier transform is a generalized definition of the weighted fractional Fourier transform (WFRFT) [21]. The basis functions of the WFRFT are I , F , F 2 , and F 3 . Therefore, we can determine the time-frequency representation of the basis function, as shown in Figure 1. We consider using the WFRFT as the basis function of the MPFRFT.
Shih proposed the WFRFT [21], which is defined as:
F α [ f ( t ) ] = l = 0 3 A l α f l ( t ) ,
with
A l α = cos ( ( α l ) π 4 ) cos ( 2 ( α l ) π 4 ) exp ( 3 ( α l ) i π 4 ) ,
where f l ( t ) = F l [ f ( t ) ] ; l = 0 , 1 , 2 , 3 (F denotes Fourier transform). Shih’s WFRFT with period 4 is also called the 4-weighted-type fractional Fourier transform (4-WFRFT). Equation (29) can also be expressed as:
F α [ f ( t ) ] = ( A 0 α I + A 1 α F + A 2 α F 2 + A 3 α F 3 ) f ( t ) = ( I , F , F 2 , F 3 ) ( A 0 α A 1 α A 2 α A 3 α ) f ( t ) .
According to the definition of the weighting coefficient, A l α [21], then, Equation (31) can be expressed as:
F α [ f ( t ) ] = 1 4 ( I , F , F 2 , F 3 ) ( 1 1 1 1 1 i 1 i 1 1 1 1 1 i 1 i ) ( B 0 α B 1 α B 2 α B 3 α ) f ( t ) ,
where B k α = exp ( 2 π i k α 4 ) , k = 0 , 1 , 2 , 3 . Here, we let:
{ P 0 = I + F + F 2 + F 3 P 1 = I F i F 2 + F 3 i P 2 = I F + F 2 F 3 P 3 = I + F i F 2 F 3 i .
Therefore, the WFRFT can be represented as:
F α [ f ( t ) ] = 1 4 ( P 0 , P 1 , P 2 , P 3 ) ( B 0 α B 1 α B 2 α B 3 α ) f ( t ) .
From Equations (7) and (34), we can obtain:
Y k = u 0 × k × F 0 + u 1 × k × F 4 M + + u ( M 1 ) × k × F 4 ( M 1 ) M = 1 4 ( P 0 , P 1 , P 2 , P 3 ) ( u 0 × k × ( B 0 0 B 1 0 B 2 0 B 3 0 ) + u 1 × k × ( B 0 4 M B 1 4 M B 2 4 M B 3 4 M ) + + u ( M 1 ) × k × ( B 0 4 ( M 1 ) M B 1 4 ( M 1 ) M B 2 4 ( M 1 ) M B 3 4 ( M 1 ) M ) ) = 1 4 ( P 0 , P 1 , P 2 , P 3 ) ( u 0 × k × B 0 0 + u 1 × k × B 0 4 M + + u ( M 1 ) × k × B 0 4 ( M 1 ) M u 0 × k × B 1 0 + u 1 × k × B 1 4 M + + u ( M 1 ) × k × B 1 4 ( M 1 ) M u 0 × k × B 2 0 + u 1 × k × B 2 4 M + + u ( M 1 ) × k × B 2 4 ( M 1 ) M u 0 × k × B 3 0 + u 1 × k × B 3 4 M + + u ( M 1 ) × k × B 3 4 ( M 1 ) M ) ,
where k = 0 , 1 , , M 1 , u = exp ( 2 π i / M ) , and B k α = exp ( 2 π i k α 4 ) . Therefore, Equation (36) is obtained as:
Y k = 1 4 ( P 0 , P 1 , P 2 , P 3 ) ( 1 + exp ( 2 π i 1 k M ) + exp ( 2 π i 2 k M ) + + exp ( 2 π i ( M 1 ) k M ) 1 + exp ( 2 π i 1 ( k 1 ) M ) + exp ( 2 π i 2 ( k 1 ) M ) + + exp ( 2 π i ( M 1 ) ( k 1 ) M ) 1 + exp ( 2 π i 1 ( k 2 ) M ) + exp ( 2 π i 2 ( k 2 ) M ) + + exp ( 2 π i ( M 1 ) ( k 2 ) M ) 1 + exp ( 2 π i 1 ( k 3 ) M ) + exp ( 2 π i 2 ( k 3 ) M ) + + exp ( 2 π i ( M 1 ) ( k 3 ) M ) ) = 1 4 ( P 0 , P 1 , P 2 , P 3 ) ( Q 0 ( k ) Q 1 ( k ) Q 2 ( k ) Q 3 ( k ) ) .
According to Equations (19), (21), (23), and (25), we can easily determine:
Q 0 ( k ) = { M k 0 mod M 0 k 0 mod M ,
Q 1 ( k ) = { M k 1 mod M 0 k 1 mod M ,
Q 2 ( k ) = { M k 2 mod M 0 k 2 mod M ,
and
Q 3 ( k ) = { M k 3 mod M 0 k 3 mod M .
Thus, Equation (36) is simplified as:
Y k = { M 4 P k k = 0 , 1 , 2 , 3 0 k = 4 , 5 , , M 1 .
From Equation (8), the MPFRFT can be expressed as:
F M α ( M , N ) [ f ( t ) ] = 1 M ( Y 0 , Y 1 , , Y M 1 ) ( B 0 α B 1 α B M 1 α ) f ( t ) = 1 4 ( P 0 , P 1 , P 2 , P 3 , 0 , , 0 ) ( B 0 α B 1 α B M 1 α ) f ( t ) = 1 4 ( P 0 B 0 α + P 1 B 1 α + P 2 B 2 α + P 3 B 3 α ) f ( t ) .
At present, the MPFRFT has only four weighted terms, so the effective parameter keys are ( m 0 , m 1 , m 2 , m 3 ; n 0 , n 1 , n 2 , n 3 ) . This is consistent with our previous analysis.

4. Simulation Verification

In Equation (8), the MPFRFT encryption keys are ( M , α , M , N ) . Here, M is a positive integer to determine the number of weighted terms ( M > 4 ), α is the transformation order α , and M and N are vector parameters, where M = ( m 0 , m 1 , , m M 1 ) M and N = ( n 0 , n 1 , , n M 1 ) M . We set the keys to:
{ M = 7 α = 5 M = ( m 0 , m 1 , m 2 , m 3 , m 4 , m 5 , m 6 ) = ( 45 , 8 , 20 , 76 , 657 , 211 , 7 ) N = ( n 0 , n 1 , n 2 , n 3 , n 4 , n 5 , n 6 ) = ( 3 , 234 , 54 , 687 , 763 , 5 , 365 )
Therefore, the encryption keys can be represented as:
( M ; α ; M ; N ) = ( 7 ; 5 ;   45 , 8 , 20 , 76 , 657 , 211 , 7 ;   3 , 234 , 54 , 687 , 763 , 5 , 365 )
and the decryption keys can be represented as:
( M ; α ; M ; N ) = ( 7 ; 5 ;   45 , 8 , 20 , 76 , 657 , 211 , 7 ;   3 , 234 , 54 , 687 , 763 , 5 , 365 )
The simulation results are shown in Figure 2. Figure 2a is the original image, the encrypted image (ciphertext) is shown in Figure 2b, and Figure 2c is the decrypted image. Next, we select a set of wrong keys to decrypt the ciphertext. The selected wrong keys are:
( M ; α ; M ; N ) = ( 7 ; 5 ;   45 , 8 , 20 , 76 , 98 , 321 , 65 ;   3 , 234 , 54 , 687 , 73 , 425 , 5 )
The wrong keys are used to decrypt the ciphertext, and the result is that the original image is well-recovered, as shown in Figure 2d.
Our theoretical analysis was verified by numerical simulation. In Appendix A, the Matlab code of the MPFRFT is presented, and interested researchers can verify it by themselves.

5. Discussion

The m-MPFRFT and VPMPFRFT are generalized definitions based on MPFRFT and are widely used in image encryption. Such image encryption methods will also have security risks of key invalidation.
In 2009, Ran et al. proposed a m-MPFRFT [10]. If B k α in Equation (4) becomes:
B k α ( r k ) = exp [ 2 π i α ( r k M + k ) M ] ,
then the weighting coefficient A l α becomes:
A l α ( ) = 1 M k = 0 M 1 exp { 2 π i M [ α ( k + r k M ) l k ] } ,
where = ( r 0 , r 1 , , r M 1 ) M . Thus, the m-MPFRFT is obtained by:
F M α ( ) [ f ( x ) ] = l = 0 M 1 A l α ( ) f l ( x ) .
Recently, Zhao et al. proposed the definition of VPMPFRFT [15,16]. If B k α in Equation (4) becomes:
B k α ¯ ( r k ) = exp [ 2 π i α k ( r k M + k ) M ] ,
then the weighting coefficient A l α becomes:
A l α ¯ ( ) = 1 M k = 0 M 1 exp { 2 π i M [ α k ( k + r k M ) l k ] } ,
where α ¯ = ( α 0 , α 1 , , α M 1 ) M , = ( r 0 , r 1 , , r M 1 ) M . Then, the definition of the VPMPFRFT can be expressed as:
F M α ¯ ( ) [ f ( x ) ] = l = 0 M 1 A l α ¯ ( ) f l ( x ) .
In the above definition, when B k α is given a different form, the corresponding weighting coefficient is A l α , and various definition forms are obtained. The common features of these definitions have the same basis function, f l ( t ) = F 4 l / M [ f ( t ) ] .
According to the analysis in Section 2, when Equation (43) replaces B k α of Equation (8), thus, the reformulation of m-MPFRFT can be obtained as:
F M α ( ) [ f ( t ) ] = 1 M k = 0 M 1 Y k B k α ( r k ) f ( t ) .
Therefore, when Equation (46) replaces B k α of Equation (8), the reformulation of m-MPFRFT can be obtained as:
F M α ¯ ( ) [ f ( t ) ] = 1 M k = 0 M 1 Y k B k α ¯ ( r k ) f ( t ) .
Compared with the definition of MPFRFT, m-WFRFT and VPMPFRFT are only different in the selection of B k α , while other basis functions are the same. That is, the effective weighting terms of Equations (49) and (50) are only 4. Such image encryption methods also have the security risk of key invalidation.
The m-MPFRFT is now applied to image encryption, and its keys are ( M , α , ) . Here, M is a positive integer to determine the number of weighted terms, α is the transformation order α , and is the vector parameters, = ( r 0 , r 1 , , r M 1 ) M . In the numerical simulation, we take the keys as:
{ M = 8 α = 5 = ( r 0 , r 1 , r 2 , r 3 , r 4 , r 5 , r 6 , r 7 ) = ( 6 , 51 , 43 , 30 , 38 / 3 , 19 , 11 , 62 )
Thus, the encryption keys are:
( M ; α ; ) = ( 8 ; 5 ; 6 , 51 , 43 , 30 , 38 / 3 , 19 , 11 , 62 )
The original image and the encrypted image are shown in Figure 3a,b, respectively.
The correct decryption keys are:
( M ; α ; ) = ( 8 ; 5 ; 6 , 51 , 43 , 30 , 38 / 3 , 19 , 11 , 62 )
The decrypted image is shown in Figure 3c.
According to our analysis, the vector parameters ( r 4 , r 5 , r 6 , r 7 ) are invalid. Therefore, when we use the wrong decryption keys as follows:
( M ; α ; ) = ( 8 ; 5 ; 6 , 51 , 43 , 30 , 45 , 38 , 3 , 91 )
we obtain the decrypted image shown in Figure 3d, and the original image can still be recovered intact.
The keys for an image encryption method based on VPMPFRFT are ( M , α ¯ , ) , where M is a positive integer, α ¯ and are vector parameters, α ¯ = ( α 0 , α 1 , , α M 1 ) M , and = ( r 0 , r 1 , , r M 1 ) M . In the numerical simulation, we take the keys as:
{ M = 9 α ¯ = ( α 0 , α 1 , α 2 , α 3 , α 4 , α 5 , α 6 , α 7 , α 8 ) = ( 6 , 17 , 19 , 30 , 41 / 3 , 52 , 63 , 65 , 76 ) = ( r 0 , r 1 , r 2 , r 3 , r 4 , r 5 , r 6 , r 7 , r 8 ) = ( 37 / 2 , 48 , 59 , 70 / 3 , 81 , 2 , 13 / 3 , 24 , 35 )
Thus, the encryption keys are:
( M ; α ¯ ; ) = ( 9 ; 6 , 17 , 19 , 30 , 41 / 3 , 52 , 63 , 65 , 76 ; 37 / 2 , 48 , 59 , 70 / 3 , 81 , 2 , 13 / 3 , 24 , 35 )
The original image is shown in Figure 4a, and Figure 4b shows the encrypted image.
The correct decryption keys are:
( M ; α ¯ , ) = ( 9 ; 6 , 17 , 19 , 30 , 41 / 3 , 52 , 63 , 65 , 76 ; 37 / 2 , 48 , 59 , 70 / 3 , 81 , 2 , 13 / 3 , 24 , 35 )
The decrypted image is shown in Figure 4c.
According to our analysis, the vector parameter keys ( α 4 , α 5 , α 6 , α 7 , α 8 ) and ( r 4 , r 5 , r 6 , r 7 , r 8 ) are invalid. Therefore, when we use the following wrong decryption keys:
( M ; α ¯ , ) = ( 9 ; 6 , 17 , 19 , 30 , 3 , 5 , 6 , 19 , 7 ; 37 / 2 , 48 , 59 , 70 / 3 , 8 , 73 , 9 , 56 , 58 )
we obtain the decrypted image shown in Figure 4d, and the original image can still be recovered intact.
Both the image encryption method based on MPFRFT and the improved image encryption methods (m-MPFRFT, VPMPFRFT) have the security risk of key invalidation. The fundamental reason for this is caused by the period of the basis function. Since the basis function has a period of 4, there are only 4 valid weighting terms for the definitions (MPFRFT, m-MPFRFT, and VPMPFRFT). In practical application, the first parameter key is also invalid due to B k α ( k = 0 ) .

6. Conclusions

MPFRFT is widely used in information security, and its security mainly depends on parameter keys. However, our study found that many parameter keys are invalid. The MPFRFT is a generalized definition of the WFRFT. Its basis function is extended from the Fourier transform with period 4 to period M (M > 4). Our theoretical analysis shows that the weighted terms of the MPFRFT do not increase with the increase of the period, and there are only four weighted terms. Therefore, the keys of the system are limited, and the proponent cannot obtain a larger key space with the increase of the period. In this way, the security of the MPFRFT cannot be guaranteed. Moreover, we analyzed the generalized definitions (m-MPFRFT and VPMPFRFT) of MPFRFT and proposed the reformulation of the definitions, which also have the security risk of key invalidation. Finally, numerical simulation verified our point of view.

Author Contributions

Methodology, T.Z.; software, T.Z.; validation, T.Z. and Y.C.; investigation, Y.C.; writing—original draft preparation, T.Z.; writing—review and editing, T.Z.; supervision, T.Z.; funding acquisition, T.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This study was supported by the Fundamental Research Funds for the Central Universities (N2123016), and the Scientific Research Projects of Hebei colleges and universities (QN2020511).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to express our great appreciation to the editor and reviewers.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Algorithm A1. MPFRFT_code
%% Multiple-parameter Fractional Fourier Transform (MPFRFT);
%Shih’s fractional Fourier transform as basis function.
function F = MPFRFT(alpha,M,ml,nl,N)
%This code is written by Tieyu Zhao,E-mail:[email protected];
% alpha is the transform order;
% M is the resulting weighting term (period);
% ml and nl are parameters;
% N is the length of the signal;
for l=0:M-1
yy=wfrft(N,4*l/M); % WFRFT
y{l+1}=yy;
end
Al=zeros(1,M);
for l=0:M-1
for k=0:M-1
Al(l+1)=Al(l+1)+exp(2*pi*i*((alpha*(M*ml(k+1)+1)*(M*nl(k+1)+k))-l*k)/M)/M;
end
end
F=zeros(N);
for k=1:M
F=F+Al(k)*y{k};
end

function F = wfrft(N,beta)
% Shih’s fractional Fourier transform (WFRFT)
Y=eye(N);
y1=fftshift(fft(Y))/(sqrt(N));
y2=y1*y1;
y3=conj(y1);
pl=zeros(1,4);
for k=0:3
pl(k+1)=pl(k+1)+exp(i*3*pi*(beta-k)/4)*cos(pi*(beta-k)/2)*cos(pi*(beta-k)/4);
end
F=pl(1)*Y+pl(2)*y1+pl(3)*y2+pl(4)*y3;

References

  1. Chen, W.; Javidi, B.; Chen, X. Advances in optical security systems. Adv. Opt. Photon 2014, 6, 120–155. [Google Scholar] [CrossRef]
  2. Javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Cabre, E.P.; Millan, M.; Nishchal, N.K.; Torroba, R.; Barrera, J.F.; He, W.; et al. Roadmap on optical security. J. Opt. 2016, 18, 083001. [Google Scholar] [CrossRef]
  3. Tao, R.; Lang, J.; Wang, Y. Optical image encryption based on the multiple-parameter fractional Fourier transform. Opt. Lett. 2008, 33, 581–583. [Google Scholar] [CrossRef]
  4. Shan, M.; Chang, J.; Zhong, Z.; Hao, B. Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps. Opt. Commun. 2012, 285, 4227–4234. [Google Scholar] [CrossRef]
  5. Lang, J. Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform and chaos permutation. Opt. Lasers Eng. 2012, 50, 929–937. [Google Scholar] [CrossRef]
  6. Lang, J. Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt. Commun. 2015, 338, 181–192. [Google Scholar] [CrossRef]
  7. Sui, L.; Duan, K.; Liang, J. Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt. Commun. 2015, 343, 140–149. [Google Scholar] [CrossRef]
  8. Keshari, S.; Salim, M.; Modani, S.G. Single channel modified multiple-parameter fractional Fourier transform and scrambling technique. Optik 2015, 126, 5845–5849. [Google Scholar] [CrossRef]
  9. Li, H.; Bai, X.; Shan, M.; Zhong, Z.; Liu, L.; Liu, B. Optical encryption of hyperspectral images using improved binary tree structure and phase-truncated discrete multiple-parameter fractional Fourier transform. J. Opt. 2020, 22, 055701. [Google Scholar] [CrossRef]
  10. Ran, Q.W.; Zhang, H.Y.; Zhang, J.; Tan, L.Y.; Ma, J. Deficiencies of the cryptography based on multiple-parameter fractional Fourier transform. Opt. Lett. 2009, 34, 1729–1731. [Google Scholar] [CrossRef]
  11. Zhao, T.; Ran, Q. The Weighted Fractional Fourier Transform and Its Application in Image Encryption. Math. Probl. Eng. 2019, 2019, 4789194. [Google Scholar] [CrossRef]
  12. Zhou, N.; Dong, T.; Wu, J. Novel image encryption algorithm based on multiple-parameter discrete fractional random transform. Opt. Commun. 2010, 283, 3037–3042. [Google Scholar] [CrossRef]
  13. Lang, J. Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform. Opt. Commun. 2012, 285, 2584–2590. [Google Scholar] [CrossRef]
  14. Lang, J. A no-key-exchange secure image sharing scheme based on Shamir’s three-pass cryptography protocol and the multiple-parameter fractional Fourier transform. Opt. Express 2012, 20, 2386–2398. [Google Scholar] [CrossRef]
  15. Ran, Q.; Zhao, T.; Yuan, L.; Wang, J.; Xu, L. Vector power multiple-parameter fractional Fourier transform of image encryption algorithm. Opt. Lasers Eng. 2014, 62, 80–86. [Google Scholar] [CrossRef]
  16. Zhao, T.; Ran, Q.; Yuan, L.; Chi, Y.; Ma, J. Security of image encryption scheme based on multi-parameter fractional Fourier transform. Opt. Commun. 2016, 376, 47–51. [Google Scholar] [CrossRef]
  17. Kang, X.; Tao, R.; Zhang, F. Multiple-Parameter Discrete Fractional Transform and its Applications. IEEE Trans. Signal Process. 2016, 64, 3402–3417. [Google Scholar] [CrossRef]
  18. Chen, B.; Yu, M.; Tian, Y.; Li, L.; Wang, D.; Sun, X. Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process. 2018, 12, 2238–2249. [Google Scholar] [CrossRef]
  19. Zhu, B.; Liu, S.; Ran, Q. Optical image encryption based on multifractional Fourier transforms. Opt. Lett. 2000, 25, 1159–1161. [Google Scholar] [CrossRef]
  20. Zhu, B.; Liu, S. Optical image encryption based on the generalized fractional convolution operation. Opt. Commun. 2001, 195, 371–381. [Google Scholar] [CrossRef]
  21. Shih, C.C. Fractionalization of Fourier-Transform. Opt. Commun. 1995, 118, 495–498. [Google Scholar] [CrossRef]
  22. Candan, C.; Kutay, M.A.; Ozaktas, H.M. The discrete fractional Fourier transform. IEEE Trans. Signal Process. 2000, 48, 1329–1337. [Google Scholar] [CrossRef] [Green Version]
  23. McClellan, J.; Parks, T. Eigenvalue and eigenvector decomposition of the discrete Fourier transform. IEEE Trans. Audio Electroacoust. 1972, 20, 66–74. [Google Scholar] [CrossRef]
  24. Dickinson, B.; Steiglitz, K. Eigenvectors and functions of the discrete Fourier transform. IEEE Trans. Acoust. Speech Signal Process. 1982, 30, 25–31. [Google Scholar] [CrossRef]
Figure 1. (a) Time-frequency representation of Fourier transform, and (b) time-frequency representation of fractional Fourier transform.
Figure 1. (a) Time-frequency representation of Fourier transform, and (b) time-frequency representation of fractional Fourier transform.
Symmetry 13 01803 g001
Figure 2. Image encryption based on MPFRFT: (a) original image, (b) encrypted image, (c) decrypted image with correct keys, and (d) decrypted image with wrong keys.
Figure 2. Image encryption based on MPFRFT: (a) original image, (b) encrypted image, (c) decrypted image with correct keys, and (d) decrypted image with wrong keys.
Symmetry 13 01803 g002
Figure 3. Image encryption based on m-MPFRFT: (a) original image, (b) encrypted image, (c) decrypted image with correct keys, and (d) decrypted image with wrong keys.
Figure 3. Image encryption based on m-MPFRFT: (a) original image, (b) encrypted image, (c) decrypted image with correct keys, and (d) decrypted image with wrong keys.
Symmetry 13 01803 g003
Figure 4. Image encryption based on VPMPFRFT: (a) original image, (b) encrypted image, (c) decrypted image with correct keys, and (d) decrypted image with wrong keys.
Figure 4. Image encryption based on VPMPFRFT: (a) original image, (b) encrypted image, (c) decrypted image with correct keys, and (d) decrypted image with wrong keys.
Symmetry 13 01803 g004
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhao, T.; Chi, Y. Key Validity Using the Multiple-Parameter Fractional Fourier Transform for Image Encryption. Symmetry 2021, 13, 1803. https://doi.org/10.3390/sym13101803

AMA Style

Zhao T, Chi Y. Key Validity Using the Multiple-Parameter Fractional Fourier Transform for Image Encryption. Symmetry. 2021; 13(10):1803. https://doi.org/10.3390/sym13101803

Chicago/Turabian Style

Zhao, Tieyu, and Yingying Chi. 2021. "Key Validity Using the Multiple-Parameter Fractional Fourier Transform for Image Encryption" Symmetry 13, no. 10: 1803. https://doi.org/10.3390/sym13101803

APA Style

Zhao, T., & Chi, Y. (2021). Key Validity Using the Multiple-Parameter Fractional Fourier Transform for Image Encryption. Symmetry, 13(10), 1803. https://doi.org/10.3390/sym13101803

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop