“…Originally, such transforms were mainly used to efficiently compute error-free convolutions [18,[21][22][23]; this possibility performed a fundamental role at that time, since the hardware could work with finite precision arithmetic only. In recent years, the referred transforms have been used predominantly in applications related to information security, which include image encryption, watermarking and signal processing in the encrypted domain, for instance [3,11,14,17,19].…”