This is a corrigendum of the paper: Küçük, A. Z. & Düz, M. (2017). Relationships between the permanents of a certain type of k-tridiagonal symmetric Toeplitz and the Chebyshev polynomials. Journal of Applied Mathematics and Computational Mechanics, 16, 75-86. We will show that Remark 9, on page 84, does not hold, what is the consequence of the incorrect proof, which authors formulated there.
In the current paper, we present a computationally efficient algorithm for obtaining the inverse of a pentadiogonal toeplitz matrix. Few conditions are required, and the algorithm is suited for implementation using computer algebra systems.
In this study, the recursive relations between the permanents of a certain type of the k-tridiagonal symmetric Toeplitz matrix with complex entries and the Chebyshev polynomials of the second kind are presented.
In this article an explicit formula for eigenvalues of a 2-tridiagonal Toeplitz matrix can be derived on the basis of a certain relation between the determinant of this matrix and the determinant of a pertinent tridiagonal matrix. It can be pointed out that the problem is investigated without imposing any conditions on the elements of matrix.
In this paper we show that the determinant of heptadiagonal symmetric Toeplitz matrix can be represented by a particular solution of the system of three homogeneous linear recurrence equations. The general considerations are illustrated by certain numerical example implementated in the Maple system.
6
Dostęp do pełnego tekstu na zewnętrznej witrynie WWW
This paper presents a novel image encryption scheme based on Toeplitz matrix and Hankel matrix. According to the definition and the expression of Toeplitz matrix and Hankel matrix, we permutate the positions of image pixels to confuse the relationship between the plain-image and cipher-image, and construct a new key. To enhance security further, hyper-chaos system of L¨u and Chen is taken to change the grey distribution of image pixels simultaneously. Numerical experimental results demonstrate that the key space is large enough, and the key is sensitive to initial conditions to resist the brute-force attack in the proposed scheme. Additionally, the distribution of grey values in encrypted image has a random-like behavior to resist statistical analysis. The proposed encryption scheme in this paper can suggest a high secure and efficient way for real-time image encryption and transmission in practice.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.