Some author claim that they have successfully applied differential attack to their scheme which involve Fourier transform and other linear transform in which they are doing pixel to pixel transformation. Also as domain changes, what would be formula of UACI.