K-potent matrices-construction and applications in digital image encryption
From MaRDI portal
Publication:3178065
zbMATH Open1341.94008MaRDI QIDQ3178065FDOQ3178065
Authors: Yan Wu
Publication date: 8 July 2016
Recommendations
- Algorithms for \(\{K, s + 1\}\)-potent matrix constructions
- Characterizations of \(\{K,s+1\}\)-potent matrices and applications
- On \(k\)-potent matrices
- Image encryption based on pseudo-centro-invertible matrices
- Spectral study of \(\{ R, s + 1, k \}\)- and \(\{R, s + 1, k, \ast \}\)-potent matrices
Eigenvalues, singular values, and eigenvectors (15A18) Image processing (compression, reconstruction, etc.) in information and communication theory (94A08)
Cited In (7)
- Representation of tripotents and representations via tripotents
- On the spectrum of linear combinations of finitely many diagonalizable matrices that mutually commute
- On idempotency of linear combinations of a quadratic or a cubic matrix and an arbitrary matrix
- On involutiveness of linear combinations of a quadratic matrix and an arbitrary matrix
- Tripotents in algebras: invertibility and hyponormality
- Tripotent elements in quaternion rings over \(\mathbb{Z}_p\)
- On characterization of tripotent matrices in triangular matrix rings
This page was built for publication: K-potent matrices-construction and applications in digital image encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3178065)