1 Introduction

The French scientist Jean Baptiste Joseph Fourier suggested the use of Fourier transform (FT) while solving a heat conduction dilemma in 1807. However, with the extension of research theme and area, the fractional power of FT operator appeared in the mathematical literature in 1929 [13]. The fractional Fourier transform (FrFT) has later on established many applications in the area of quantum mechanics [4], signal processing [57], pattern recognition [8], and optical, image and video processing [911]. The FrFTs are well known as rotational Fourier transform or angular Fourier transform in few papers [12, 13]. The continuous FrFT is often implemented in optics [14, 15]. It is a recognized fact that difference equations have a richer solution set than their continuous limit differential equations [16]. The window functions in the fractional domain using different discrete fractional Fourier transform (DFrFT) classes have been analyzed in [17]. Fractional Fourier domain decomposition for continuous and discrete signals and systems has been introduced in [18]. Nowadays, digital implementation of fractional Fourier transform is applied in many applications areas [1924]. Several discrete fractional transforms have been successfully used for one-dimensional (1-D), two-dimensional (2-D) and three-dimensional (3-D) signals [1925].

The goal of this paper is to review the definitions of discrete fractional Fourier transform (DFrFT), discrete fractional cosine transform (DFrCT) and discrete fractional Hartley transform (DFrHT) and their applications in the area of image and video processing. The paper is organized as follows: Section 2 presents definitions of Fractional transforms, 1-D/2-D DFrFT, DFrCT, DFrHT. Section 3 presents the simulation results for image and video compression and encryption using discrete fractional transforms. The conclusion of this paper is given in the last section.

2 Fractional transforms

In the last decade, researchers have delved in the fractional transforms and their applications [27, 28]. Fractional transforms are one of the key tools in many disciplines such as communication, signal processing, and control systems etc. The Namias in 1980 [4] introduced FrFT, a generalization of the classical FT. The FrFT is a cohesive time-frequency transform which can reveal the characteristics of signal gradually changing from time domain to frequency domain with its order increasing from 0 to 1. Performance of FrFT becomes better with extra degree of freedom. The results of the Namias were refined by the McBride and Kerr in 1987 [26] by developing an operational calculus to define the FrFT. The one-dimensional FrFT is defined as FrFT of order \(\alpha \) of \(x(u)\) denoted by \(X_{\alpha }\)(u) [27]:

$$\begin{aligned}&\!\!\!\!X_\alpha \left( u \right)=\int \limits _{-\infty }^\infty {x\left( t \right)K_\alpha \left( {t,u} \right)\text{ d}t} \end{aligned}$$
(1)
$$\begin{aligned}&\!\!\!\!K_\alpha ({t,u}) \nonumber \\&\!\!\!\quad =\left\{ {\begin{array}{ll} \sqrt{\frac{1-j\cot \alpha }{2\pi }}e^{\tiny \begin{array}{l}j({{( {u^{2}+t^{2}})}/2})\cot \alpha \\ \quad -jut\cos \mathrm{ec}\, ( \alpha )\end{array} }&\text{ if}\; \alpha \; \text{ is}\; \text{ not}\; \text{ multiple}\; \text{ of}\; \pi \\ \delta ({t-u})&\text{ if}\;\alpha \; \text{ is}\; \text{ multiple}\; \text{ of}\; 2\pi \\ \delta ({t+u})&\text{ if}\; \alpha + \pi \; \text{ is}\; \text{ multiple}\; \text{ of}\; 2\pi \\ \end{array}} \right. \nonumber \\ \end{aligned}$$
(2)

where \(\alpha ={a\pi }/2\) indicates the rotation angle of the transformed signal for FrFT, \(a\) is the fractional order of the FrFT, and the FrFT operator is designated by \(X_\alpha \). From definition, it is apparent that FrFT is periodic with period 4 and additive in index. The simplest generalization of the FrFT for two dimensions is given by Eqs. (3) and (4):

$$\begin{aligned}&\!\!\!\!X_{\alpha ,\beta } ({u,s})=\int \limits _{-\infty }^\infty {\int \limits _{-\infty }^\infty {K_{\alpha ,\beta } ({u,s;t,r} )x({t,r})\text{ d}t\text{ d}r}} \end{aligned}$$
(3)
$$\begin{aligned}&\!\!\!\!K_{\alpha ,\beta } ({u,s;t,r})=K_\alpha ({u,t} )K_\beta ({s,r}) \end{aligned}$$
(4)

In case of two-dimensional FrFT, we have to consider two angles of rotation, \(\alpha ={a\pi }/2\) and \(\beta ={b\pi }/2\). If one of these angles of rotation is zero, then the two-dimensional kernel reduces to one-dimensional kernel. The signal can be recovered back by 2-D FrFT operation with inverted angles \((-\alpha ,\;-\beta )\).

Although the fractional Fourier transforms have been the mainstay in transform, a more recent approach from the last decade known as DFrFT simplifies both the mathematics and physical analysis. The advantages of discrete fractional transforms are that it is an evolutionary computational method, high compression ratio and that its fractional part provides extra degree of freedom in computations. Huffman decoding [29] is difficult due to different code lengths at decoder and some prior knowledge of probabilities of symbols is required from encoder, whereas in case of discrete fractional transforms, only the inverse keys of encoder are required at the decoder.

The usefulness of discrete transforms in image and video processing applications is presented in paper.

2.1 Discrete fractional Fourier transforms

After the continuous FrFT has been derived, many researchers have attempted their best to develop a discrete counterpart of it. It was the Santhanam and McClellan [30] who have first reported the work in 1995. The properties such as unitarity, index additivity, reduction to DFT when the order is equal to unity and approximation of the continuous FrFT are to be fulfilled by a valid discrete input/discrete output FrFT.

Discrete fractional Fourier transforms must obey the rotational properties quite like the continuous FrFT. These rotational properties can be easily realized by the power law of the kernel matrix in discrete case. So the fractional power of kernel is required for computing the DFrFT. In [31, 32], a method for computing the DFrFT has been proposed. DFrFT can be derived as linear combination of identity operation, discrete Fourier transforms (DFT), time inverse operation and inverse DFT (IDFT) [33]. Unfortunately, this DFrFT cannot have similar outputs as those with the continuous FrFT. The development of current improved DFrFT introduced a commuting matrix M to compute the real eigenvectors of the DFT kernel matrix H:

$$\begin{aligned} M=\left[ {{\begin{array}{c@{\quad }c@{\quad }c@{\quad }c@{\quad }c@{\quad }c} 2&1&0&0&\ldots&0 \\ 1&{2\cos \omega }&1&0&\cdots&0 \\ 0&1&{2\cos 2\omega }&1&\cdots&0 \\ \vdots&\vdots&\vdots&\ddots&\,&\vdots \\ 1&0&0&0&\cdots&{2\cos ({N-1})\omega } \\ \end{array}}} \right] \nonumber \\ \end{aligned}$$
(5)

where \(\omega ={2\pi }/N\), and \(N\) is the size of the DFT kernel matrix. Matrix M commutes with the matrix H and satisfies commutative property: MH = HM. The eigenvectors of matrix M and H are the same, but their eigenvalues are different. The eigenvectors of M are orthonormal to each other, and eigenvalues are real because M is a real symmetric matrix. In [32, 34], Pei and Yeh used the DFT eigenvectors obtained from matrix M to construct the DFrFT kernel. The eigenvectors of matrix M are treated as discrete Hermite functions [34, 35]. The transformation kernel of DFrFT can be easily defined by determining the fractional powers of the eigenvalues. The transform kernel of the DFrFT can be calculated as

$$\begin{aligned} D_\alpha =F^{{2\alpha }/\pi }=VD^{{2\alpha }/\pi }V^{T} \end{aligned}$$
(6)

where \(\alpha \) indicates the rotation angle of the DFrFT. \(V=[ {v_0 | {v_1 | {\cdots | {v_{N-2} | {v_{N-1} } } } } } ]\) for N odd, \(V=[ v_0 | v_1 | \cdots \) \(| v_{N-2} | {v_N } ]\) for N even, and \(V_{k}\) is the kth-order DFT Hermite eigenvector. \(D^{{2\alpha }/\pi }\) is the diagonal matrix with eigenvalues of DFrFT in the diagonal entries. A method for finding the DFT Hermite eigenvectors \(v_{k}\) is presented in [22, 32]. In Table 1, there exists a jump in the last eigenvalues for the two even-length cases and (6) can be written as:

$$\begin{aligned} D_\alpha =\sum _{k=0}^{N-1} {e^{-jk\alpha }v_k v_k^T } , \quad \text{ for}\,N=4m+1,4m+3 \end{aligned}$$
(7)

The DFrFT of a signal can be computed with a transformation kernel with Eq. (8).

$$\begin{aligned} D_\alpha x=F^{{2\alpha }/\pi }x=VD^{{2\alpha }/\pi }V^{T}x \end{aligned}$$
(8)

To compute inverse DFrFT (IDFrFT) [33], DFrFT is calculated with order –\(\alpha \).

$$\begin{aligned} x=F^{{-2\alpha }/\pi }D_\alpha =VD^{{-2\alpha }/\pi }V^{T}D_\alpha \end{aligned}$$
(9)

For 2-D DFrFT, two individual angles of rotation \(\alpha \) and \(\beta \) in two dimensions are taken and can be implemented by row–column computation in case of 2-D separable kernel. Then, the forward and inverse 2-D DFrFT for (\(m, n\)) and (\(p, q\)) points are defined with separable form as:

$$\begin{aligned}&\quad \!\!\!D_{({\alpha ,\beta })} ({m,n} )=\sum _{p=0}^{M-1} {\sum _{q=0}^{N-1} {x({p,q} )D_{({\alpha ,\beta })} } } ({p,q,m,n}) \nonumber \\ \end{aligned}$$
(10)
$$\begin{aligned}&\quad \!\!\!x({p,q})=\sum _{m=0}^{M-1} {\sum _{n=0}^{N-1} {D_{({\alpha ,\beta })}({m,n})D_{(-\alpha ,-\beta )} ({p,q,m,n})}} \nonumber \\ \end{aligned}$$
(11)

The 2-D DFrFT also keep the preferred properties of continuous 2-D FrFT. In the present paper, applications of DFrFT in two dimensions, that is, in image and video compression and encryption, are discussed.

Table 1 Eigenvalues assignment rule of DFrFT kernel matrix

2.2 Discrete fractional Cosine transform

The discrete fractional cosine transform (DFrCT) is a general form of discrete Cosine transform (DCT), which has an additional free parameter that can be used in all applications where DCT is found to be useful. The DCT of a sequence \(\left\{ {x[n],0\le n\le N-1} \right\} \) is defined [3741] with Eqs. (12) and (13):

$$\begin{aligned} X\left( k \right)&= \alpha \left( k \right)\sum _{n=0}^{N-1} {x\left[ n \right]} \cos \left[ {\frac{\left( {2n+1} \right)\pi k}{2N}} \right], \nonumber \\&\!\!\!\!\quad \text{ for}\; 0\le k\le N-1 \end{aligned}$$
(12)

where

$$\begin{aligned} \alpha \left( k \right)=\left\{ {\begin{array}{ll} \frac{1}{\sqrt{N}}&\quad \text{ for}\; k=0 \\ \sqrt{\frac{2}{N}}&\quad \text{ for}\; 1\le k\le N-1 \\ \end{array}} \right. \end{aligned}$$
(13)

The elements of one-dimensional DCT kernel matrix are given by equation (14):

$$\begin{aligned}&\!E_{DCT} ({k,n} )\nonumber \\&\quad \!=\!\left\{ \! {\begin{array}{l@{\quad }l} \frac{1}{\sqrt{N}},k\!=\!0;&\ 0\!\le \! n\!\le \! N\!-\!1 \\ \sqrt{\frac{2}{N}}\cos \left[{\frac{({2n+1})\pi k}{2N}}\right];&\ 1\!\le \! k\!\le \! N\!-\!1;0\!\le \! n\!\le \! N\!-\!1 \\ \end{array}} \right. \nonumber \\ \end{aligned}$$
(14)

Because the sequence is orthogonal, the inverse DCT (IDCT) can be recovered as:

$$\begin{aligned} x[n]&= \sum _{k=0}^{N-1} {\alpha (k)} X(k)\cos \left[{\frac{({2n+1})\pi k}{2N}}\right],\nonumber \\&\quad 0\le n\le N-1 \end{aligned}$$
(15)

The DFrCT uses the eigen decomposition of the DCT kernel. And the exclusive eigenvectors are obtained from the even Hermite–Gauss eigenvectors of the Fourier matrix in the cosine case. The kernel matrix of N point DFrCT is defined as [36, 42]:

$$\begin{aligned} C_{N,\alpha }&= V_N D_N^{{2\alpha }/\pi } V_N^T \nonumber \\&= V_N \left[ {{\begin{array}{cccc} 1&\,&0&\\&{e^{-2j\alpha }}&\,&\\&\,&\ddots&\\&\,&{e^{-j2\left( {N-1} \right)\alpha }} \\ \end{array} }} \right]V_N^T \end{aligned}$$
(16)

where \(V_N =\left[ {v_0 \left| {v_1 \left| {\cdots \left| {v_{2N-2} } \right.} \right.} \right.} \right],\) \(v_{k}\) is the eigenvector derived from kth-order DFT Hermite eigenvector.

DFrCT has the mathematical property of unitarity, additivity of rotations, periodicity and reality [35]. In image compression and encryption, two-dimensional DFrCT is used. Two-dimensional DFrCT is used as two times one-dimensional DFrCT (row-wise and column- wise). Two angles of rotation \(\alpha \) and \(\beta \) in two dimensions are taken separately. Applications of DFrCT for 2-D are reviewed with simulation results.

2.3 Discrete fractional Hartley transform

The need of fractional order and its computation has been investigated in many of the engineering and science applications [43, 44]. Thus, the transform kernel \(K_H^\alpha \left( {u,u^{{\prime }}} \right)\)of fractional Hartley transform is given by:

$$\begin{aligned} K_H^\alpha ({u,u^{{\prime }}})=\sum _{n=0}^\infty {\lambda _n^\alpha } e_n (u)e_n ({u^{{\prime }}}) \end{aligned}$$
(17)

The relation between fractional Hartley transforms (FrHT) and fractional Fourier transform (FrFT) is given as:

$$\begin{aligned} g_H^\alpha ({u^{{\prime }}})=\frac{1+e^{\frac{j\alpha \pi }{2}}}{2}g_F^\alpha ({u^{{\prime }}})+\frac{1-e^{\frac{j\alpha \pi }{2}}}{2}g_F^\alpha ({-u^{{\prime }}}) \end{aligned}$$
(18)

The two-dimensional FrHT can be computed by applying one-dimensional transform row-wise and column-wise separately. The relation between DFrFT and DFrHT is given by:

$$\begin{aligned} g_F^\alpha ({u^{{\prime }}})=\frac{1+e^{\frac{j\alpha \pi }{2}}}{2}g_H^\alpha ({u^{{\prime }}})+e^{j({\pi /2})\alpha }\frac{1-e^{\frac{j\alpha \pi }{2}}}{2}g_H^\alpha ( {-u^{{\prime }}}) \nonumber \\ \end{aligned}$$
(19)

Moreover, if the real and imaginary parts of the DFrHT are both even symmetric, then \(g_F^\alpha \left( {u^{{\prime }}} \right)=g_H^\alpha \) means that DFrFT is equal to DFrHT.

3 Discrete fractional transforms applications

The applications of discrete fractional transforms in image and video are discussed in this section.

3.1 Image compression

To expedite transmission and reduce storage requirements, image compression means image with smallest possible number of bits without loss of information [45, 46] at receiving end. Two fundamental components of compression are redundancy and irrelevancy reduction. Certain image processing operations such as compression and encryptions are more perceptive and proficient if we process the image in a different domain like frequency domain and spatial domain [47]. A motivating aspect of using a frequency domain representation of an image is that it is much more efficient to decorrelate an image in the frequency domain than in the spatial domain. For image compression, different frequency domains techniques are discussed in the literature. In our paper, we are reviewing image compression with 2-D discrete fractional transforms. The following steps are used for image compression:

  1. Step 1:

    An image is first separated into non-overlapped subimages. The most popular subimage sizes are 8 \(\times \) 8 AND 16 \(\times \) 16. For simulation results, implementation scheme subimage size chosen is \(8\times 8\).

  2. Step 2:

    A 2-D discrete fractional transform (DFrFT, DFrCT and DFrHT) is applied to each block at optimum value of fractional order with selected compression percentage. The degree of data reduction as a result of the compression process is known as compression percentage. For simplicity, the ‘\(\alpha \)’ order along (rows) and y (columns) directions is taken to be same. This is done to convert the gray-scale levels of pixels in spatial domain into coefficients in transform domain.

  3. Step 3:

    The quantization of these coefficients is done to selectively eliminate or more coarsely quantize the coefficients that carry the least information. A compromise can be made between image quality and compression percentage by adjusting the coarseness of the quantizer called cutoff value. The optimized quantized coefficients are arranged from lower-frequency to higher-frequency components and further compressed by efficient run-length coding approach.

  4. Step 4:

    At decoding end, simply contrary process of encoding using inverse 2-D discrete fractional transform is performed. Inverse discrete fractional transform is obtained by inverted value of ‘\(\alpha \)’ that was used in forward discrete fractional transform with the same value.

Various parameters are used to study the properties of the compressed image. The most commonly used parameters to estimate image-compression algorithms are compression percentage, peak signal- to-noise ratio (PSNR) and mean square error (MSE). In Eq. (21), the PSNR value in decibels (dB) is used to measure the difference between the decoded image ‘r’ and the original image ‘o’. In general, the larger the PSNR value, the better the image quality.

$$\begin{aligned}&\!\!\!\text{ MSE}=\left[ {\frac{1}{MN}\sum _{i=0}^{M-1} {\sum _{j=0}^{N-1} {\left[ {r ({i,j})-o ( {i,j})} \right]^{2}} } } \right] \end{aligned}$$
(20)
$$\begin{aligned}&\!\!\!\text{ PSNR}=10\log _{10} \left[\frac{M \times N}{MSE}\right] \end{aligned}$$
(21)

where \(M\times N\) is the size of the image.

Numerical simulations have been executed to estimate the strength of the image compression technique. The original images taken are Baboon, Boats, House, Flower and Pepper with \(256\times 256\) pixels. These images are compressed to the compression percentages of 10 %, 20, 30, 40, 50 and 75 % by varying values of fractional order ‘\(a\)’. The minimum value of compression percentage taken in the simulation is 10 %, and the maximum is 75 %. We observed that the optimum compression performance is achieved for values of fractional order ‘\(a\)’ varying between 0 and 1. The optimum value of ‘\(a\)’ (\(a_\mathrm{opt})\) is dependent both on the image and on the compression percentage. Figure 1 shows the plots for PSNR vs. ‘\(a\)’ for different images at selected compression percentage of 10 %. Larger PSNR and low MSE are considered for good-quality compressed image. MSE and PSNR are metric parameters that illustrate the performance of discrete fractional transforms.

Fig. 1
figure 1

Fractional-order \(a\) vs. PSNR of different images using DFrFT with 10 %

The optimum value of ‘\(a\)’ (\(a_\mathrm{opt})\) is selected for maximum PSNR and minimum MSE at particular compression percentage for an image in Fig. 1. When simulation results are repeated for number of times, the error bar graph is shown in Fig. 2.

Fig. 2
figure 2

Error bar graph of different images using DFrFT with 10 %

In Table 2, for Baboon image, performance of DFrFT at 20 % compression percentage, when \(a_\mathrm{opt}\) is 0.91, gives high PSNR of 50.663, and low MSE of 0.412. Table 3 gives the results of different images for ‘\(a_\mathrm{opt}\)’ at selected compression percentage (10 %), compressed using DFrFT and DFrCT.

Table 2 MSE and PSNR at optimum \(a\) and selected compression for Baboon using DFrFT
Table 3 MSE & PSNR at optimum \(a\) and selected compression (10 %) using DFrFT and DFrCT

Figure 3 is the original Baboon image of \(256\times 256\) and shows the compressed images for compression percentage = 10 % using DFrFT, DFrCT and DFrHT.

Fig. 3
figure 3

Simulation results of Baboon image with three transforms at compression percentage = 10 %. a The original Baboon image, b compressed using DFrFT, c compressed using DFrCT, d compressed using DFrHT

Figure 4 shows effect on PSNR for compression percentages of 10, 20, 30, 40, 50 and 75 % at optimum value ‘\(a\)’ for Baboon and Barbara images using all three transforms.

Fig. 4
figure 4

Compression percentage vs. PSNR of a Baboon and b Barbara image for DFrFT, DFrCT and DFrHT

Figure 4 shows that at the highest compression percentage, PSNR is lowest, and at the lowest compression percentage, PSNR is highest. We observed that the DFrFT is better than DFrCT and DFrHT for both images. However, the performance of DFrCT is better than DFrHT in Baboon image but wavering in the Barbara image. So, it is evident that DFrFT provides better PSNR in comparison with DFrCT and DFrHT. The reason is that in time-frequency representations, generally a plane has two orthogonal axes corresponding to time and frequency, respectively. If a signal is represented along time axis, its Fourier transform is represented along the frequency axis. The Fourier transform operator is viewed as a change in the representation of the signal corresponding to a counterclockwise axis rotation of \(\pi \)/2 rad. In context of DFrFT, for any vector at 45\(^{\circ }\), it performs same for time and frequency plane equally. Image compression with DFrFT performs better in frequency domain and tries to save bandwidth by varying fractional order 0–1.

The comparison of discrete fractional transforms and JPEG [48] is given in Table 4 for Lena and Pepper images.

Table 4 Comparison of discrete fractional transforms and JPEG

It was observed that for (8 \(\times \) 8) blocks, discrete fractional transform shows better performance in image quality except in encoding and decoding time of CPU. The improvement in PSNR for Lena and Pepper images is 9.89 and 8.21 dB, respectively.

3.2 Image encryption

An encryption technique transforms the image such that only authorized users can understand the meaning of the image using encryption keys. A number of review papers are available on image and video encryption providing a more or less inclusive overview of the techniques proposed so far [4954]. It has been recently noticed that cascaded discrete fractional transforms with random phase filtering can be used in encryption of images [5559]. Tao et al. in [60] proposed a scheme utilizing random phase encoding in the fractional Fourier domain; two images can be encrypted into one encrypted image with stationary white distribution. Image encryption benefits from the extra degree of freedom that is provided by discrete fractional orders. The n-stage of discrete fractional transforms can provide n-dimensional extra keys indicated by the fractional orders. Two individual fractional orders along x-axis and y-axis are used in two-dimensional discrete fractional-order transforms. Such a system can have \(n-1\) random phase filters, so that the total encryption keys can be increased to as many as \(3n-1\).

The order ‘\(\alpha \)’ along x and y directions is taken to be the same, that is, \(\alpha _x =\alpha _y =\alpha \), and three stages of DFrCT are cascaded together. In the intermediate planes, two randomly encoded phase masks are used. The algorithm consists of two parts, encryption to encrypt the image and decryption to retrieve the image back.

Consider real-valued two-dimensional image data, \(f(x_0 ,\) \(y_0 )\), which is to be encrypted. The image is discrete-fractional-cosine-transformed three times using fractional-orders \(\alpha _{1}\), \(\alpha _{2}\) and \(\alpha _{3}\), respectively. In the intermediate stages, we put two random phase masks (RPM),

$$\begin{aligned} p_1 ({x_1 ,y_1 })=\exp \left[ {-\iota 2\pi \varphi _1 ({x_1 ,y_1 })} \right] \end{aligned}$$
(22)

and

$$\begin{aligned} p_2 ({x_2 ,y_2 })=\exp \left[ {-\iota 2\pi \varphi _2 ({x_2 ,y_2 })} \right] \end{aligned}$$
(23)

serving as phase filters, respectively. Here, functions \(\varphi _1 (x_1 ,\) \(y_1 )\) and \(\varphi _2 (x_2 ,y_2 )\) are randomly generated homogeneously distributed functions with values (0, 1). Thus, the resultant transformed function \(\Omega ({x,y})\) can be written as in Eqs. (2426):

$$\begin{aligned} \Omega ( {x,y})=F_c^{\alpha 3} \left\{ {\Omega _2( {x_2 ,y_2 })p({x_2 ,y_2 })} \right\} \end{aligned}$$
(24)

with

$$\begin{aligned} \Omega _2 ({x,y})=F_c^{\alpha 2} \left\{ {\Omega _1 ({x_1 ,y_1 })p({x_1 ,y_1})} \right\} \end{aligned}$$
(25)

and

$$\begin{aligned} \Omega _1 ({x_1 ,y_1})=F_c^{\alpha 1} \left\{ {f ({x_0 ,y_0 })} \right\} \end{aligned}$$
(26)

The final resultant function \(\Omega \left( {x,y} \right)\) is the encrypted image. The decryption process is the inverse operation with respect to encryption. First, take a DFrCT of order-\(\alpha _{3}\) on the encrypted image \(\Omega \left( {x,y} \right)\), multiply the random phase mask \(p_2^*\left( {x_1 ,y_1 } \right)\) and then get the midterm function \(\Omega _2 \left( {x_2 ,y_2 } \right)\). Next, perform a fractional Fourier transform of order-\(\alpha _{2 }\) on the function \(\Omega _2 \left( {x_2 ,y_2 } \right)\) and then multiply it by the phase mask \(p_1^*\left( {x_1 ,y_1 } \right)\); thus, function \(\Omega _1 \left( {x_1 ,y_1 } \right)\) will be recovered. After another fractional Fourier transform of order-\(\alpha _{1 }\) on the function \(\Omega _1 \left( {x_1 ,y_1 } \right)\), finally get the original image \(f\left( {x_0 ,y_0 } \right)\). Here, the mask \(p_2^*\left( {x_1 ,y_1 } \right)\) and \(p_1^*\left( {x_1 ,y_1 } \right)\) are the complex conjugate of \(p_2 \left( {x_1 ,y_1 } \right)\) and \(p_1 \left( {x_1 ,y_1 } \right)\), respectively.

Encryption and decryption results for Baboon, Boats, Flower, House and Pepper images of 256 \(\times \) 256 pixels using discrete fractional transforms (DFrFT, DFrCT) are obtained. Numerical simulations have been performed to examine the performance of discrete fractional transforms (DFrFT, DFrCT). The original Baboon image is encrypted with fractional keys {1, 0.33, 0.8} using DFrCT and {0.5, 0.5, 0.5} using DFrFT as shown in Figs. 5 and 6, respectively. The effect on PSNR is calculated, and it is observed that in DFrCT, the value of PSNR decreases. Figure 5 shows that PSNR affects much more in DFrCT as compared to DFrFT even if single right key is not used for decryption.

Fig. 5
figure 5

Simulation results with DFrCT. a original Baboon image, b encrypted Baboon image (1, 0.33, 0.8) with PSNR = 79.072, c incorrectly decrypted image (\(-0.6, -0.33, -0.8\)) with PSNR = 54.31, d incorrectly decrypted image (\(1, -0.40, -0.8\)) with PSNR = 78.92, e incorrectly decrypted image (\(-1, -0.33, -0.5\)) with PSNR = 78.41, f correctly decrypted image (\(-1,-0.33, -0.8\)) with PSNR = 80.04

Fig. 6
figure 6

Simulation results with DFrFT a original Baboon image, b encrypted Baboon image (\(0.5, 0.5, 0.5\)) with PSNR = 60.46, c incorrectly decrypted image (\(-0.6, -0.5, -0.5\)) with PSNR = 54.46, d incorrectly decrypted image (\(-0.5, -0.4, -0.5\)) with PSNR = 53.20, e incorrectly decrypted image (\(-.5, -0.5, -0.7\)) with PSNR = 53.20, f correctly decrypted image (\(-0.5, -0.5, -0.5\)) with PSNR = 53.20

There are many aspects of security analysis for evaluating how a system behaves with common noise attacks. The main noise of consideration is salt and pepper noise. The angle of rotation \(\alpha =a\pi \)/2 depends on fractional-order ‘\(a\)’. The length of fractional part of \(a\) can be increased, and it will be difficult for attacker to find the correct key. Figure 7 shows salt & pepper noise and decrypted image for DFrFT.

Fig. 7
figure 7

a Original Barbara image, b encrypted using DFrFT and attacked with salt–pepper noise, and c decrypted using DFrFT

3.3 Video encryption

From the past decade, many people around the world acquire, utilize and share videos via Internet [6165]. Security and protection of video contents are the main demand of users. Raw video data consist of a series of still images. We have discussed image encryption techniques as priority.

An encryption and decryption algorithm is implemented for video encryption based on discrete fractional transforms. A number of examples of video sequences at 25 frames per second have been encrypted using discrete fractional cosine transforms. Four successive frames from a video clip, and their encrypted form based on DFrCT are depicted in Figs. 8 and 9, respectively.

Fig. 8
figure 8

A sequence of four frames (0–3): note the motion of arms

Fig. 9
figure 9

Encrypted video frames of their respective frames

The advantages of the proposed algorithm are as follows:

  1. a.

    Multi-keys used to encrypt video frame will enhance the security strength of video.

  2. b.

    Three-dimensional discrete fractional transform is separable transform, and it can be implemented as a series of one-dimensional transform (or as a two-dimensional transform followed by a one-dimensional transform). Each frame of video clip is encrypted with encryption key column-wise and row-wise and so creates difficulty for adversary to decrypt each frame of same video scene.

  3. c.

    Because of individual frame encryption, if a frame is corrupted or lost during transmission, it does not affect the decryption of other frames. Therefore, time is saved by avoiding iteration transmission of remaining frames due to single lost frame.

At receiving end, the authorized user will use inverted decryption keys and get original frames. Figures 10 and 11 shows the results with wrong keys, and Fig. 12 shows the results with right encryption keys. A variety of video clips with different encryption keys using DFrFTs are simulated. Videos of different frame sizes are taken to calculate the mean square error (MSE) and peak signal-to-noise ratio (PSNR) using DFrFT and DFrCT as shown in Table 5.

Fig. 10
figure 10

Decrypted video frames of their respective frames (with wrong keys)

Fig. 11
figure 11

a Decrypted frame with first key wrong, b with second key wrong, c with third key wrong and d with all keys wrong

Fig. 12
figure 12

Decrypted video frames of their respective frames (with right keys)

Table 5 MSE and PSNR for different test videos with DFrFT and DFrCT

It is observed that DFrCT gives superior PSNR and less MSE for video encryption in comparison with DFrFT.

Strong encryption algorithm must be capable of resisting attack of salt–pepper noise in channel. Figure 13 shows original building video frame and its decrypted frame at receiver after salt–pepper noise attack.

Fig. 13
figure 13

Building video frame. a Original, b encrypted using DFrCT and attacked with salt–pepper noise, c decrypted using DFrCT

4 Conclusions

This paper has reviewed that discrete fractional transforms are used extensively and researched in various applications to improve efficiency. MSE and PSNR values for different test images at selected compression percentage and optimum fractional-order ‘\(a\)’ are computed using discrete fractional transforms for image compression. It has been concluded that DFrFTs perform better with high PSNR and low MSE in image compression. Discrete fractional transforms with multi-keys enhance security in image encryption. DFrCT results give abundant variations in PSNR with change in single key as compared to DFrFT. Hence, DFrCT establishes better sensitivity of encryption keys for authorized users. Encryption of different frame size videos with discrete fractional cosine transforms gives better PSNR as compared to DFrFTs. The high PSNR of the order of 79 dB makes the algorithm suitable for real-time applications. The future scope will be the implementation of other discrete fractional transforms in image and video applications.