Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System

In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map) is designed and analyzed. Also, a new dynamic chaotic biometric signature (DCBS) generator based on combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed. The final output of the proposed DCBS generator is used as a dynamic secret key for the MPFrFT OFDM system in which the encryption process is applied in the frequency domain. The proposed DCBS secret key generator generates a very large key space of 22200. The proposed DCBS secret keys generator can achieve the confidentiality and authentication properties. Statistical analysis, differential analysis and a key sensitivity test are performed to estimate the security strengths of the proposed DCBS-MP-FrFT-OFDM cryptosystem over the IoT network. The experimental results show that the proposed DCBS-MP-FrFT-OFDM cryptosystem is robust against common signal processing attacks and provides a high security level for image encryption application.


Introduction
The Internet of Things (IoT) represents a modern internet phenomenon.Device recognition achieves intelligence through establishing or facilitating context-related decisions via the device transceiving information about itself.The rise of cloud computing capabilities leads to an unlimited addressing capacity.The IoT's purpose is to allow device connectivity with anybody and anything at anytime, anywhere, and via any path/network and service.The IoT can be used in different applications such as transportation, healthcare, power grids, entertainment and smart buildings [1].Encrypting IoT data before transferring it over wireless networks is one of the simplest and most effective ways to prevent it from being intercepted and altered.Data are converted into an unreadable format by the process of encryption, which can only be decrypted by authorized persons with the right key.IoT services require security to be at the core of everything.Physical layer security (PLS), one of the providing methods for communication security, has attracted a lot of interest from both academics and business since it can provide uncrackable, demonstrable, and quantifiable secrecy.PLS has a significant advantage over encryption since it is not dependent on computational complexity.Consequently, the degree of security attained will not be high, even if the listener has advanced computing capabilities.In contrast to a technique based on encryption, this is founded on the notion that an observer has a constrained computational ability to tackle challenging mathematical puzzles for brief intervals.For the PLS protocol design in IoT, the unique characteristics of IoT, such as cheap cost, wide-range coverage, enormous connection, and varied services impose significant problems [2].The development of PLS solutions for IoT applications remains difficult despite the success of PLS technique research.The IoT is distinguished by four special characteristics in particular: low cost, broad coverage, high connectivity, and a variety of services.How to design PLS strategies that well match these four features remains an open problem [2].
Recently, [3] have enhanced the dynamics of constellation fluctuations between neighboring frames by utilizing the randomness in the data.The constellation is then dynamically rotated while using analog-based encryption rather than digital-based encryption, which lowers quantization loss and increases robustness to channel phase problems.The others in [4] offer an asymmetric multi-level physical layer security (PLS) scheme in which each transmitted symbol is subjected to two different types of distortion: multi-reception amplitude randomization and channel-based phase distortion.Additionally, the technique streamlines receiver design while providing a significant security advantage for authentic links.The study makes several doable, reasonable, and access-controlled suggestions in [5] for safeguarding the physical layer of the Internet of Things (IoT).The study is still going on with a specific focus on the difficulties with encrypted data.To achieve this goal, a secure approach at the physical layer that provides cryptographic features for usage in conjunction with a flexible RC6 encryption/decryption method is described.
The chaos-based PLS transmission scheme for IoT is introduced in [6].The suggested approach successfully addresses the concerns with the extremely high PAPR of the OFDM symbols in addition to providing confidentiality of physical layer information transfer by encrypting the Discrete Fourier Transform (DFT) matrix.Additionally, it has no need for additional sideband information and, in theory, has a minimal computing complexity.A physical layer security scheme for OFDM-based IoT systems with compressed sensing is proposed in [7].The others use a combination of compressed sensing (CS) and OFDM to increase security.Therefore, using compressed sensing, we suggest the PLSSCS physical layer security strategy for OFDM-based IoT systems.By using channel measuring rather than previously collected data, it can alleviate the drawback of key extraction.In [8], the RSA Algorithm and Constellation Encryption Design Based on Chaotic Sequence are introduced.The main goal of this technique is to construct a large number of highly secure encrypted sequences by efficiently combining chaotic sequences and RSA.The precise procedure is to communicate system parameters using the asymmetric RSA algorithm, create a secret sequence using the chaotic sequence's initial value sensitivity, and then encrypt the original sequence using the secret sequence.
There are many physical layer encryption (PLE) schemes applied to the IoT networks.The key idea of PLE is to exploit the randomness of channels to degrade the received signal quality at the eavesdropper.Three new PLE techniques complement IoT features well and have a lot of promise for use in the future [9].The noise aggregation and selfencryption [10,11], fountain-coding based secure transmission [12][13][14][15][16][17][18] and Self-Encryption via constellation rotation [19][20][21][22][23][24][25][26][27][28] are different examples of the PLE used in the IoT.OFDM, which has a high spectral efficiency and easy implementation, is used as a self-encryption via the constellation rotation principal.It has been incorporated into different protocols including IEEE 802.11 a/g/n, IEEE 802.16 WiMAX, the frequency domain [29][30][31], data scrambling in the time domain [32], rotation of the modulation symbols [33], and noiseenhanced constellation rotation [34,35] for many of these reasons.Research has looked at using PLE, such as constellation scrambling, to increase the security level of OFDM.
The majority of IEEE 802.11Wi-Fi amendments, including 802.11 a, 802.11 g, 802.11 ac, 802.11 n, 802.11 ax, and 802.11 p (the protocol used in vehicle networks) [36][37][38], have embraced OFDM.High-speed Wi-Fi has recently emerged as a viable option for IoT devices due to its compatibility with existing networks.As a result, IEEE 802.11 ah [39] has been proposed as a new Wi-Fi standard for IoT systems.The basic physical layer structure of the transceiver adheres to the conventional design to maintain backward compatibility with access points and clients that support the OFDM physical layer structure despite the fact that this standard offers a number of new and enhanced features to improve power and spectral efficiency [39].IoT applications can be categorized into two groups: low data rate applications like smart meters and high data rate applications like multimedia IoT.A number of IoT communication protocols, including NB-IoT and 802.11 ah, rely on OFDM as an effective multiple access approach to support the successful operation of high data rate IoT applications [40].One key feature of IoT systems is their ability to support a variety of legacy and emerging communication protocols, including SigFox, cellular technology, 6LoWPAN (IPv6 Low-power Wireless Personal Area Networks (LoWPAN)), BLE (Bluetooth low energy), ZigBee, RFID (radio frequency identification), NFC (near-field communication), Z-Wave, NB-IoT (Narrow Band IoT), LoRaWAN (long-range wide area network), and Wi-SUN (wireless smart utility network) [41].There are currently eight major categories of PLS schemes that concentrate on data confidentiality for OFDM systems: channel-based encryption [42], phase encryption [43], permutation [44,45], artificial noise (AN) and artificial fast fading (AFF) [46,47], preamble modulation [48] (Figure 1), power allocation [49], Peak-to-Average Power Reduction (PAPR) encryption [50], the frequency domain [51] and the time domain [52] are two other areas in which these techniques can be used.
Sensors 2023, 22, x FOR PEER REVIEW 3 of 25 embraced OFDM.High-speed Wi-Fi has recently emerged as a viable option for IoT devices due to its compatibility with existing networks.As a result, IEEE 802.11 ah [39] has been proposed as a new Wi-Fi standard for IoT systems.The basic physical layer structure of the transceiver adheres to the conventional design to maintain backward compatibility with access points and clients that support the OFDM physical layer structure despite the fact that this standard offers a number of new and enhanced features to improve power and spectral efficiency [39].IoT applications can be categorized into two groups: low data rate applications like smart meters and high data rate applications like multimedia IoT.A number of IoT communication protocols, including NB-IoT and 802.11 ah, rely on OFDM as an effective multiple access approach to support the successful operation of high data rate IoT applications [40].One key feature of IoT systems is their ability to support a variety of legacy and emerging communication protocols, including SigFox, cellular technology, 6LoWPAN (IPv6 Low-power Wireless Personal Area Networks (LoWPAN)), BLE (Bluetooth low energy), ZigBee, RFID (radio frequency identification), NFC (near-field communication), Z-Wave, NB-IoT (Narrow Band IoT), LoRaWAN (long-range wide area network), and Wi-SUN (wireless smart utility network) [41].There are currently eight major categories of PLS schemes that concentrate on data confidentiality for OFDM systems: channel-based encryption [42], phase encryption [43], permutation [44,45], artificial noise (AN) and artificial fast fading (AFF) [46,47], preamble modulation [48] (Figure 1), power allocation [49], Peak-to-Average Power Reduction (PAPR) encryption [50], the frequency domain [51] and the time domain [52] are two other areas in which these techniques can be used.Chaos-based physical layer encryption is used in OFDM-based IoT systems to achieve the phase randomization and constellation rotation in the transmitted image in both spatial and transformation domains.An investigation of the Fractional Fourier Transform (FrFT) domains is introduced in [48].The FrFT parameters are considered as the additional keys for encryption achieving reliable cybersecurity for robust image communication.In [49], multiple fractional order chaotic systems are used in the proposed color image encrypting technique, since using multiple fractional order for image encryption considerably increases the key space and the key sensitivity.A generalization of the FrFT is the multi-parameter fractional Fourier transform (MP-FrFT).Due to the widespread use of MPFrFT in both cryptosystems [50][51][52][53][54][55], more and more academics are becoming interested in it.The authors in [56] introduce the MP-WFRFT and chaotic scrambling-assisted directional modulation technology for improving physical layer security.To realize the power-efficient and security-enhanced wireless transmissions, the directional modulation (DM) technology with multiple parameters weighted-type fractional Fourier transform (MP-WFRFT) and chaotic scrambling (CS) was developed in [56].
In 2023, a new physical layer authentication in wireless networks-based machine learning approaches is introduced in [57].The purpose of the work given in [57] is to identify and thoroughly compare prior research on physical layer authentication.In addition Chaos-based physical layer encryption is used in OFDM-based IoT systems to achieve the phase randomization and constellation rotation in the transmitted image in both spatial and transformation domains.An investigation of the Fractional Fourier Transform (FrFT) domains is introduced in [48].The FrFT parameters are considered as the additional keys for encryption achieving reliable cybersecurity for robust image communication.In [49], multiple fractional order chaotic systems are used in the proposed color image encrypting technique, since using multiple fractional order for image encryption considerably increases the key space and the key sensitivity.A generalization of the FrFT is the multiparameter fractional Fourier transform (MP-FrFT).Due to the widespread use of MPFrFT in both cryptosystems [50][51][52][53][54][55], more and more academics are becoming interested in it.The authors in [56] introduce the MP-WFRFT and chaotic scrambling-assisted directional modulation technology for improving physical layer security.To realize the power-efficient and security-enhanced wireless transmissions, the directional modulation (DM) technology with multiple parameters weighted-type fractional Fourier transform (MP-WFRFT) and chaotic scrambling (CS) was developed in [56].
In 2023, a new physical layer authentication in wireless networks-based machine learning approaches is introduced in [57].The purpose of the work given in [57] is to identify and thoroughly compare prior research on physical layer authentication.In addition to demonstrating the most recent PLA techniques, this study examined whether machine learning techniques improved wireless network security performance in physical layer authentication models.Additionally, it pointed out problems and offered lines of inquiry for further study.Researchers and security model creators interested in employing machine learning (ML) and deep learning (DL) methodologies for PLA in wireless communication systems in future research and designs will find this work to be useful.In addition, an application of machine learning techniques in medical data processing based on distributed computing and the IoT is suggested in [58].Also, in [59], the CNN learning and offloading is used as a hybrid approach for latency and battery lifetime optimization in IoT devices.The main contributions of this research follow: 1.
New robust MCC-MF sine map is designed and analyzed.

2.
New dynamic chaotic biometric (Digital Fingerprint) signature (DCBS) generator based on the combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed.
This paper is organized as follows.An introduction is presented in Section 1; Section 2 presents a related preliminary basics.Section 3 presents the proposed MCC-MF sine map, Section 4 presents the proposed DCBS-MP-FrFT-OFDM cryptosystem.Section 4 presents the performance analysis and simulation results discussions of the proposed DCBS-MP-FrFT-OFDM cryptosystem.The following section is the comparison results analysis.Finally, the conclusions and future works are drawn.

Multiple Parameters FrFT
The MPFrFT was presented with its applications and its advantages in signal processing, image encryption and communications in [60].The a th -order continuous FRT of x(t) is given by: where K a (u, t) is the transform kernel and α = aπ/2.The matrix F is N × NDFT can be defined as: The DFT matrix F has only four different eigenvalues {1, −j, −1, j}.Consider S as a nearly tri-diagonal N × N matrix whose nonzero entries are S n,n = 2cos 2πn/N, 0 ≤ n ≥ N and S n,n+1 =S n+1,n=1 , 0 ≤ n ≥ N − 2, and S n−1,0 =S 0,n−1=1 .The matrices S and F will have the same eigenvectors if they commute with the matrix F (S•F = F•S) but will not have the same eigenvectors λ k = e −jπk 2 .Based on the four different eigenvectors {1, −j, −1, j}, the ath-order FrFT matrix of size N × N denoted by F a is defined by [61]: where (•) T denotes the matrix transpose operation, for N even, v k is the normalized k th -order discrete Hermite- Gaussian-like eigenvector of S, and Λ a is a diagonal matrix whose entries are λ a k with fractional order a.The MPFrFT can be defined as an extension of the FrFT with multiple parameters by replacing the order a with the vector of fraction orders a of length 1 × N which are independent fraction orders; then, the MPFrFT denoted by F a is defined as: where Λ a is given by: In addition, this model of 1D MPFrFT can be modeled as 2D MPFrFT by using two vectors of fraction orders a and b with lengths of 1 × N and 1 × M. The two vectors of fraction orders a and b are independent fraction orders.The 2D MPFrFT can be performed by applying one 1D MPFrFT along rows followed by applying another 1D MPFrFT along columns.The 2D MPFrFT denoted by F (a,b) is defined as [61]: Then, the 2D MPFrFT of a 2D input P of size M × N can be defined in a row-column scheme as: The properties of the MPFrFT are given in [62].The main advantage of the 2D MPFrFT is that the two vectors of fraction orders a and b with lengths of 1 × N and 1 × M can be used as an additional secret key for secure applications.

Biometric Authenticated Secret Key
A fingerprint can be used as a biometric property to extract digital data using a variety of methods, such as a block-based approach to create a feature vector [62].With the help of this feature vector, code words can be created that are sufficiently random and large to be employed.The procedure includes the following steps: feature extraction, straight line attribute calculation, straight line attribute obfuscation, and production of a biometric binary string.Then, from the fingerprint image, we extract the minute points, core points, and delta points.If P is a collection of minute points, then p(x, y) stands for a minute point's coordinate.A collection of minor points is denoted by the notation point p = {p 1 (x 1 , y 1 ), p 2 (x 2 , y 2 ), . . . ,p k (x k , y k )}.Miniscule points are represented by p i (x i , y i ), i = 1, 2, . . .k.The core point is then represented as Cp(x c , y c ), where x c is the x-coordinate and y c is the y-coordinate of the discovered core point "Cp"from the input fingerprint picture.Finally, when a delta point is found in a fingerprint picture, it is represented as D p (x d , y d ), where x d , is the discovered delta point's x-coordinate and y d is its y-coordinate.Divide the image into small blocks and compute the straight-line properties between the points in the set 'P'.The fingerprint image 'I' will be divided into a number of tiny blocks, each measuring m × m pixels, with I = p × q of all blocks.
Using all the blocks, we determine the straight-line properties when computing all straight lines from a block's minutiae point (p k ), which stands for the block in the i th row and j th column of I ij as a reference block for all other blocks' minutiae points.Compute the length and angle of each straight line, using the Euclidean distance for length (li) and the x-axis for angle (a i ).Let F B represent a collection of straight-line lengths and angles for all blocks, F B = {(l 1 , a 1 ), (l 2 , a 2 ), . . . ,(lzb, azb)}.Find the block I lm that contains the core point (C P ), compute all straight lines that connect the core point (C P ) to all other minutiae points of neighboring blocks, and then extract the core and delta points from image I. Let F C denote a set of lengths and angles of straight lines, where the size of the F B is z b .Finally, the extracted minutiae attributes contain three fields per minutiae: the x-coordinate Sensors 2023, 23, 7843 6 of 26 ([1, 511]), y-coordinate ( [1,511]) and orientation θ ([0, 359]); the three parameters (x.y.θ) are used as a biometric minutia [63][64][65].In [64], a high-performance fingerprint scanner and a recognition engine are both included in the FS83 serial Fingerprint Authentication Module (FS83-sFAM), which is used in order to generate 2072 bytes from three samples of different fingerprints of one user.The resultant bits are represented in hexadecimal format, which is used in authenticated and secret key generation.The biometric fingerprint image is shown in Figure 1.

Proposed Multi-Cascaded Chaotic Modular Fractional Sine Map (MCC-MF Sine Map)
The cascade chaotic system (CCS) is a general 1D chaotic framework for creating new nonlinear chaotic systems using any two 1D chaotic maps as seed maps; it was first introduced in [66].Zhongyun et al. also suggested a dynamic parameter-control chaotic system (DPCCS) [67] based on the concept of the CCS.The DPCCS has a simple architecture that uses the control map's output to dynamically modify the seed map's parameters.CCS and DPCCS have straightforward hardware implementation, simple structures, and wildly unpredictable behavior.In this section, a new MCC-MF sine map is introduced and analyzed.The development of discrete fractional calculus allowed for the effective incorporation and capture of memory effects in nonlinear discrete temporal systems.Complex features are seen in chaotic systems with a fractional order.Assume that a sequence ρ(n) is given and the isolated time scale ℵ a is represented in terms of the real valued constant τ as {τ, τ + 1, τ + 2, . . ., } such that ρ : ℵ τ → R. The difference operator is denoted by ∆, where ∆ρ(n) = ρ(n + 1) − ρ(n).Then, we summarize some of the basic definitions related to discrete fractional calculus as follows: The fractional sum of order α (α > 0) is given by [68]: The Caputo-like delta difference of order α is defined by [68]: The delta fractional difference equation of order α is represented by [69]: The equivalent discrete fractional integral is given by [70]: Note that the initial iteration in this case is [71]: The non-modular fractional sine chaotic map is given by [72]: The proposed MCC-MF sine map is designed based on the concept of a cascade chaotic system.The fractional chaotic map is given by [68][69][70][71][72] and the final mathematical model is given by: r 1 sin(πr 2 sin(πr 3 sin(πr 4 sin(πx(j − 1))))) (15) where r 1 , r 2 , r 3 and r 4 are the control parameters and x(0) is the initial condition of the proposed map.Using more than one parameter of the sine map gives a high Lyapunov exponent (LE) value, high chaotic range and a large key space.The block diagram of the proposed MCC-MF sine map is shown in Figure 2. The proposed MCC-MF sine map consists of four fractional chaotic sine maps connected in concatenated form with different secret parameters.The modular function is used to improve the chaotic property based on the continuity of the map output.The effect of the fractional order on the chaotic map can be shown in Figure 3, where Figure 3a-d   The effect of the fractional order on the chaotic map can be shown in Figure 3, where Figure 3a-d   The effect of the fractional order on the chaotic map can be shown in Figure 3, where Figure 3a-d   The NIST test suit, which consists of 16 statistical tests, is used to determine the randomness of the proposed MCC-MF sine map.These tests determine whether or not the created sequence is random.These tests' primary reliance is on the probability value (p value).The significance level, which is the line separating the rejection and non-rejection regions, compares the p-value.The significant level in NIST is set at 0.01.If the p-value is less than or equal to 0.01, the sequence is not random and is rejected; if it is greater than 0.01, the sequence is random and accepted.The proposed MCC-MF sine map's binary sequence of 10 bits is examined using SP800-22 [73], and the results are shown in Table 1.

Proposed Secure MP-FrFT-OFDM Cryptosystem
Due to their effective use of network resources and bandwidth, ability to accommodate a range of mobility scenarios, and ability to deliver high data rates, OFDM systems have demonstrated widespread success in many wireless communication applications.Thus, it is anticipated that OFDM will continue to be a crucial enabling technology in present and future systems, including 5Gs [42].In order to deal with inter-channel interference (ICI) and inter-symbol interference (ISI) problems and permit simultaneous data transmission via band-limited channels, OFDM was first presented in the middle of the 1960s [48].Wide frequency selective channels are, in theory, divided into a number of small, flat fading sub-bands by OFDM.Despite the fact that OFDM sub-bands are made orthogonal and independent of one another, a guard band known as the cyclic prefix (CP) is necessary to lessen the impacts of ISI and ICI.Instead of employing an empty guard The NIST test suit, which consists of 16 statistical tests, is used to determine the randomness of the proposed MCC-MF sine map.These tests determine whether or not the created sequence is random.These tests' primary reliance is on the probability value (p value).The significance level, which is the line separating the rejection and non-rejection regions, compares the p-value.The significant level in NIST is set at 0.01.If the p-value is less than or equal to 0.01, the sequence is not random and is rejected; if it is greater than 0.01, the sequence is random and accepted.The proposed MCC-MF sine map's binary sequence of 10 6 bits is examined using SP800-22 [73], and the results are shown in Table 1.

Proposed Secure MP-FrFT-OFDM Cryptosystem
Due to their effective use of network resources and bandwidth, ability to accommodate a range of mobility scenarios, and ability to deliver high data rates, OFDM systems have demonstrated widespread success in many wireless communication applications.Thus, it is anticipated that OFDM will continue to be a crucial enabling technology in present and future systems, including 5Gs [42].In order to deal with inter-channel interference (ICI) and inter-symbol interference (ISI) problems and permit simultaneous data transmission via band-limited channels, OFDM was first presented in the middle of the 1960s [48].Wide frequency selective channels are, in theory, divided into a number of small, flat fading sub-bands by OFDM.Despite the fact that OFDM sub-bands are made orthogonal and independent of one another, a guard band known as the cyclic prefix (CP) is necessary to lessen the impacts of ISI and ICI.Instead of employing an empty guard space, the idea of a CP is based on adding a cyclic extension to the symbol itself.In the suggested encryption scheme, authenticated biometric features are utilized as the biometric secret key generation with the proposed MCC-MF sine map chaotic secret key generation in order to design a DCBS generator for the MPFrFT OFDM image encryption.

Proposed DCBS Generator
The design of the proposed DCBS generator is based on the secure fractional number sequence generated from the proposed MCC-MF sine map and the biometric fingerprint minutiae generated from the FS83 s-FA Module [62].We assumed that the FS83 s-FA Module generated a sequence "T" ∈ [1,256] with a length of 2072 bytes.The block diagram of the proposed DCBS generator is shown in Figure 4.As shown in Figure 4, the proposed DCBS generator consists of 128 secret keys, an initial condition generation, and the proposed MCC-MF-sine map.The secret key is used for initial condition generation for the proposed MCC-MF-sine map with the fractional secure parameters (v 1 to v 4 ) in order to generate 2072 bytes and 512 × 512 bytes.The output of the MCC-MF-sine map is used as an input for the DCBS generator to produce two vectors a and b of sizes (1 × 256) and 256 × 256 bytes for the encryption and authentication process.

1.
The secret key (SK) of 128 bits represented by 32 hexadecimal digits "C2250EA6637F5A FAAF0654 9CCD16220A" is used to combined the biometric signature with the fractional number sequence generated from the proposed MCC-MF sine map.

2.
The secret key is divided into eight sections to generate the initial conditions and the different control parameters of the proposed MCC-MF sine map.All secret parameters and the initial condition are 10 −15 decimal precision.
Sensors 2023, 22, x FOR PEER REVIEW 9 of 25 space, the idea of a CP is based on adding a cyclic extension to the symbol itself.In the suggested encryption scheme, authenticated biometric features are utilized as the biometric secret key generation with the proposed MCC-MF sine map chaotic secret key generation in order to design a DCBS generator for the MPFrFT OFDM image encryption.

Proposed DCBS Generator
The design of the proposed DCBS generator is based on the secure fractional number sequence generated from the proposed MCC-MF sine map and the biometric fingerprint minutiae generated from the FS83 s-FA Module [62].We assumed that the FS83 s-FA Module generated a sequence "T" ∈ [1,256] 4-The first ( ) and the second ( ) eight hexadecimal digits are used to generate the first fractional secret control parameter ( ) as:

3.
The first eight hexadecimal digits (k 1 s ) and the last eight hexadecimal digits number eight k 8 s are used to generate the fractional initial condition of the proposed MCC-MF sine map as: The first (k 1 s ) and the second (k 2 s ) eight hexadecimal digits are used to generate the first fractional secret control parameter (r f 1 ) as: The next three fractional secret control parameters are given as: 6.
The proposed MCC-MF sine map given in Equation ( 15) is iterated t = 512 × 512 × 8 times by using the generated 4 secret parameters and the fractional secure parameters ( v 1 to v 4 ).

7.
Ignore the first 1000 bits to prove the chaos property of the generated chaotic sequence.
In addition, select the last 2072 bytes of the generated chaotic sequence.8.
Concatenate the chaotic sequence output (2072 bytes) with the 2072 bytes of the biometric signature to generate the dynamic chaotic biometric signature (DCBS).9.
Finally, randomly select 256 × 256 bytes from the iterated chaotic sequence 512 × 512 bytes for the diffusion process by Xoring with the original image and select the two different 256 vectors (a and b ), which are used as the secret multi-parameters for the confusion process in the MPFrFT OFDM transform.

Secure MP-FrFT-OFDM Based on MCC-MF Sine Map and DCBS Generator
The concept of OFDM is used in the physical layer communication based on Fast Fourier Transform (FFT).Also, the Fractional Fourier Transform (FrFT) is used in the OFDM system.The FrFT used only one parameter for the phase shift in the FFT which converts the FFT to FrFT.In the multi-parameters, FrFT used a vector of secret fractional values (0 to 1) with a length equal to the length of the FrFT for the OFDM system.In addition, the encryption process is applied in the frequency domain based on the OFDM system, which is the standard modulation used in the physical layer (IEEE 802.11 a/g/n).In this section, we suggested using the MPFrFT and the FrFT instead of the standard FFT in OFDM.The FFT-OFDM is only a multi-carrier transmission system.By using the FrFT instead FFT in OFDM, only one fraction order is used to change the phase in the output of the FrFT, which cannot satisfy any encryption properties.In this paper, the MPFrFT is used with the OFDM, where the MPFrFT has multi-parameters (ordered) equal to the length of the FrFT used, the length of MPFrFT can be 256, which means that the 256 parameters can be used as a secret key (secure multi-phase changing parameters).So, the encryption can be applied in the frequency domain without any additional equipment.
The framework of the proposed secure MP-FrFT-OFDM based on MCC-MF sine map and DCBS generator is given in Figure 5.The first step in the proposed MPFrFT OFDM image encryption based on the MCC-MF sine map and DCBS generator key is changing the input image into a binary format of (d = 256 × 256 × 8) bits, d ∈ {0, 1}.The second step involves applying the convolutional coding with a code rate (R = 1/2) to the image data bits as an error-correcting code.The coded data sequence is mapped onto the QPSKmodulated symbols.Based on the proposed DCBS generator, the secret multi-parameters are generated for the MPFrFT OFDM image encryption process; finally, the cyclic prefixes are added to the output of the MPFrFT OFDM encrypted data.In the receiver, the inverse processes are used.The three steps of the proposed cryptosystem will be discussed.The proposed secure MP-FrFT-OFDM based on MCC-MF sine map and DCBS generator is shown in Figure 5.

Authenticated Encryption Scheme
The ciphering technique's steps can be summed up as follows: 1. Read the image that was entered.
7. Add the cyclic prefix (CP) to the output of the secure MP-FrFT.8. Send the encrypted image across an IoT channel to the recipient side.

Authenticated Decryption
The deciphering technique's steps can be summed up as follows: 1. Receive the authenticated encrypted image data.
2. Remove the cyclic prefix (CP) from the received secure MP-FrFT.
3. The first step in the decryption is the de-confusion by applying the inverse MP-FrFTbased OFDM on the encrypted image based on the inverse two secret fractional parameter vectors − and − as follows: − = −(0.9+ ∑  ) 4. Apply QPSK de-mapping. 5. Apply convolutional de-coding for the diffusion 256 × 256 × 8 bits.6. Convert the authenticated encrypted image into binary format.

Authenticated Encryption Scheme
The ciphering technique's steps can be summed up as follows: 1.
Read the image that was entered.

2.
Convert the input image into binary format.

3.
The first encryption step started with the diffusion process by Xoring, which converts the binary image data of 256 × 256 × 8 bits with the select random iterated chaotic sequence of 256 × 256 × 8 bits.4.
Apply QPSK mapping.
Add the cyclic prefix (CP) to the output of the secure MP-FrFT.8.
Send the encrypted image across an IoT channel to the recipient side.

Authenticated Decryption
The deciphering technique's steps can be summed up as follows: 1.
Receive the authenticated encrypted image data.

2.
Remove the cyclic prefix (CP) from the received secure MP-FrFT.

3.
The first step in the decryption is the de-confusion by applying the inverse MP-FrFTbased OFDM on the encrypted image based on the inverse two secret fractional parameter vectors −a and −b as follows: −a = −(0.9 −b = −(0.9 4.

6.
Convert the authenticated encrypted image into binary format.7.
The second step in the decryption step is the de-diffusion by Xoring of the authenticated encrypted binary image data of 256 × 256 × 8 bits with the select random iterated chaotic sequence of 256 × 256 × 8 bits.8.
Apply the required analysis.
Examining the impact of noise, information entropy, visual inspection, histograms, assaults, differential, and encryption quality metrics, the effectiveness and security of the proposed system are examined.The recommended picture encryption approach maintains a good security quality, according to all numerical results.

Performance Analysis and Results
Key space analysis, UACI, NPCR, neighboring pixel correlation analysis, and histogram analysis are only a few of the statistical and security analysis techniques used.A CT scan of the brain (medical) and other images are chosen with different standard gray-scale test images such as Cameraman, Peppers and Lena for system simulation.The test image is 256 × 256 pixels.The OFDM parameters include the following: the total number of OFDM sub-carriers is denoted by (N sc = 256), the FFT length is set to a 256 bit length, and the CP is set to a 32 bit length.The suggested system performance is tested under the AWGN channel effect at zero mean µ = 0 and at different values of noise variances, σ 2 = 0.01, 0.05, 0.10, 0.15, 0.20 .Also, the proposed system is tested under different signal processing attacks as Salt and Pepper noise and Speckle noise.Analysis of the histogram, neighboring pixel correlation, key space, NPCR, and UACI tests are examples of statistical and security analysis.The multi-secure simulation parameters are displayed in Table 2.The suggested authenticated secure image transmission system simulation parameters are also shown in Tables 2 and 3.

Visual Quality Metrics
Remarkable indicators used in studying the encryption robustness are represented as the Key Performance Indicators (KPIs) for the proposed system.Visual quality inspection is measured in terms of BER performance and PSNR as a clarity investigation performance as well as statistical measures to evaluate the degree of encryption quantitatively.The visual quality metrics for the proposed scheme are measured in terms of BER performance and PSNR performance in the form E b N 0 vs.BER, and E b N 0 vs.PSNR as a visual testing for the received image.Different E b N 0 values between 0 and 18 dB are used to calculate the PSNR values of the received image.Bit Error Rate (BER) is a signal quality metric that evaluates the performance of the entire system, including the transmitter, the receiver, and the medium used to connect them.BER is defined as the ratio of the number of bits received in error due to interference, noise, or other problems to the total number of bits received.In [24], the BER simple formula is defined.

BER =
Number of bit errors Total number of transferred bits (25) The PSNR ratio, which is measured in decibels (dB), is regarded as a visual quality metric test of the reconstructed (decrypted) image compared to the original transmitted image [25].The quality of the produced image will be better the higher the PSNR value.Here, f 2 max denotes the highest pixel value possible, I(i, j) denotes the original image pixel, I ' (i, j) denotes the received image pixel values, (M × N) denotes the image size, and all other variables are equal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean µ = 0 and over certain ranges of noise variances, σ 2 = 0.01, 0.05, 0.10, 0.15, 0.20 , as shown in Table 4.  4.     and all other variables are equal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table 4.A Salt and Pepper noise attack is when a certain amount of the pixels in the image are affected by an impulse type of noise represented by either black or white dots (hence the name of the noise), which can significantly deteriorate the quality of an image [3].It can be used to model defects in the transmission of the image.The proposed authenticated secure image transmission scheme system is examined under Salt and Pepper noise attack; here, the noise density  = 0.02 .The  and  performances of the proposed ,  and  coded OFDM schemes are tabulated at different values of   (0 to 10 dB) in Tables 5 and 6.The results given in Table 5 are plotted in Figures 6  and 7, respectively.In Figure 6, at   = 8 dB, the FFT-OFDM BER performance is 8.60 × 10 , the FrFT-OFDM BER performance is 8.21 × 10 and the MPFrFT-OFDM BER performance is 8.59 × 10 .In Figure 6, at   = 8 dB, the FFT-OFDM PSNR performance is 30.65 dB , the FrFT-OFDM PSNR performance is 30.8548dB and the MP-FrFT-OFDM PSNR performance is 30.6579dB.The proposed FrFT-OFDM system gains PSNR performance improvement by about 0.1969 dB compared with the proposed MPFrFT-OFDM system, but a large key space is achieved by the MPFrFT OFDM system than the FrFT-OFDM system.A Salt and Pepper noise attack is when a certain amount of the pixels in the image are affected by an impulse type of noise represented by either black or white dots (hence the name of the noise), which can significantly deteriorate the quality of an image [3].It can be used to model defects in the transmission of the image.The proposed authenticated secure image transmission scheme system is examined under Salt and Pepper noise attack; here, the noise density  = 0.02 .The  and  performances of the proposed ,  and  coded OFDM schemes are tabulated at different values of   (0 to 10 dB) in Tables 5 and 6.The results given in Table 5 are plotted in Figures 6  and 7, respectively.In Figure 6, at   = 8 dB, the FFT-OFDM BER performance is 8.60 × 10 , the FrFT-OFDM BER performance is 8.21 × 10 and the MPFrFT-OFDM BER performance is 8.59 × 10 .In Figure 6, at   = 8 dB, the FFT-OFDM PSNR performance is 30.65 dB , the FrFT-OFDM PSNR performance is 30.8548dB and the MP-FrFT-OFDM PSNR performance is 30.6579dB.The proposed FrFT-OFDM system gains PSNR performance improvement by about 0.1969 dB compared with the proposed MPFrFT-OFDM system, but a large key space is achieved by the MPFrFT OFDM system than the FrFT-OFDM system.A Salt and Pepper noise attack is when a certain amount of the pixels in the image are affected by an impulse type of noise represented by either black or white dots (hence the name of the noise), which can significantly deteriorate the quality of an image [3].It can be used to model defects in the transmission of the image.The proposed authenticated secure image transmission scheme system is examined under Salt and Pepper noise attack; here, the noise density  = 0.02 .The  and  performances of the proposed ,  and  coded OFDM schemes are tabulated at different values of   (0 to 10 dB) in Tables 5 and 6.The results given in Table 5 are plotted in Figures 6  and 7, respectively.In Figure 6, at   = 8 dB, the FFT-OFDM BER performance is 8.60 × 10 , the FrFT-OFDM BER performance is 8.21 × 10 and the MPFrFT-OFDM BER performance is 8.59 × 10 .In Figure 6, at   = 8 dB, the FFT-OFDM PSNR performance is 30.65 dB , the FrFT-OFDM PSNR performance is 30.8548dB and the MP-FrFT-OFDM PSNR performance is 30.6579dB.The proposed FrFT-OFDM system gains PSNR performance improvement by about 0.1969 dB compared with the proposed MPFrFT-OFDM system, but a large key space is achieved by the MPFrFT OFDM system than the FrFT-OFDM system.A Salt and Pepper noise attack is when a certain amount of the pixels in the image are affected by an impulse type of noise represented by either black or white dots (hence the name of the noise), which can significantly deteriorate the quality of an image [3].It can be used to model defects in the transmission of the image.The proposed authenticated secure image transmission scheme system is examined under Salt and Pepper noise attack; here, the noise density  = 0.02 .The  and  performances of the proposed ,  and  coded OFDM schemes are tabulated at different values of   (0 to 10 dB) in Tables 5 and 6.The results given in Table 5 are plotted in Figures 6  and 7, respectively.In Figure 6, at   = 8 dB, the FFT-OFDM BER performance is 8.60 × 10 , the FrFT-OFDM BER performance is 8.21 × 10 and the MPFrFT-OFDM BER performance is 8.59 × 10 .In Figure 6, at   = 8 dB, the FFT-OFDM PSNR performance is 30.65 dB , the FrFT-OFDM PSNR performance is 30.8548dB and the MP-FrFT-OFDM PSNR performance is 30.6579dB.The proposed FrFT-OFDM system gains PSNR performance improvement by about 0.1969 dB compared with the proposed MPFrFT-OFDM system, but a large key space is achieved by the MPFrFT OFDM system than the FrFT-OFDM system.A Salt and Pepper noise attack is when a certain amount of the pixels in the image are affected by an impulse type of noise represented by either black or white dots (hence the name of the noise), which can significantly deteriorate the quality of an image [3].It can be used to model defects in the transmission of the image.The proposed authenticated secure image transmission scheme system is examined under Salt and Pepper noise attack; here, the noise density  = 0.02 .The  and  performances of the proposed ,  and  coded OFDM schemes are tabulated at different values of   (0 to 10 dB) in Tables 5 and 6.The results given in Table 5 are plotted in Figures 6  and 7, respectively.In Figure 6, at   = 8 dB, the FFT-OFDM BER performance is 8.60 × 10 , the FrFT-OFDM BER performance is 8.21 × 10 and the MPFrFT-OFDM BER performance is 8.59 × 10 .In Figure 6, at   = 8 dB, the FFT-OFDM PSNR performance is 30.65 dB , the FrFT-OFDM PSNR performance is 30.8548dB and the MP-FrFT-OFDM PSNR performance is 30.6579dB.The proposed FrFT-OFDM system gains PSNR performance improvement by about 0.1969 dB compared with the proposed MPFrFT-OFDM system, but a large key space is achieved by the MPFrFT OFDM system than the FrFT-OFDM system.A Salt and Pepper noise attack is when a certain amount of the pixels in the image are affected by an impulse type of noise represented by either black or white dots (hence the name of the noise), which can significantly deteriorate the quality of an image [3].It can be used to model defects in the transmission of the image.The proposed authenticated secure image transmission scheme system is examined under Salt and Pepper noise attack; here, the noise density d = 0.02.The BER and PSNR performances of the proposed FFT, FrFT and MPFrFT coded OFDM schemes are tabulated at different values of E b N 0 (0to10dB) in Tables 5 and 6.The results given in Table 5 are plotted in Figures 6 and 7, respectively.In Figure 6, at E b N 0 = 8dB, the FFT-OFDM BER performance is 8.60 × 10 −4 , the FrFT-OFDM BER performance is 8.21 × 10 −4 and the MPFrFT-OFDM BER performance is 8.59 × 10 −4 .In Figure 6, at E b N 0 = 8dB, the FFT-OFDM PSNR performance is 30.65dB, the FrFT-OFDM PSNR performance is 30.8548dB and the MP-FrFT-OFDM PSNR performance is 30.6579dB.The proposed FrFT-OFDM system gains PSNR performance improvement by about 0.1969dB compared with the proposed MPFrFT-OFDM system, but a large key space is achieved by the MPFrFT OFDM system than the FrFT-OFDM system.  (0 to 10 dB) in Tables 5 and 6.The results given in Table 5 are plotted in Figures 6  and 7, respectively.In Figure 6, at   = 8 dB, the FFT-OFDM BER performance is 8.60 × 10 , the FrFT-OFDM BER performance is 8.21 × 10 and the MPFrFT-OFDM BER performance is 8.59 × 10 .In Figure 6, at   = 8 dB, the FFT-OFDM PSNR performance is 30.65 dB , the FrFT-OFDM PSNR performance is 30.8548dB and the MP-FrFT-OFDM PSNR performance is 30.6579dB.The proposed FrFT-OFDM system gains PSNR performance improvement by about 0.1969 dB compared with the proposed MPFrFT-OFDM system, but a large key space is achieved by the MPFrFT OFDM system than the FrFT-OFDM system.7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets [4].Table 8 presents both BER and PSNR metrics performance for the proposed FFT, FrFT and MPFrFT coded OFDM systems at different values of E b N 0 (0dBto16dB) under Speckle noise attack.Speckle noise is represented as a multiplicative noise to the brain medical test image, using uniformly distributed random noise with zero mean, µ = 0 and variance, δ 2 = 0.02.The results in Table 8 are plotted in Figures 8 and 9 in order to clarify the Speckle noise attack effect on the proposed authenticated secure medical image transmission schemes.BER calculations were obtained for the introduced FFT, FrFT and MP − FrFT coded OFDM systems at E b N 0 = 8dB; the BER values are 3.70 × 10 −8 , 0, and 3.11 × 10 −4 respectively.At the same E b N 0 = 8dB, the PSNR performance values are 75.1229dB,InfdB, and 54.1514dB respectively.Then, at E b N 0 ≥ 8.50dB, the proposed systems provide the highest BER and PSNR performance (0BERandInfPSNR).Speckle noise is represented as a multiplicative noise to the brain medical test image, using uniformly distributed random noise with zero mean, µ = 0 and variance, δ 2 = 0.02.In addition, Table 9 shows the BER and PSNR performance for FFT, FrFT, and MPFrFT coded OFDM over Speckle noise attack at δ 2 = 0.02 at E b N 0 = 2, 8, 8.50dB.

Encryption Quality Metrics
Encryption quality metrics for the proposed scheme are measured using deferential

Encryption Quality Metrics
Encryption quality metrics for the proposed scheme are measured using deferential attack analysis, correlation analysis, histogram analysis, entropy analysis and key space analysis.

Deferential Attack Analysis
The number of pixels change rate (also known as the NPCR) and unified average changing intensity (also known as the UACI) are two frequently used tests that were used to evaluate the sensitivity of the encrypted image.To strengthen resistance to the differential attack, each small change to the plain image should result in a significant disruption of the cipher image.Consider  and  , two cypher pictures for two planar images  and  , which only differ by one pixel. (, ) and  (, ) are the gray-scale pixel values of the two images  and  , respectively.The NPCR and UACI are defined as [13]

Encryption Quality Metrics
Encryption quality metrics for the proposed scheme are measured using deferential attack analysis, correlation analysis, histogram analysis, entropy analysis and key space analysis.

Deferential Attack Analysis
The number of pixels change rate (also known as the NPCR) and unified average changing intensity (also known as the UACI) are two frequently used tests that were used to evaluate the sensitivity of the encrypted image.To strengthen resistance to the differential attack, each small change to the plain image should result in a significant disruption of the cipher image.Consider  and  , two cypher pictures for two planar images  and  , which only differ by one pixel. (, ) and  (, ) are the gray-scale pixel values of the two images  and  , respectively.The NPCR and UACI are defined as [13]

Encryption Quality Metrics
Encryption quality metrics for the proposed scheme are measured using deferential attack analysis, correlation analysis, histogram analysis, entropy analysis and key space analysis.

Deferential Attack Analysis
The number of pixels change rate (also known as the NPCR) and unified average changing intensity (also known as the UACI) are two frequently used tests that were used to evaluate the sensitivity of the encrypted image.To strengthen resistance to the differential attack, each small change to the plain image should result in a significant disruption of the cipher image.Consider  and  , two cypher pictures for two planar images  and  , which only differ by one pixel. (, ) and  (, ) are the gray-scale pixel values of the two images  and  , respectively.The NPCR and UACI are defined as [13]:

Encryption Quality Metrics
Encryption quality metrics for the proposed scheme are measured using deferential attack analysis, correlation analysis, histogram analysis, entropy analysis and key space analysis.

Deferential Attack Analysis
The number of pixels change rate (also known as the NPCR) and unified average changing intensity (also known as the UACI) are two frequently used tests that were used to evaluate the sensitivity of the encrypted image.To strengthen resistance to the differential attack, each small change to the plain image should result in a significant disruption of the cipher image.Consider C 1 and C 2 , two cypher pictures for two planar images p 1 and p 2 , which only differ by one pixel.C 1 (i, j) and C 2 (i, j) are the gray-scale pixel values of the two images C 1 and C 2 , respectively.The NPCR and UACI are defined as [13]: where D(i, j) is an identical-sized bipolar array to the cypher picture that is described as: In the simple images, p i is the value of the initial pixel.Without modifying any other values, it is changed to p i = (p i + 100) mod256 to obtain a second image and encrypt the two images in order to calculate the NPCR and UACI values of the two encoded images.Tables 10 and 11 display the findings of the NPCR and UACI for the proposed MP-FrFT, FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.Tables 10 and 11 shows the NPCR and U ACI the comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images

Correlation Analysis
Correlation is defined as a statistical relationship that measures the relativity between two variables.The correlation between the original image and encrypted image is measured between two vertically adjacent pixels: a plain image/cipher image, respectively [4].If the correlation coefficient values are closer to 1, it reflects highly dependent variables between the original and deciphered image (i.e., good decryption quality).If the correlation coefficients are closer to 0, it refers to highly independent variables between the original and cipher image (i.e., totally different, no features between original image and encrypted one, high-quality encryption algorithm).Smaller values of the correlation coefficients assess a successful encryption/decryption process.The correlation between original and encrypted images for the proposed systems MPFrFT and FrFT are tabulated in Table 12.These correlation coefficient values ensure the immunity of the proposed schemes.The correlation coefficient r xy is defined as [3]: where E(x) = 1 N × ∑ N i=1 x i , x, y are the gray-scale pixel values of the source and enciphered images.

Histogram Analysis
The definition of a histogram is a statistical graphical distribution of each discrete intensity level (also known as a "gray level") in a digital image into user-specified ranges.It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the  13 shows the histogram analysis for the proposed MPFrFTcoded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.intensity level (also known as a "gray level") in a digital image into user-specified ranges.
It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
Table 13.Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Encryption Decryption
intensity level (also known as a "gray level") in a digital image into user-specified ranges.
It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
Table 13.Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Encryption Decryption
intensity level (also known as a "gray level") in a digital image into user-specified ranges.
It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
Table 13.Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Encryption Decryption
intensity level (also known as a "gray level") in a digital image into user-specified ranges.
It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Encryption Decryption
intensity level (also known as a "gray level") in a digital image into user-specified ranges.
It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Encryption Decryption
intensity level (also known as a "gray level") in a digital image into user-specified ranges.
It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Encryption Decryption
intensity level (also known as a "gray level") in a digital image into user-specified ranges.
It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Encryption Decryption
intensity level (also known as a "gray level") in a digital image into user-specified ranges.
It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Encryption Decryption
The definition of a histogram is a statistical graphical distribution of each discrete intensity level (also known as a "gray level") in a digital image into user-specified ranges.It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Test Image
Original Image Histogram

Encryption Decryption
The definition of a histogram is a statistical graphical distribution of each discrete intensity level (also known as a "gray level") in a digital image into user-specified ranges.It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Test Image
Original Image Histogram

Encryption Decryption
The definition of a histogram is a statistical graphical distribution of each discrete intensity level (also known as a "gray level") in a digital image into user-specified ranges.It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Test Image
Original Image Histogram

Encryption Decryption
The definition of a histogram is a statistical graphical distribution of each discrete intensity level (also known as a "gray level") in a digital image into user-specified ranges.It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on.The histogram's horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5].The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis.As a result, an encrypted image's statistical metrics are the same as those of the matching source image.Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Test Image
Original Image Histogram  Encryption Decryption

Key Space Analysis
The total number of unique keys that can be utilized in the encryption process is calculated by the key space.If the length of each initial value or control parameter is set to 16 decimals, the secret keys for the proposed encryption consist of eight initial values (x 1 0 ) valid in the range of [0, 1] and four control parameters r 1 ,r 2 ,. .., r 4 valid in the range of 0.1 to 20.The key space determines the total number of distinct keys that can be used in the encryption process.The secret keys for the suggested encryption consist of eight starting values (x 1 0 ) valid in the range of [0, 1] and four control parameters r 1 ,r 2 ,. .., r 4 valid in the range of 0.1 to 20 if the length of each initial value or control parameter is set to 16 decimals.It is possible to determine the entire complexity (total key space) as follows: 10 15 × 10 15 × 10 15 × 10 15 × 10 15 = 10 4×15 =10 60 .The key space of an image of size 256 × 256 is 256 × 256 × 2 8 = 4×10 5 .In addition, the multi-parameter a and b has a key space for a = 10 15×256 and for b = 10 15×256 , so the total multi-parameter key space for the MP-FrFT-OFDM is equal to 10 7680 .Finally, the total key space of the proposed cryptosystem can be calculated as 10 60 × 4 × 10 5 ×10 7680 = 4 × 10 7745 = 2 2200 .The findings showed that the key space of our approach is very vast, preventing all sorts of brute force assaults.The key space of the proposed algorithm is more than 2 100 .The findings and analyses of the important space analysis are presented in Figure 10.

Entropy Analysis
The unpredictability of the received image is calculated using entropy, which is a measure of uncertainty in the cyphered image.Strong randomness and strong confidentiality are signs that the encoded image has high entropy [13].One definition of entropy in an information system reads like follows: Sensors 2023, 23,7843 where "m" is the information source, the symbol "m i " is represented by N total bits, it has a probability of p (m i ) , and the optimal information entropy value is close to 8. The entropy result based on the proposed algorithm is 7.9999.
in the range of 0.1 to 20 if the length of each initial value or control parameter is set to 16 decimals.It is possible to determine the entire complexity (total key space) as follows: 10 × 10 × 10 × 10 × 10 = 10 × =10 .The key space of an image of size 256 × 256 is 256 × 256 × 2 = 4×10 .In addition, the multi-parameter  and  has a key space for  = 10 × and for  = 10 × , so the total multi-parameter key space for the MP-FrFT-OFDM is equal to 10 .Finally, the total key space of the proposed cryptosystem can be calculated as 10 × 4 × 10 × 10 = 4 × 10 = 2 .The findings showed that the key space of our approach is very vast, preventing all sorts of brute force assaults.
The key space of the proposed algorithm is more than 2 .The findings and analyses of the important space analysis are presented in Figure 10.The unpredictability of the received image is calculated using entropy, which is a measure of uncertainty in the cyphered image.Strong randomness and strong confidentiality are signs that the encoded image has high entropy [13].One definition of entropy in an information system reads like follows: () = − ∑ ( ) ( ) (32) where "m" is the information source, the symbol " " is represented by N total bits, it has a probability of  ( ) , and the optimal information entropy value is close to 8. The entropy result based on the proposed algorithm is 7.9999.

Key Sensitivity Analysis
A strong encryption system should be highly sensitive to even the smallest alteration to the secret keys [13].Assume the control settings and beginning values that are used to encrypt plain photos ( ) and ( ,  ,…,  ) in order to test the key sensitivity.Use the

Key Sensitivity Analysis
A strong encryption system should be highly sensitive to even the smallest alteration to the secret keys [13].Assume the control settings and beginning values that are used to encrypt plain photos x 1 0 and (r 1 ,r 2 ,. .., r 4 in order to test the key sensitivity.Use the new key to decode the image after the encryption process by adding 10 −16 to any beginning condition or control parameter.As a result, Figure 11 shows the key sensitivity test demonstrates how sensitive the proposed encryption system is to the security key.That indicates the least amount of secret key modification during the decoding procedure.The outcome will be an image that is entirely unencrypted.new key to decode the image after the encryption process by adding 10 to any beginning condition or control parameter.As a result, Figure 11 shows the key sensitivity test demonstrates how sensitive the proposed encryption system is to the security key.That indicates the least amount of secret key modification during the decoding procedure.The outcome will be an image that is entirely unencrypted.

Comparative Analysis
In this section, the performance comparison between the proposed cryptosystem results and other methods described in the literature for the Lena image of size 256 × 256 is shown in Table 14.The comparison between the proposed cryptosystem and the other recent methods is based on different criteria such as key space, entropy, correlation, NPCR and UACI.As shown in Table 14, whether the proposed DCBS-MP-FrFT-OFDM cryptosystem has the capacity to withstand various attacks is evaluated in order to determine

Comparative Analysis
In this section, the performance comparison between the proposed cryptosystem results and other methods described in the literature for the Lena image of size 256 × 256  14.The comparison between the proposed cryptosystem and the other recent methods is based on different criteria such as key space, entropy, correlation, NPCR and UACI.As shown in Table 14, whether the proposed DCBS-MP-FrFT-OFDM cryptosystem has the capacity to withstand various attacks is evaluated in order to determine the encryption system's strength.The proposed method for evaluating it was put through a safety check, which included discussions of the histogram, entropy, correlation coefficient, NPCR, UACI, and NIST randomness tests.

Conclusions
A new physical layer authenticated encryption (PLAE) technique focused on the multi-parameter fractional Fourier transform-orthogonal frequency division multiplexing (MP-FrFT-OFDM) is proposed in this paper for secure image transmission over public IoT networks.This paper designs and studies a new, robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map).A novel dynamic chaotic biometric (Digital Fingerprint) signature (DCBS) generator based on combining the biometric signature and the suggested MCC-MF sine map random chaotic sequence output is also devised.It is based on the proposed MCC-MF sine map random chaotic sequence output.For the multiparameter fractional Fourier transform in the OFDM system, which studies the encryption process in the frequency domain, the suggested DCBS generator's output is used as a dynamic secret key.The suggested DCBS secret key generator is used to satisfy the secrecy and authentication features.The proposed DCBS-MP-FrFT-OFDM cryptosystem over IoT network's security strengths are tested using statistical analysis, differential analysis, and key sensitivity analysis.The suggested proposed DCBS-MP-FrFT-OFDM cryptosystem's ability to withstand various attacks is tested in order to gauge how strong the encryption system is.The suggested approach for evaluating it was subjected to a safety examination, which covered discussions of the histogram, entropy, correlation coefficient, NPCR, UACI, and NIST randomness tests.
This study adds to the body of literature by further examining the flaws of using the MPFrFT as two dimensions with multi-parameters of the FrFT, which increase the secret key space based on multi-phase shifting strategy in OFDM.The proposed DCBS-MP-FrFT-OFDM cryptosystem does not need any additional equipment, except the OFDM is replaced by MP-FrFT-OFDM and an external two-dimensional multi-parameters DCBS generator.The DCBS generator generates the all the secret keys in the proposed cryptosystem.In addition, the limitations of the proposed MPFrFT-OFDM scheme include that the two secret vectors can be optimized in order to improve the BER performance.On the other hand, for the security analysis, the MPFrFT OFDM has a very large key space as discussed in the key space analysis compared with other systems.
In the future, we will propose a brand-new deep CNN that can produce a digital signature in order to satisfy the identity property.Additionally, a digital deep CNN signcryption system can be created to combine the encryption and digital signature.Future studies could also concentrate on watermarking, data hiding in encrypted images, and stream video encryption and decoding.It will also be advised to use a new Deep Convolutional Neural Network for a compression-encryption system.Also, in future work, different optimization schemes can be used to optimize the selection of the two vectors a and b with a size of 1 × 256 fractional numbers in the range of (0 to 1) to improve the BER performance of the proposed MPFrFT OFDM.

Sensors 2023 ,
22, x FOR PEER REVIEW 7 of 25 consists of four fractional chaotic sine maps connected in concatenated form with different secret parameters.The modular function is used to improve the chaotic property based on the continuity of the map output.
describe the output series, the bifurcation diagram (BD), and the Lyapunov value.
describe the output series, the bifurcation diagram (BD), and the Lyapunov value.Sensors 2023, 22, x FOR PEER REVIEW 7 of 25 consists of four fractional chaotic sine maps connected in concatenated form with different secret parameters.The modular function is used to improve the chaotic property based on the continuity of the map output.

Figure 3 .
Figure 3. (a) BD of the conventional non-modular FSCM.(b) LE of the conventional non-modular FSCM.(c) BD of the proposed MCC-MF sine map.(d) LE of the proposed MCC-MF sine map.

Figure 3 .
Figure 3. (a) BD of the conventional non-modular FSCM.(b) LE of the conventional non-modular FSCM.(c) BD of the proposed MCC-MF sine map.(d) LE of the proposed MCC-MF sine map.
with a length of 2072 bytes.The block diagram of the proposed DCBS generator is shown in Figure 4.As shown in Figure 4, the proposed DCBS generator consists of 128 secret keys, an initial condition generation, and the proposed MCC-MF-sine map.The secret key is used for initial condition generation for the proposed MCC-MF-sine map with the fractional secure parameters (   ) in order to generate 2072 bytes and 512 × 512 bytes.The output of the MCC-MF-sine map is used as an input for the DCBS generator to produce two vectors  and  of sizes (1 × 256) and 256 × 256 bytes for the encryption and authentication process.

Figure 4 .
Figure 4. Proposed DCBS generator block diagram based on MCC-MF sine map.1-The secret key (SK) of 128 bits represented by 32 hexadecimal digits "C2250EA6637F5AFAAF0654 9CCD16220A" is used to combined the biometric signature with the fractional number sequence generated from the proposed MCC-MF sine map.2-The secret key is divided into eight sections to generate the initial conditions and the different control parameters of the proposed MCC-MF sine map.All secret parameters and the initial condition are 10 decimal precision.3-The first eight hexadecimal digits ( ) and the last eight hexadecimal digits number eight ( ) are used to generate the fractional initial condition of the proposed MCC-MF sine map as:

Figure 4 .
Figure 4. Proposed DCBS generator block diagram based on MCC-MF sine map.

Figure 5 .
Figure 5.The proposed secure MP-FrFT-OFDM based on MCC-MF sine map and DCBS generator.

2 .
Convert the input image into binary format.3. The first encryption step started with the diffusion process by Xoring, which converts the binary image data of 256 × 256 × 8 bits with the select random iterated chaotic sequence of 256 × 256 × 8 bits.4. Apply convolutional coding for the diffusion 256 × 256 × 8 bits. 5. Apply QPSK mapping.6.The second encryption step is the confusion process, applying the inverse MPFrFT based OFDM modulation based on the two secret fractional parameter vectors a = 256 bytes ( ,  , ⋯ ,  ) and  = 256 bytes ( ,  , ⋯ ,  ) as follows:

Figure 5 .
Figure 5.The proposed secure MP-FrFT-OFDM based on MCC-MF sine map and DCBS generator.

6 .
The second encryption step is the confusion process, applying the inverse MPFrFT based OFDM modulation based on the two secret fractional parameter vectors a = 256 bytes(a 1 , a 2 , • • • , a 256 ) and b = 256 bytes (b 1 , b 2 , • • • , b 256 ) as follows:

Table 4 .
AWGN channel effect at zero mean µ = 0 and over certain ranges of noise variances σ 2 = 0.01, 0.05, 0.10, 0.15, 0.20 .and all other variables are equal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table

Figure 7 .
Figure 7. PSNR of FFT, FrFT, MPFrFT OFDM over Salt and Pepper noise attack, d = 0.02.Different E b N 0 values 2, 8 and 16dB are chosen in Table7in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect.In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images.It results from the coherence of backscattered signals from various distributed targets[4].

Figure 10 .
Figure 10.Encryption and decryption results of the gray images Baboon, Lena, and Cameraman.(a) the original images, (b) the encrypted images, (c) the decrypted images 5.2.5.Entropy Analysis

Figure 10 .
Figure 10.Encryption and decryption results of the gray images Baboon, Lena, and Cameraman.(a) the original images, (b) the encrypted images, (c) the decrypted images.

Figure 11 .
Figure 11.Key sensitivity analysis, original images are shown in (a), cipher images of the original key are shown in (b).Decrypted images for the incorrect decryption key are shown in (c), decrypted images for the correct decryption key are shown in (d).

Figure 11 .
Figure 11.Key sensitivity analysis, original images are shown in (a), cipher images of the original key are shown in (b).Decrypted images for the incorrect decryption key are shown in (c), decrypted images for the correct decryption key are shown in (d).

Table 1 .
The randomness tests results for the proposed MCC-MF sine map based on NIST SP800-22 tests.

Table 1 .
The randomness tests results for the proposed MCC-MF sine map based on NIST SP800-22 tests.

Table 2 .
The multi-secure parameters used in the simulations.

Table 3 .
The proposed authenticated secure image transmission system simulation parameters.
and all other variables are equal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table4.
and all other variables are equal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table4.

Table 4 .
AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances ( = 0.01, 0.05, 0.10, 0.15, 0.20).variablesareequal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table4.

Table 4 .
AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances ( = 0.01, 0.05, 0.10, 0.15, 0.20).variablesareequal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table4.

Table 4 .
AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances ( = 0.01, 0.05, 0.10, 0.15, 0.20).variablesareequal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table4.

Table 4 .
AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances ( = 0.01, 0.05, 0.10, 0.15, 0.20).variablesareequal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table4.

Table 4 .
AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances ( = 0.01, 0.05, 0.10, 0.15, 0.20).variablesareequal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table4.

Table 4 .
AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances ( = 0.01, 0.05, 0.10, 0.15, 0.20).variablesareequal.Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique.The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band.Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean  = 0 and over certain ranges of noise variances, ( = 0.01, 0.05, 0.10, 0.15, 0.20), as shown in Table4.

Table 5 .
performances of the proposed ,  and  coded OFDM under Salt and Pepper noise, noise density  = 0.02.

Table 5 .
performances of the proposed ,  and  coded OFDM under Salt and Pepper noise, noise density  = 0.02.

Table 5 .
performances of the proposed ,  and  coded OFDM under Salt and Pepper noise, noise density  = 0.02.

Table 5 .
performances of the proposed ,  and  coded OFDM under Salt and Pepper noise, noise density  = 0.02.

Table 5 .
performances of the proposed ,  and  coded OFDM under Salt and Pepper noise, noise density  = 0.02.

Table 5 .
BER performances of the proposed FFT, FrFT and MPFrFT coded OFDM under Salt and Pepper noise, noise density d = 0.02.

Table 6 .
PSNR performances of the proposed FFT, FrFT and MPFrFT coded OFDM under Salt & Pepper noise, noise density d = 0.02.

Table 5 .
performances of the proposed ,  and  coded OFDM under Salt and Pepper noise, noise density  = 0.02.
Different   values 2, 8 and 16 dB are chosen in Table
Different   values 2, 8 and 16 dB are chosen in Table
Different   values 2, 8 and 16 dB are chosen in Table
Different   values 2, 8 and 16 dB are chosen in Table
Different   values 2, 8 and 16 dB are chosen in Table
Different   values 2, 8 and 16 dB are chosen in Table
Different   values 2, 8 and 16 dB are chosen in Table
Different   values 2, 8 and 16 dB are chosen in Table
Different   values 2, 8 and 16 dB are chosen in Table

Table 10 .
NPCR comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 11 .
U ACI comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 12 .
Correlation comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 13 .
Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

Table 14 .
Performance comparison between the proposed cryptosystem results and other methods described in the literature for a Lena image of size 256 × 256.