Skip to main content
Log in

A new image/video encryption scheme based on fractional discrete Tchebichef transform and singular value decomposition

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

One of the major application areas of the fractional-order discrete transform (FrDTs) is in signal and information security, particularly in signal and image/video encryption. Recently, many researchers proposed techniques that implemented not only the fractional transforms, but also various randomized versions of the FrDTs, which add more security features to signal’s encryption. In this paper, we propose a new image/video encryption scheme based on fractional-order discrete Tchebichef transform (FrDTT) using singular value decomposition. The FrDTTs are derived algebraically using the spectral decomposition of discrete Tchebichef polynomials, then the singular value decomposition technique in order to build a basic set of orthonormal eigenvectors which help to develop FrDTTs. Finally, we implement and apply the scheme proposed in this paper for encrypting test images and video sequences. Moreover, we methodically perform the security evaluation in terms of brute force and statistical attacks as well as comparisons with the existing methods in terms of secret key sensitivity and space. The promising experiment results demonstrate the effectiveness and efficiency of our proposed FrDTTs based image encryption techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data availability

The datasets generated in our experiments are available from CVG - UGR - Image database, URL link: http://decsai.ugr.es/cvg/dbimagenes/. (2017). Accessed 12 February 2020.

The datasets used or analysed during the current study are available from the corresponding author on reasonable request.

Abbreviations

FrDTs:

Fractional-order Discrete Transform.

FrDTTs:

Fractional-order Discrete Tchebichef Transform.

FrDTPs:

Fractional-order Discrete Tchebichef Polynomials.

DTTs:

Discrete Tchebichef Transform.

SVD:

Singular Value Decomposition.

FrDFTs:

Fractional Discrete Fourier Transform.

DFrSTs:

Discrete Fractional Sine Transform.

FrDMMs:

Fractional discrete Meixner moments.

DFrKTs:

Discrete Fractional Krawtchouk Transform.

FrHTs:

Fractional Hartley Transform.

FrMTs:

Fractional Mellin Transform.

DCTs:

Discrete Cosine Transform.

FrDCTs:

Fractional Discrete Cosine Transform.

NPCR:

Number of Pixels Change Rate.

UACI:

Unified Averaged Changed Intensity.

MSE:

Mean Square Error.

NIST:

National Institute of Standards and Technology

PSNR:

Peak Signal to Noise Ratio

References

  1. Acharya B, Patra SK, Panda G (2008) “Image encryption by novel cryptosystem using matrix transformation,” in 2008 First International Conference on Emerging Trends in Engineering and Technology, pp. 77–81

  2. Bahrami S, Naderi M (2014) Encryption of video main frames in the field of DCT transform using A5/1 and W7 stream encryption algorithms. Arab J Sci Eng 39(5):4077–4088

    Article  Google Scholar 

  3. Batham S, Acharya AK, Yadav VK, Paulo R (2013) A new video encryption algorithm based on indexed based chaotic sequence. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), Noida, pp 139–143. https://doi.org/10.1049/cp.2013.2307

  4. Bhatnagar G, Wu QJ (2014) Biometric inspired multimedia encryption based on dual parameter fractional fourier transform. IEEE Trans Syst Man Cybern Syst 44(9):1234–1247

    Article  Google Scholar 

  5. Chebyshev PL (1853) Théorie Des Mécanismes Connus Sous Le Nom De Parallélogrammes. St.-Pétersbourg: Imprimerie de l'Académie impériale des sciences

  6. Chen L, Zhao D, Ge F (2013) Image encryption based on singular value decomposition and Arnold transform in fractional domain. Opt Commun 291:98–103. https://doi.org/10.1016/j.optcom.2012.10.080

    Article  Google Scholar 

  7. Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439–2451

    Article  Google Scholar 

  8. Chihara TS (2011) An introduction to orthogonal polynomials. In: Dover Books on Mathematics. Dover Publications, New York

  9. Daoui A, Karmouni H, Azzayani A, Sayyouri M, Qjidaa H (2020) “Large Size 1D Signal Analysis by Hybrid Tchebichef-Charlier Moments,” in 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), pp. 1–6

  10. El Ogri O, Karmouni H, Sayyouri M, Qjidaa H (2021) 3D image recognition using new set of fractional-order Legendre moments and deep neural networks. Signal Process Image Commun 98:116410. https://doi.org/10.1016/j.image.2021.116410

    Article  Google Scholar 

  11. El Ogri O et al (2021) Novel fractional-order Jacobi moments and invariant moments for pattern recognition applications. Neural Comput & Applic 33(20):13539–13565

    Article  Google Scholar 

  12. El Ogri O, Daoui A, Yamni M, Karmouni H, Sayyouri M, Qjidaa H (2020) New set of fractional-order generalized Laguerre moment invariants for pattern recognition. Multimed Tools Appl 79:23261–23294. https://doi.org/10.1007/s11042-020-09084-1

  13. Fatnassi A, Gharsellaoui H, Bouamama S (2020) New hybrid proposed solution for video steganography based on clustering algorithm. Int J Secur Priv Pervasive Comput IJSPPC 12(2):30–43

    Google Scholar 

  14. Fridrich J (1997) Image encryption based on chaotic maps, in 1997 IEEE international conference on systems, man, and cybernetics. Comput Cybern Simul 2:1105–1110

    Google Scholar 

  15. Guizani S, Nasser N (2012) “An audio/video crypto—Adaptive optical steganography technique,” in 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1057–1062

  16. Hanna MT, Seif NPA, Ahmed WAEM (2004) Hermite-Gaussian-like eigenvectors of the discrete Fourier transform matrix based on the singular-value decomposition of its orthogonal projection matrices. IEEE Trans Circuits Syst Regul Pap 51(11):2245–2254

    Article  MathSciNet  MATH  Google Scholar 

  17. Jindal N, Singh K (2014) Image and video processing using discrete fractional transforms. Signal Image Vid Process 8(8):1543–1553

    Article  Google Scholar 

  18. Joshi M, Shakher C, Singh K (2010) Fractional Fourier plane image encryption technique using radial hilbert-, and jigsaw transform. Opt Lasers Eng 48(7–8):754–759

    Article  Google Scholar 

  19. Kang X, Tao R (2019) Color image encryption using pixel scrambling operator and reality-preserving MPFRHT. IEEE Trans Circuits Syst Vid Technol 29(7):1919–1932. https://doi.org/10.1109/TCSVT.2018.2859253

    Article  Google Scholar 

  20. Kang X, Ming A, Tao R (2019) Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans Circuits Syst Vid Technol 29(6):1595–1607. https://doi.org/10.1109/TCSVT.2018.2851983

    Article  Google Scholar 

  21. Karmouni H, Yamni M, Daoui A, Sayyouri M, Qjidaa H (2021) A new fast algorithm to compute moment 3D invariants of generalized Laguerre modified by fractional-order for pattern recognition. Multidim Syst Sign Process 32(2):431–464

    Article  MathSciNet  MATH  Google Scholar 

  22. Karmouni H, Sayyouri M, Qjidaa H A novel image encryption method based on fractional discrete Meixner moments. Opt Lasers Eng 137:106346

  23. Karuna Y, Reddy GR (2020) Broadband subspace decomposition of convoluted speech data using polynomial EVD algorithms. Multimed Tools Appl 79(7):5281–5299

    Article  Google Scholar 

  24. Kaur G, Agarwal R, Patidar V (2021) “Color image encryption scheme based on fractional Hartley transform and chaotic substitution–permutation,” Vis Comput, https://doi.org/10.1007/s00371-021-02066-w

  25. Kaur G, Agarwal R, Patidar V (2021) “Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation,” J King Saud Univ Comput Inf Sci, https://doi.org/10.1016/j.jksuci.2021.03.007.

  26. Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57(11):2517–2533

    Article  Google Scholar 

  27. Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Article  Google Scholar 

  28. Lang J, Tao R, Wang Y (2010) Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function. Opt Commun 283(10):2092–2096

    Article  Google Scholar 

  29. Li S, Zheng X (2002) “Cryptanalysis of a chaotic image encryption method,” in 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No. 02CH37353), vol. 2, p. II–II

  30. Lian S (2008) Multimedia content encryption: techniques and applications (1st ed.). Auerbach Publications. https://doi.org/10.1201/9781420065282

  31. Lima JB, Novaes LFG (2014) Image encryption based on the fractional Fourier transform over finite fields. Signal Process 94:521–530

    Article  Google Scholar 

  32. Liu X (2015) Analysis and improvement for image encryption algorithm based on multiple chaotic mapping. Open Autom Control Syst J 7(1):1560–1565

  33. Liu L, Miao S (2017) An image encryption algorithm based on baker map with varying parameter. Multimed Tools Appl 76(15):16511–16527

    Article  Google Scholar 

  34. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16):3895–3903. https://doi.org/10.1016/j.optcom.2011.04.001

    Article  Google Scholar 

  35. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466. https://doi.org/10.1016/j.asoc.2012.01.016

    Article  Google Scholar 

  36. Liu X, Han G, Wu J, Shao Z, Coatrieux G, Shu H (2017) Fractional Krawtchouk transform with an application to image watermarking. IEEE Trans Signal Process 65(7):1894–1908

    Article  MathSciNet  MATH  Google Scholar 

  37. Liu X, Wu Y, Zhang H, Wu J, Zhang L (2021) Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking. Signal Process 189:108275

    Article  Google Scholar 

  38. McBride AC, Kerr FH (1987) On Namias’s fractional Fourier transforms. IMA J Appl Math 39(2):159–175

    Article  MathSciNet  MATH  Google Scholar 

  39. Mukundan R, Ong SH, Lee PA (2001) Image analysis by Tchebichef moments. IEEE Trans Image Process 10(9):1357–1364

    Article  MathSciNet  MATH  Google Scholar 

  40. Oliveira PA, Cintra RJ, Bayer FM, Kulasekera S, Madanayake A (2016) Low-complexity image and video coding based on an approximate discrete Tchebichef transform. IEEE Trans Circuits Syst Vid Technol 27(5):1066–1076

    Article  Google Scholar 

  41. Rajesh GR, Nargunam AS (2013) “Steganography algorithm based on discrete cosine transform for data embedding into raw video streams,” in IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), pp. 554–558

  42. Ramalingam M, Isa NAM, Puviarasi R (2020) A secured data hiding using affine transformation in video steganography. Procedia Comput Sci 171:1147–1156

    Article  Google Scholar 

  43. Salunke S, Venkatadri M, Hashmi MF, Ahuja B (2021) Novel beta function-based image encryption with fractional sine transform. Mater. Today Proc 47:6991–699

  44. Stewart GW (1973) Introduction to matrix computations. Elsevier

    MATH  Google Scholar 

  45. Sui L, Lu H, Ning X, Wang Y (2014) Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain. Opt Eng 53(2):026108

    Article  Google Scholar 

  46. Sun Q, Guan P, Qiu Y, Xue Y (2012) “A novel digital image encryption method based on one-dimensional random scrambling,” in 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp. 1669–1672

  47. Suresh M, Sam IS (2021) “A Secure Video Steganography Using Framelet Transform and Singular Value Decomposition,” in Data Intelligence and Cognitive Informatics, Springer, pp. 781–790

  48. “Test Sequences.” (2021) https://pi4.informatik.uni-mannheim.de/~kiess/test_sequences/download/ (accessed Dec. 12, 2021)

  49. Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25(12):887–889

    Article  Google Scholar 

  50. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195–214. https://doi.org/10.1016/j.ins.2020.06.030

    Article  MathSciNet  MATH  Google Scholar 

  51. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36. https://doi.org/10.1016/j.ins.2019.08.041

    Article  MathSciNet  MATH  Google Scholar 

  52. Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst Regul Pap 69(3):1291–1301

    Article  Google Scholar 

  53. Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci 569:217–240. https://doi.org/10.1016/j.ins.2021.04.013

    Article  MathSciNet  Google Scholar 

  54. Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128–149. https://doi.org/10.1016/j.ins.2021.07.096

    Article  MathSciNet  Google Scholar 

  55. Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  56. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108. https://doi.org/10.1016/j.sigpro.2011.10.023

    Article  MathSciNet  Google Scholar 

  57. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005

    Article  Google Scholar 

  58. Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61. https://doi.org/10.1016/j.optlaseng.2015.03.022

    Article  Google Scholar 

  59. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  MATH  Google Scholar 

  60. Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527

    Article  MathSciNet  Google Scholar 

  61. Watkins DS (2007) The matrix eigenvalue problem. Society for Industrial and Applied Mathematics. https://doi.org/10.1137/1.9780898717808

  62. Wu J, Guo F, Zeng P, Zhou N (2013) Image encryption based on a reality-preserving fractional discrete cosine transform and a chaos-based generating sequence. J Mod Opt 60(20):1760–1771

    Article  Google Scholar 

  63. Wu J, Zhang M, Zhou N (2017) Image encryption scheme based on random fractional discrete cosine transform and dependent scrambling and diffusion. J Mod Opt 64(4):334–346

    Article  Google Scholar 

  64. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169. https://doi.org/10.1016/j.ins.2020.09.055

    Article  MathSciNet  MATH  Google Scholar 

  65. Xian Y, Wang X, Teng L (2021) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol 32(6):4028–4037. https://doi.org/10.1109/TCSVT.2021.3108767

  66. Yamni M, Daoui A, Karmouni H, Sayyouri M, Qjidaa H, Flusser J (2020) Fractional Charlier moments for image reconstruction and image watermarking. Signal Process 171:107509

    Article  MATH  Google Scholar 

  67. Yang T, Ma J, Wang Q, Miao Y, Wang X, Meng Q (2018) Image feature extraction in encrypted domain with privacy-preserving Hahn moments. IEEE Access 6:47521–47534. https://doi.org/10.1109/ACCESS.2018.2866861

    Article  Google Scholar 

  68. “YUV Sequences.” (2021) http://trace.eas.asu.edu/yuv/index.html (accessed Dec. 12, 2021).

  69. Zhang L, Chen D (2020) The large capacity embedding algorithm for H. 264/AVC intra-prediction mode video steganography based on linear block code over Z4. Multimed Tools Appl 79:1–19

    Google Scholar 

  70. Zhang Y-Q, Wang X-Y (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20. https://doi.org/10.1016/j.asoc.2014.09.039

    Article  Google Scholar 

  71. Zhou N, Wang Y, Wu J (2011) Image encryption algorithm based on the multi-order discrete fractional Mellin transform. Opt Commun 284(24):5588–5597

    Article  Google Scholar 

  72. Zhou N, Wang Y, Gong L, Chen X, Yang Y (2012) Novel color image encryption algorithm based on the reality preserving fractional Mellin transform. Opt Laser Technol 44(7):2270–2281

    Article  Google Scholar 

  73. Zhou N, Liu X, Zhang Y, Yang Y (2013) Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional Fourier domain. Opt Laser Technol 47:341–346. https://doi.org/10.1016/j.optlastec.2012.08.033

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous referees for their valuable comments and suggestions.

Funding

No funding has been granted for this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar El Ogri.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix A

Proof of property (v)

Let λ be an eigenvalue of Tchebichef polynomial matrix and u the corresponding eigenvector, then Cu = λu, using the properties (iii) and (iv), we have:

$$ u=\mathrm{CC}u=\lambda \mathrm{C}u={\lambda}^2u $$
(A1)

thus. {Key1, Key2}

$$ \left({\lambda}^2-1\right)u=0 $$
(A2)

The matrix C has only two eigenvalues {1, −1}, The proof of Eq. (19) has been completed

Appendix B

Proof of properties (a)-(b)

Let C ∈ N × Nbe Tchebichef polynomial matrix, with their eigenvalues on the diagonal of a diagonal matrix Λ =  diag (λ1, ……λN) ∈ N × N and the corresponding eigenvectors forming the columns of a matrix V = [u1, ……, uN] ∈ N × N, we have:

$$ \mathrm{C}=V\Lambda {V}^{-1} $$
(B.1)

where, the orthonormal vectors u1, ……uN are eigenvectors of C, corresponding to eigenvalues λ1, ……λN.

$$ \mathrm{C}=\left[{u}_1\cdots \cdots {u}_N\right]\left(\begin{array}{ccc}{\lambda}_1& & \\ {}& \ddots & \\ {}& & {\lambda}_N\end{array}\right)\left[\begin{array}{c}{u}_1^T\\ {}\vdots \\ {}{u}_N^T\end{array}\right]=\left[{\lambda}_1{u}_1\cdots \cdots {\lambda}_N{u}_N\right]\left[\begin{array}{c}{u}_1^T\\ {}\vdots \\ {}{u}_N^T\end{array}\right] $$
(B.2)
$$ \mathrm{C}={\lambda}_1{u}_1{u}_1^T\cdots \cdots {\lambda}_N{u}_N{u}_N^T $$
(B.3)

Notice that the matrices

$$ {\mathrm{P}}_j:= {u}_j{u}_j^T\in {\mathbb{C}}^{N\times N} $$
(B.4)

are orthogonal projectors, since \( {\mathrm{P}}_j^T={\mathrm{P}}_j \)and \( {\mathrm{P}}_j^2:= {u}_j\left({u}_j^T{u}_j\right){u}_j^T={u}_j{u}_j^T={\mathrm{P}}_j \)

$$ \mathrm{C}=\sum \limits_{j=1}^N{\lambda}_j{\mathrm{P}}_j $$
(B.5)

if j ≠ k, then the orthogonality of the eigenvectors implies

$$ {\mathrm{P}}_j{\mathrm{P}}_k={u}_j{u}_j^T{u}_k{u}_k^T=0 $$
(B.6)

The proof of properties (a) and (b) has been completed.

Proof of propriety (c)

Let γ, η and λ be respectively the eigenvalues of the matrices P0,P1 and C of size N × N, using Eq. (18), we have:

$$ {\displaystyle \begin{array}{c}\mid \gamma I-{\mathrm{P}}_0\mid =\mid \gamma I-0.5\left(\mathrm{C}+I\right)\mid =\mid \left(\gamma -0.5\right)I-0.5\mathrm{C}\mid \\ {}=\mid \left(\gamma -0.5\right)I-0.5\mathrm{C}\mid ={0.5}^N\mid \left(2\gamma -1\right)I-\mathrm{C}\mid \\ {}=0\end{array}} $$
(B.7)

Similarly, we have

$$ \mid \eta I-{\mathrm{P}}_1\mid ={0.5}^N\mid \left(2\eta -1\right)I-\mathrm{C}\mid =0,\boldsymbol{and}\mid \lambda I-\mathrm{C}\mid =0 $$
(B.8)

From (B.7) and (B.8), we have

$$ 2\gamma -1=\lambda, \boldsymbol{and}-\left(2\eta -1\right)=\lambda $$
(B.9)

Hence, if λ = 1, there is γ = 1, η = 0, and if λ =  − 1, then γ = 0, η = 1.

The proof of propriety (c) has been completed.

Appendix C

Let P0 and P1 the spectral projection matrices of Tchebichef polynomial matrix C ∈ N × N, and u,v be their eigenvectors corresponding to λ = 1, respectively.

Proof of Lemma 1

From Table 1 and Property (c), we have:

$$ {\mathrm{P}}_0u=u,\boldsymbol{and}\ {\mathrm{P}}_1v=v $$
(C.1)

using (C.1) and Property (b), we have:

$$ {u}^Tv={\left({\mathrm{P}}_0u\right)}^T\left({\mathrm{P}}_1v\right)={u}^T{{\mathrm{P}}_0}^T{\mathrm{P}}_1v=0 $$
(C.2)

The proof of Lemma 1 has been completed.

Proof of Lemma 2

From Eq. (15), Lemma 1 and property (b) we have:

$$ {\displaystyle \begin{array}{c}\mathrm{C}u=\left({\lambda}_0{\mathrm{P}}_0+{\lambda}_1{\mathrm{P}}_1\right)u={\lambda}_0{\mathrm{P}}_0u+{\lambda}_1{\mathrm{P}}_1u\\ {}={\lambda}_0{\mathrm{P}}_0u+{\lambda}_1{\mathrm{P}}_1{\mathrm{P}}_0u={\lambda}_0{\mathrm{P}}_0u+{\lambda}_1{\mathrm{P}}_1^T{\mathrm{P}}_0u\\ {}={\lambda}_0{\mathrm{P}}_0u={\lambda}_0u\end{array}} $$
(C.3)
$$ {\displaystyle \begin{array}{c}\mathrm{C}v=\left({\lambda}_0{\mathrm{P}}_0+{\lambda}_1{\mathrm{P}}_1\right)v={\lambda}_0{\mathrm{P}}_0v+{\lambda}_1{\mathrm{P}}_1v\\ {}={\lambda}_0{\mathrm{P}}_0{\mathrm{P}}_1v+{\lambda}_1{\mathrm{P}}_1v={\lambda}_1{\mathrm{P}}_1v={\lambda}_1v\end{array}} $$
(C.4)

The proof of Lemma 2 has been completed.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

El Ogri, O., Karmouni, H., Sayyouri, M. et al. A new image/video encryption scheme based on fractional discrete Tchebichef transform and singular value decomposition. Multimed Tools Appl 82, 33465–33497 (2023). https://doi.org/10.1007/s11042-023-14573-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14573-0

Keywords

Navigation