“…In an attempt to strengthen security, the DRPE was further extended to several other transform domains such as the fractional Fourier [9,10], Fresnel [11][12][13][14][15][16][17][18][19][20][21][22][23], gyrator [24,25], and fractional Mellin [26,27]. However, majority of these techniques use random phase keys making them vulnerable to a variety of plaintext and ciphertext attacks.…”