Loading [MathJax]/jax/output/SVG/jax.js
Research article

Algorithms for solving a class of real quasi-symmetric Toeplitz linear systems and its applications

  • Received: 19 November 2022 Revised: 29 January 2023 Accepted: 29 January 2023 Published: 13 February 2023
  • In this paper, fast numerical methods for solving the real quasi-symmetric Toeplitz linear system are studied in two stages. First, based on an order-reduction algorithm and the factorization of Toeplitz matrix inversion, a sequence of linear systems with a constant symmetric Toeplitz matrix are solved. Second, two new fast algorithms are employed to solve the real quasi-symmetric Toeplitz linear system. Furthermore, we show a fast algorithm for quasi-symmetric Toeplitz matrix-vector multiplication. In addition, the stability analysis of the splitting symmetric Toeplitz inversion is discussed. In mathematical or engineering problems, the proposed algorithms are extraordinarily effective for solving a sequence of linear systems with a constant symmetric Toeplitz matrix. Fast matrix-vector multiplication and a quasi-symmetric Toeplitz linear solver are proven to be suitable for image encryption and decryption.

    Citation: Xing Zhang, Xiaoyu Jiang, Zhaolin Jiang, Heejung Byun. Algorithms for solving a class of real quasi-symmetric Toeplitz linear systems and its applications[J]. Electronic Research Archive, 2023, 31(4): 1966-1981. doi: 10.3934/era.2023101

    Related Papers:

    [1] Natália Bebiano, João da Providência, Wei-Ru Xu . Approximations for the von Neumann and Rényi entropies of graphs with circulant type Laplacians. Electronic Research Archive, 2022, 30(5): 1864-1880. doi: 10.3934/era.2022094
    [2] Jia-Min Luo, Hou-Biao Li, Wei-Bo Wei . Block splitting preconditioner for time-space fractional diffusion equations. Electronic Research Archive, 2022, 30(3): 780-797. doi: 10.3934/era.2022041
    [3] D. Mosić, P. S. Stanimirović, L. A. Kazakovtsev . The $ m $-weak group inverse for rectangular matrices. Electronic Research Archive, 2024, 32(3): 1822-1843. doi: 10.3934/era.2024083
    [4] Ming-Kai Wang, Cheng Wang, Jun-Feng Yin . A class of fourth-order Padé schemes for fractional exotic options pricing model. Electronic Research Archive, 2022, 30(3): 874-897. doi: 10.3934/era.2022046
    [5] Asima Razzaque, Abdul Razaq, Sheikh Muhammad Farooq, Ibtisam Masmali, Muhammad Iftikhar Faraz . An efficient S-box design scheme for image encryption based on the combination of a coset graph and a matrix transformer. Electronic Research Archive, 2023, 31(5): 2708-2732. doi: 10.3934/era.2023137
    [6] Jiachen Mu, Duanzhi Zhang . Multiplicity of symmetric brake orbits of asymptotically linear symmetric reversible Hamiltonian systems. Electronic Research Archive, 2022, 30(7): 2417-2427. doi: 10.3934/era.2022123
    [7] Yang Song, Beiyan Yang, Jimin Wang . Stability analysis and security control of nonlinear singular semi-Markov jump systems. Electronic Research Archive, 2025, 33(1): 1-25. doi: 10.3934/era.2025001
    [8] Ruiping Wen, Liang Zhang, Yalei Pei . A hybrid singular value thresholding algorithm with diagonal-modify for low-rank matrix recovery. Electronic Research Archive, 2024, 32(11): 5926-5942. doi: 10.3934/era.2024274
    [9] Cairong Chen . A structure-preserving doubling algorithm for solving a class of quadratic matrix equation with $ M $-matrix. Electronic Research Archive, 2022, 30(2): 574-584. doi: 10.3934/era.2022030
    [10] Wenya Shi, Xinpeng Yan, Zhan Huan . Faster free pseudoinverse greedy block Kaczmarz method for image recovery. Electronic Research Archive, 2024, 32(6): 3973-3988. doi: 10.3934/era.2024178
  • In this paper, fast numerical methods for solving the real quasi-symmetric Toeplitz linear system are studied in two stages. First, based on an order-reduction algorithm and the factorization of Toeplitz matrix inversion, a sequence of linear systems with a constant symmetric Toeplitz matrix are solved. Second, two new fast algorithms are employed to solve the real quasi-symmetric Toeplitz linear system. Furthermore, we show a fast algorithm for quasi-symmetric Toeplitz matrix-vector multiplication. In addition, the stability analysis of the splitting symmetric Toeplitz inversion is discussed. In mathematical or engineering problems, the proposed algorithms are extraordinarily effective for solving a sequence of linear systems with a constant symmetric Toeplitz matrix. Fast matrix-vector multiplication and a quasi-symmetric Toeplitz linear solver are proven to be suitable for image encryption and decryption.



    There have been extensive studies and applications of Toeplitz and quasi-Toeplitz matrices recently. Toeplitz or quasi-Toeplitz matrices are adopted as a core tool in the quantum magnetic field [1], generation of random bits [2], quantum key distribution [3,4,5], the evaluation of the short-time rate of change in the trend of CO2 data [6], the deconvolution of hemodynamic responses [7] and the scattering and radiation on thin wire models [8]. Some studies have utilized Toeplitz or quasi-Toeplitz matrices to solve the ordinary and partial differential equations [9,10], also applying them to solve the fractional differential equations [11,12,13,14,15,16].

    A large number of linear systems with Toeplitz coefficient matrices need to be solved. Recently, Liu et al. developed fast solvers for Toeplitz linear systems [17,18,19]. The inversion of the Toeplitz matrix is represented as a combination of circulant and skew-circulant matrices in [20,21] so that the solution can be gained directly by using the fast Fourier transform (FFT) and the inverse FFT (IFFT). Here, we turn to express the Toeplitz inversion by using the sum products of the skew-imaginary circulant [22] and skew-circulant matrices, where the skew-imaginary circulant matrix is an ω-circulant matrix with ω=i, i=1.

    Regarding the design of fast algorithms for a quasi-Toeplitz linear system, the authors of [23] presented new efficient algorithms to solve the CUPL-Toeplitz linear system [24,25,26] by first splitting the CUPL-Toeplitz matrix into a Toeplitz matrix and a low-rank matrix. In [27], Zhang et al. studied order-reduction algorithms to further reduce the computation complexity. The tridiagonal quasi-Toeplitz linear system is solved in [28].

    We are concerned with a class of quasi-symmetric Toeplitz linear systems. The authors of [18] showed the trigonometric transformation splitting method to solve the real symmetric Toeplitz linear system. Different from the iterative method, we adopt the direct method based on the symmetric Toeplitz inversion representation, which is simplified due to the symmetry. We also show the numerical stability of the splitting symmetric Toeplitz inversion inspired by previous studies [26,29,30].

    In this paper, we study an n×n real symmetric Toeplitz matrix with perturbations in the first and last columns P=(pj,k)nj,k=1Rn×n:

    pj,k={ς1+t1,j=2 and k=1,ς2+t1,j=n1 and k=n,t|jk|, otherwise. (1.1)

    Obviously,

    P=A+αeT1+βeTn, (1.2)

    where α=[0,ς1,0,,0]T, e1=[1,0,,0]T is the first unit vector, β=[0,,0,ς2,0]T, en=[0,,0,1]T is the last unit vector and A=(t|jk|)nj,k=1 is a nonsingular symmetric Toeplitz matrix.

    An outline of this paper is as follows. Section 2 solves a sequence of linear systems with the same symmetric Toeplitz coefficient matrix. Section 3 presents the solvers for the quasi-symmetric Toeplitz linear system. A discussion of the quasi-symmetric Toeplitz matrix-vector multiplication is presented in Section 4. In Section 5, the stability analysis of the splitting inverse of the symmetric Toeplitz matrix is shown. Different numerical examples are given in Section 6. In Section 7, images are encrypted and decrypted by using the proposed quasi-symmetric Toeplitz matrix. Finally, we express our conclusions in Section 8.

    The starting point of the algorithms derived in this paper is the following inversion formula of Toeplitz matrices:

    Lemma 1. [31,p. 738] Let A=(tjk)nj,k=1Rn×n be a Toeplitz matrix. If the vectors x=[x1,x2,,xn]T, x10 and y=[y1,y2,,yn])T are the solutions of the linear systems

    Ax=e1andAy=en. (2.1)

    Then A is invertible and

    A1=1x1(i+1)(SI1S1SI2S2), (2.2)

    where SI1 and SI2 are skew-imaginary circulant matrices [22] holding the first columns as x=[x1,x2,,xn]T and ˜y=[iyn,y1,y2,,yn1]T respectively; S1 and S2 are skew-circulant matrices with the first columns ˆy=[yn,y1,y2,,yn1]T and x=[x1,x2,,xn]T respectively.

    Note that we are concerned with a symmetric Toeplitz matrix A; then, the special structure means that the solutions x and y in Eq (2.1) satisfy y=Jx, where the matrix J is an anti-identity matrix of order n.

    If Ax=e1 has the solution x=[x1,x2,,xn]T and x10, then the symmetric Toeplitz matrix A is invertible and Eq (2.2) can be rewritten as

    A1=1x1(i+1)(SIST+iSIS), (2.3)

    where SI and S have the same first column x=[x1,x2,,xn]T and the symbol SI denotes the conjugate transpose of SI.

    Performing the diagonalization scheme on the skew-imaginary circulant matrix, that is, SI=ΩnFnΛSIFnΩn, we can obtain

    A1=1x1(i+1)ΩnFn(ΛSIFnΩnST+iΛSIFnΩnS), (2.4)

    where Fn=(Fj,k)nj,k=1, Fj,k=1ne2πi(j1)(k1)n, 1j,kn, Ωn=diag(1,e3iπ2n,,e3i(n1)π2n) and ΛSI is a diagonal matrix containing the eigenvalues of SI.

    Equation (2.4) shows a new decomposition of the symmetric Toeplitz inversion. By taking full account of the structural characteristics of the symmetric matrix, we solve only one system Ax=e1 instead of two linear systems.

    In the case of solving a sequence of linear systems with the same coefficient matrix, it is effective to solve Ax=e1 first and then use the new decomposition of the inverse of the symmetric Toeplitz matrix for calculation. Therefore, Algorithm 1 is proposed for the computation of x and the eigenvalues of SI. By applying Eq (2.4), an order-reduction algorithm [27] and FFT and IFFT operations, Algorithm 2 realizes the product of A1 and v in the real number fields.

    Algorithm 1: Compute x and ΛSI
    Step 1: Solve Ax=e1 by using any symmetric Toeplitz linear solver
    Step 2: SI and S have the same first column: x=[x1,x2,,xn]T
    Step 3: The entries of ΛSI are computed from nFnΩnx by applying an FFT

     | Show Table
    DownLoad: CSV
    Algorithm 2: An algorithm for z=A1v in the real number field
    Step 1: Calculate the vectors vST=STv and vS=Sv by using Algorithm 1 in [27]
    Step 2: Calculate ˜v=ΛSIFnΩnvST+iΛSIFnΩnvS by applying the FFT
    Step 3: Calculate z=1x1(i+1)ΩnFn˜v by applying Eq (2.4) and IFFT

     | Show Table
    DownLoad: CSV

    In the proposed algorithms, the diagonal matrix can be represented by a vector containing the diagonal entries; then, the multiplication of the diagonal matrix and the vector is implemented by using a dot product, thus reducing the storage and computational complexity.

    To solve a sequence of linear systems with a constant symmetric Toeplitz coefficient matrix, Algorithm 1 only needs to be computed once. The first step in Algorithm 1 is to solve the symmetric Toeplitz linear system Ax=e1. Any symmetric Toeplitz linear solver can be used, such as the generalized minimal residual (GMRES) method, simplified quasi-minimal residual method, conjugate gradient (CG) method, etc. Since A is set as a symmetric positive definite matrix in our numerical experiments in this paper, we choose a the preconditioned CG (PCG) method with the Strang circulant preconditioner [32] to solve it. The workload of Algorithm 1 is considered to be O(nlog2n).

    One FFT or IFFT needs 5nlog2n+O(n) real arithmetic operations [33,p. 75], and one run of Algorithm 1 in [27] needs 15n2log2n+O(n). Algorithm 2 mainly consists of two FFTs, one IFFT and two runs of Algorithm 1 in [27]. In the first step of Algorithm 2, it can save two FFTs with the length n2 when calculating STv and Sv simultaneously. Finally, we regard the workload of Algorithm 2 as 25nlog2n+O(n). The application of the order-reduction algorithm reduces the entire computational complexity.

    A sequence of Toeplitz linear systems with the same coefficient matrix is solved in [20,21,34]. The method of using the splitting Toeplitz matrix inversion greatly saves the computational time. This reminds us that in a mathematical or engineering problem, we may be faced with thousands of linear systems with the same symmetric Toeplitz matrix. By applying Algorithm 2, it will be more efficient to solve these symmetric Toeplitz linear systems.

    In this section, we solve a real quasi-symmetric Toeplitz linear system

    Pa=b, (3.1)

    where a=[a1,a2,,an]T is an unknown vector and b=[b1,b2,,bn]T is known. The coefficient matrix has a decomposition shown in Eq (1.2). We substitute Eq (1.2) into Eq (3.1) and multiply both sides of the equation by A1 from the left; given that In is an identity matrix, we have

    (In+A1αeT1+A1βeTn)a=A1b. (3.2)

    Let A1α=μ, A1β=ν and A1b=η, where μ=[μ1,μ2,,μn]T, ν=[ν1,ν2,,νn]T and η=[η1,η2,,ηn]T. The solution of Eq (3.2) can be

    a=(In+μeT1+νeTn)1η. (3.3)

    Therefore, solving Pa=b is the same as calculating Eq (3.3). Based on the Sherman-Morrison-Woodbury (SMW) formula [35], (In+μeT1+νeTn)1 can be represented as

    (In+μeT1+νeTn)1=InC, (3.4)

    where C=(cj,k)nj,k=1 and

    cj,k={(1+νn)μjμnνj(1+μ1)(1+νn)μnν1,k=1,(1+μ1)νjν1μj(1+μ1)(1+νn)μnν1,k=n,0,otherwise. (3.5)

    According to Eqs (3.3)–(3.5), we have

    a=(InC)η=(ηjcj,1η1cj,nηn)nj=1. (3.6)

    To solve the linear system Pa=b, we must solve the symmetric Toeplitz systems Aμ=α, Aν=β and Aη=b at first. By using Algorithms 1 and 2 and Eqs (3.5) and (3.6), we obtain the following:

    Algorithm 3: An algorithm to solve the real quasi-symmetric Toeplitz system Pa=b
    Step 1: Run Algorithm 1
    Step 2: Calculate μ=A1α, ν=A1β and η=A1b by using Algorithm 2
    Step 3: Calculate cj,k by using Eq (3.5)
    Step 4: Calculate a by using Eq (3.6)

     | Show Table
    DownLoad: CSV

    Similarly, if we multiply Eq (1.2) by A1 from the right, we can get P=(In+αeT1A1+βeTnA1)A and substitute it into Eq (3.1); then,

    (In+αeT1A1+βeTnA1)Aa=b. (3.7)

    Denote eT1A1=ρT, eTnA1=σT and Aa=ψ, where ρ=[ρ1,ρ2,,ρn]T, σ=[σ1,σ2,,σn]T and ψ=[ψ1,ψ2,,ψn]T. Then, Eq (3.7) can be rewritten as

    ψ=(In+αρT+βσT)1b. (3.8)

    The SMW formula is applied to Eq (3.8); we can write

    (In+αρT+βσT)1=InD, (3.9)

    where D=(dj,k)nj,k=1 and

    dj,k={(1+σn1ς2)ς1ρkρn1ς1ς2σk(1+ρ2ς1)(1+σn1ς2)σ2ρn1ς1ς2,j=2,(1+ρ2ς1)ς2σkσ2ς1ς2ρk(1+ρ2ς1)(1+σn1ς2)σ2ρn1ς1ς2,j=n1,0,otherwise. (3.10)

    From Eqs (3.8)–(3.10), we can get

    ψ=(InD)b=b[0,nk=1d2,kbk,0,,0,nk=1dn1,kbk,0]T. (3.11)

    Since A is a symmetric Toeplitz matrix, if eT1A1=ρT and eTnA1=σT, then Aρ=e1 and Aσ=en. According to Eqs (3.10) and (3.11) and the proposed algorithms in Section 2, we propose another algorithm for solving Pa=b.

    Algorithm 4: An algorithm to solve the real quasi-symmetric Toeplitz system Pa=b
    Step 1: Run Algorithm 1; x equals to ρ because Aρ=e1
    Step 2: Calculate σ=A1en according to Algorithm 2
    Step 3: Calculate ψ by using Eqs (3.10) and (3.11)
    Step 4: Calculate a=A1ψ according to Algorithm 2

     | Show Table
    DownLoad: CSV

    From the above analysis, it is quite evident that the main work of Algorithms 3 and 4 is solving three symmetric Toeplitz linear systems. Moreover, we can omit one calculation of Aρ=e1 in Algorithm 4.

    A greater number of symmetric Toeplitz linear systems will need to be solved if there are more perturbations in the coefficient matrix of the quasi-symmetric Toeplitz linear system. It is therefore meaningful to decompose the inverse of the symmetric Toeplitz matrix, as it will save computational time, especially in the case of high-order systems.

    In terms of quasi-symmetric Toeplitz matrix-vector multiplication, the symmetric Toeplitz matrix A can be seen as the sum of the circulant and skew-circulant matrices [36], that is,

    Pv=(A+αeT1+βeTn)v=(C+S+αe1T+βeTn)v, (4.1)

    where v=(v1,v2,,vn) is the vector and the circulant matrix C and the skew-circulant matrix S are all symmetric.

    The first columns of circulant and skew-circulant matrices need to be computed in the splitting step. Considering the symmetry of n-th order A, the first columns of C and S can be obtained by applying the first n2+1 (n is even) or n+12 (n is odd) elements instead of n elements, which can reduce the computation complexity.

    Based on the diagonalization scheme of the circulant matrix, C has the spectral decomposition C=FnΔCFn, where Fn=(Fj,k)nj,k=1, Fj,k=1ne2πi(j1)(k1)n, 1j,kn, and ΔC is a diagonal matrix containing the eigenvalues of C. In [27], an order-reduction algorithm for the multiplication of the real skew-circulant matrix and vector is proposed. So the product of the quasi-symmetric Toeplitz matrix and vector can be expressed as

    Pv=FnΔCFnv+Sv+αv1+βvn, (4.2)

    By applying Eq (4.2), the order-reduction algorithm for real skew-circulant matrix-vector multiplication, the FFT and IFFT operations, we give Algorithm 5 for Pv in the real number field as follows.

    Algorithm 5: An algorithm for Pv based on the order-reduction algorithm in the real number field
    Step 1: Split the n×n symmetric A into the symmetric C and symmetric S, where ck and sk are the first columns of C and S, respectively
    Step 2: The entries of ΔC are computed from nFnck by applying an FFT
    Step 3: Calculate z1=FnΔCFnv by applying an FFT, IFFT
    Step 4: Calculate z2=Sv by applying Algorithm 1 in [27]
    Step 5: Calculate Pv=z1+z2+αv1+βvn

     | Show Table
    DownLoad: CSV

    Because the complexity of one FFT or IFFT is 5nlog2n+O(n) [33,p. 75], Algorithm 1 in [27] needs 15n2log2n+O(n) real arithmetic operations. The complexity of Algorithm 5 is 45n2log2n+O(n), and it consists of one order-reduction algorithm, two FFTs and one IFFT.

    We find that the inverse factorization of the symmetric Toeplitz matrix is critical for the solution of quasi-symmetric Toeplitz linear equations. The following is the error analysis of Eq (2.3) in terms of the 1-norm, -norm and 2-norm, respectively. Assume that ˆx=[ˆx1,ˆx2,,ˆxn]T is the numerical solution of Ax=e1. If ˆx10, we denote

    ˆA1=1ˆx1(i+1)(^SIˆST+i^SIˆS) (5.1)

    as a perturbation of A1, where the forms of ˆSI and ˆS are the same as those in Eq (2.3) and have corresponding perturbations.

    Theorem 1. Let ϵ>0; if x10 and ˆx10, suppose that the relative error of 1x1 is ˆϵ=|1/x11/ˆx1||1/x1| and

    ˆxx1x1ϵ; (5.2)

    we get

    A1ˆA11|2x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x21 (5.3)

    and

    A1ˆA11A11|2x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x1. (5.4)

    Proof. From the representation of A1 and ˆA1 and Eqs (2.3) and (5.1), we can get

    A1ˆA11=1x1(i+1)(SIST+iSIS)1ˆx1(i+1)(ˆSIˆST+iˆSIˆS)1=121x1SIST+ix1SIS1ˆx1ˆSIˆSTiˆx1ˆSIˆS112(1x1SI)ST(1ˆx1ˆSI)ˆST1+12SI(1x1S)ˆSI(1ˆx1ˆS)1. (5.5)

    On the one hand, we can get

    (1x1SI)ST(1ˆx1ˆSI)ˆST1=(1x1SI)ST(1x1SI)ˆST+(1x1SI)ˆST(1ˆx1ˆSI)ˆST1=(1x1SI)(STˆST)+(1x1SI1ˆx1ˆSI)ˆST1|1x1|SI1STˆST1+1x1SI1ˆx1ˆSI1ˆST1. (5.6)

    According to the structural characteristics of SI and S and Eq (5.2), we note that

    SI1=x1,·STˆST1=xˆx1ϵx1,·ˆST1=ˆx1(1+ϵ)x1. (5.7)

    ˆϵ=|1/x11/ˆx1||1/x1| is the relative error; then,

    1x1SI1ˆx1ˆSI1=1x1x1ˆx1ˆx1=|1x1|xˆx+(1x1ˆx1)ˆx1|1x1|(xˆx1+ˆϵˆx1)|1x1|[ϵ+(1+ϵ)ˆϵ]x1. (5.8)

    Combining Eqs (5.6)–(5.8), we thus obtain

    (1x1SI)ST(1ˆx1ˆSI)ˆST1|1x1|x21ϵ+|1x1|[ϵ+(1+ϵ)ˆϵ](1+ϵ)x21=|1x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x21. (5.9)

    Similarly, on the other hand,

    SI(1x1S)ˆSI(1ˆx1ˆS)1|1x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x21. (5.10)

    Based on Eqs (5.5), (5.9) and (5.10), we can write

    A1ˆA11|2x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x21.

    By Ax=e1, it is proven that x1A11, so

    A1ˆA11A11|2x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x1.

    Theorem 2. Let ϵ>0; if x10, ˆx10 and

    ˆxx1x1ϵ, (5.11)

    then

    A1ˆA1|2x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}]x21 (5.12)

    and

    A1ˆA1A1|2x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x1, (5.13)

    where ˆϵ=|1/x11/ˆx1||1/x1| is the relative error of 1x1.

    Proof. Similar to Theorem 1, this proof is based on the same conditions:

    x1A1,SI=x1,ˆST=ˆx1(1+ϵ)x1,
    STˆST=xˆx1ϵx1

    and

    1x1SI1ˆx1ˆSI=1x1x1ˆx1ˆx1|1x1|[ϵ+(1+ϵ)ˆϵ]x1.

    Theorem 3. Under the assumptions and concepts of the previous two theorems, the upper bound of the 2-norm is said to be

    A1ˆA12|2x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x21 (5.14)

    and

    A1ˆA12A12|2nx1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x1. (5.15)

    Proof. As we all know, A1ˆA122A1ˆA11A1ˆA1; from Eqs (5.3) and (5.12), we have

    A1ˆA12|2x1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x21.

    Recall that

    x1nx2=nA1e12nA12e12=nA12. (5.16)

    From Eqs (5.14) and (5.16), we can get

    A1ˆA12A12|2nx1|{ϵ+[ϵ+(1+ϵ)ˆϵ](1+ϵ)}x1.

    We show the stability analysis of inverse factorization of the symmetric Toeplitz matrix in this section. The absolute and relative perturbation upper bounds are shown in Eqs (5.3) and (5.4), (5.12) and (5.13), (5.14) and (5.15), as far as Ax=e1 is solvable.

    In this section, we give some examples for the comparison of different algorithms. The first two examples present a comparison of different quasi-symmetric Toeplitz linear solvers. Examples 3 and 4 are devoted to the fast algorithm for the quasi-symmetric Toeplitz matrix-vector multiplication.

    These experiments were done by using MATLAB (R2022a) on a laptop with the following specifications: 16 GB RAM, AMD Ryzen 7 5800H CPU 3.20 GHz. In the following tables, the calculation time is in seconds, "n" denotes the matrix order and "—" indicates that it is out of MATLAB's memory.

    Example 1. An n×n quasi-symmetric Toeplitz linear system Pa=b is considered in this example. According to Eq (1.2), the first column of A is (ti)ni=1=1i, and ς1 and ς2 are random values in the range of (0,1). Assume that aexact=[1,1,...,1]T is the exact solution, so the vector b is b=Paexact.

    A comparison of the error and time required to solve a quasi-symmetric Toeplitz linear system is presented in Table 1. The derived two algorithms for solving Pa=b are shown in the table as Algorithms 3 and 4. Based on Algorithm 3, AlgHuang Ⅰ replaces Steps 1 and 2 with Huang's algorithm [20,21] for solving three symmetric Toeplitz systems. Similarly, AlgHuang Ⅱ was executed based on Algorithm 4. The back-slash method means solving Pa=b directly by using the back-slash operator in MATLAB. "Error" was set to be aaexactaexact, and the stopping criterion for those algorithms, besides Back-slash, was set to be 1×107.

    Table 1.  Error and CPU time for Example 1 by different methods.
    n Back-slash AlgHuang Algorithm 3 AlgHuang Algorithm 4
    Error Time Error Time Error Time Error Time Error Time
    212 1.6531e-13 0.3730 9.7445e-05 0.0055 6.0940e-07 0.0042 7.1225e-05 0.0053 5.6413e-07 0.0042
    213 3.6759e-13 2.1042 6.7327e-06 0.0110 2.4744e-06 0.0077 8.6325e-06 0.0105 1.7807e-06 0.0072
    214 6.9422e-13 14.6981 1.0160e-05 0.0193 4.5065e-06 0.0149 1.2015e-05 0.0187 6.9125e-06 0.0145
    215 1.7506e-05 0.0543 9.6450e-06 0.0374 1.7114e-05 0.0526 1.3520e-05 0.0368
    223 3.3928e-04 22.3273 2.3274e-05 17.2194 6.6408e-04 20.4695 2.5144e-05 12.1401
    224 5.0053e-04 40.9616 2.4198e-05 30.3279 4.4434e-04 38.0793 3.3228e-05 23.7662

     | Show Table
    DownLoad: CSV

    Algorithms 3 and 4 have significate superiority over the other methods. They can solve high-order quasi-symmetric Toeplitz linear systems. However, Back-slash cannot work when the matrix order is above 214. The proposed Algorithms 3 and 4 have the shortest computational time. They perform better than AlgHuang Ⅰ and AlgHuang Ⅱ in high-order linear systems due to the application of the order-reduction algorithm.

    Example 2. Consider another quasi-symmetric Toeplitz linear system Pa=b, the first column of A and that ς1 and ς2 in Eq (1.2) are generated from an open interval (0,1). The sum of the elements in the first column was added to the diagonal entries of A to keep A as a diagonally dominant matrix. The exact solution of the system was set to be aexact=[1,1,...,1]T.

    Table 2 shows a comparison of different methods for solving Pa=b for Example 2. AlgPGMRES refers to solving the linear system by using the GMRES method with the preconditioner. Since P is a nonsymmetric matrix, the GMRES method can be utilized to solve Pa=b. In order to accelerate the convergence rate, the Strang circulant preconditioner [32] of the symmetric Toeplitz matrix A was established.

    Table 2.  Error and CPU time for Example 2 by different methods.
    n Back-slash AlgPGMRES Algorithm 3 Algorithm 4
    Error Time Error Time Error Time Error Time
    212 2.2649e-14 0.3658 2.7463e-07 0.0015 8.2994e-09 0.0051 4.2296e-09 0.0051
    213 3.1530e-14 2.8237 6.8151e-08 0.0026 1.1341e-09 0.0088 6.1199e-10 0.0083
    214 4.7296e-14 20.7760 2.0729e-08 0.0043 4.9841e-08 0.0150 9.4785e-08 0.0136
    215 1.1276e-08 0.0091 1.2811e-08 0.0316 1.2697e-08 0.0301
    223 1.7832e-08 2.7828 3.2381e-08 12.1427 3.8938e-08 7.1750
    224 7.2746e-09 5.9250 1.0605e-08 24.9603 2.4069e-08 14.3739

     | Show Table
    DownLoad: CSV

    According to theoretical analysis, the complexity of Algorithm 4 is lower than that of Algorithm 3. The results show that Algorithm 3 takes more time than Algorithm 4, which is consistent with the theoretical analysis. AlgPGMRES performs better than the other methods. However, compared with the algorithm for solving symmetric systems, the convergence analysis of the GMRES algorithm is very difficult, and there is no clear conclusion at present.

    Example 3. Consider the multiplication of Pv. The vector v is Gaussian distributed. The quasi-symmetric Toeplitz matrix P is decomposed as Eq (1.2), where the first column of A is (ti)ni=1=1i and ς1 and ς2 are random values in the range (0,1).

    In Table 3, Pv-direct denotes calculation of the quasi-symmetric Toeplitz matrix-vector multiplication via MATLAB. Pv-splitting refers to splitting P according to Eq (4.1) first, and then utilizing the diagonalization scheme of the circulant matrix and skew-circulant matrix for fast calculation. Algorithm 5 is the proposed quasi-symmetric Toeplitz matrix-vector multiplication. Obviously, Algorithm 5 consumed the least amount of time.

    Table 3.  Computational time for Pv in Example 3.
    n Pv-direct Pv-splitting Algorithm 5
    212 0.0052 5.9079e-04 6.0490e-04
    213 0.0231 9.5132e-04 9.3785e-04
    214 0.0924 0.0020 0.0017
    215 0.0034 0.0032
    222 0.5931 0.5177
    223 1.2814 1.1760
    224 2.4970 2.2437

     | Show Table
    DownLoad: CSV

    Example 4. Consider the multiplication of Pv, the first column of A, ς1 and ς2 in Eq (1.2), and that the vector v are random values in the range (0,1). The sum of the elements in the first column was added to the diagonal entries of A.

    Table 4 shows another example for the quasi-symmetric Toeplitz matrix-vector multiplication. As the matrix order increases, the efficiency of Algorithm 5 becomes increases. Our proposed algorithm is suitable for high-order matrix-vector multiplication. However, the Pv-direct method not only takes the longest time, but it also cannot work when the matrix order is above 214.

    Table 4.  Computational time for Pv in Example 4.
    n Pv-direct Pv-splitting Algorithm 5
    212 0.0040 5.7744e-04 5.6916e-04
    213 0.0191 9.7499e-04 9.3755e-04
    214 0.0624 0.0018 0.0017
    215 0.0034 0.0031
    222 0.5712 0.5041
    223 1.2831 1.1746
    224 2.5153 2.2225

     | Show Table
    DownLoad: CSV

    In the past decades, image encryption and decryption have been widely researched in the area of information security. The results show that the proposed algorithms can be used to encrypt and decrypt images.

    Example 1. Based on Eq (1.2), we consider a quasi-symmetric Toeplitz matrix P, where the entries in the first column of A and ς1 and ς2 are random values in the range (0,1). To keep P as a diagonally dominant matrix, we added a parameter to the diagonal entries of P. Images were encrypted and decrypted by left-multiplying by P2 and P2, respectively.

    Figures 13 present the effects of image encryption and decryption. The famous figure "Lenna" is taken as an example. Let the original image matrix be X=[x1,x2,,x256]; the encrypted image matrix can be obtained by matrix-vector multiplication via Algorithm 5, that is, Y=[y1,y2,,y256]=P(P[x1,x2,,x256]). The decrypted image matrix can be computed by ˆX=[ˆx1,ˆx2,,ˆx256]=P1(P1[y1,y2,,y256]). Algorithm 4 was performed for image decryption because of its lower complexity than Algorithm 3.

    Figure 1.  256×256 grayscale image for Example 1.
    Figure 2.  512×512 grayscale image for Example 1.
    Figure 3.  1024×1024 grayscale image for Example 1.

    In the process of image encryption and decryption, it is necessary to do multiple matrix-vector multiplications with the same quasi-symmetric Toeplitz matrix and solve linear systems with the same coefficient matrix. Some calculations can be done only once, like Steps 1 and 2 of Algorithm 5 in image encryption, as well as Steps 1 and 2 of Algorithm 4 in image decryption. So, the computational time will be saved.

    It is obvious that our proposed algorithms can realize efficient encryption and decryption for different pixel-sized images.

    Algorithms for solving a class of real quasi-symmetric Toeplitz linear systems are shown in this paper. We have proposed methods for solving a sequence of linear systems with the constant symmetric Toeplitz matrix based on the decomposition of Toeplitz matrix inversion. By splitting the coefficient matrix into a symmetric Toeplitz matrix plus two low-rank matrices and combining it with the SMW formula, two fast algorithms with O(nlog2n) complexity have been given to solve the real quasi-symmetric Toeplitz linear system. Quasi-symmetric Toeplitz matrix-vector multiplication in the real number field has been presented. Structural perturbation analysis of the inverse factorization of symmetric Toeplitz was also analyzed. Numerical simulations and applications have shown that the proposed algorithms are accurate and efficient.

    The research was supported by the National Natural Science Foundation of China (Grant No. 12101284) and Natural Science Foundation of Shandong Province (Grant No. ZR2020MA051).

    The authors declare that there is no conflict of interest.



    [1] M. M. Rams, M. Zwolak, B. Damski, A quantum phase transition in a quantum external field: superposing two magnetic phases, Sci. Rep., 2 (2012), 655. https://doi.org/10.1038/srep00655 doi: 10.1038/srep00655
    [2] P. A. Papakonstantinou, D. P. Woodruff, G. Yang, True randomness from big data, Sci. Rep., 6 (2016), 33740. https://doi.org/10.1038/srep33740 doi: 10.1038/srep33740
    [3] B. Y. Tang, B. Liu, Y. P. Zhai, C. Q. Wu, W. R. Yu, High-speed and large-scale privacy amplifcation scheme for quantum key distribution, Sci. Rep., 9 (2019), 15733. https://doi.org/10.1038/s41598-019-50290-1 doi: 10.1038/s41598-019-50290-1
    [4] X. B. Wang, J. T. Wang, J. Q. Qin, C. Jiang, Z. W. Yu, Guessing probability in quantum key distribution, npj Quantum Inf., 6 (2020), 45. https://doi.org/10.1038/s41534-020-0267-3 doi: 10.1038/s41534-020-0267-3
    [5] Y. A. Chen, Q. Zhang, T. Y. Chen, W. Q. Cai, S. K. Liao, J. Zhang, et al., An integrated space-to-ground quantum communication network over 4600 kilometres, Nature, 589 (2021), 214–219. https://doi.org/10.1038/s41586-020-03093-8 doi: 10.1038/s41586-020-03093-8
    [6] S. Nordebo, M. F. Naeem, P. Tans, Estimating the short-time rate of change in the trend of the keeling curve, Sci. Rep., 10 (2020), 21222. https://doi.org/10.1038/s41598-020-77921-2 doi: 10.1038/s41598-020-77921-2
    [7] A. Machado, Z. Cai, T. Vincent, G. Pellegrino, J. M. Lina, E. Kobayashi, et al., Deconvolution of hemodynamic responses along the cortical surface using personalized functional near infrared spectroscopy, Sci. Rep., 11 (2021), 5964. https://doi.org/10.1038/s41598-021-85386-0 doi: 10.1038/s41598-021-85386-0
    [8] X. M. Gu, T. Z. Huang, X. L. Zhao, H. B. Li, L. Li, Fast iterative solvers for numerical simulations of scattering and radiation on thin wires, J. Electromagn. Waves Appl., 29 (2015), 1281–1296. https://doi.org/10.1080/09205071.2015.1042559 doi: 10.1080/09205071.2015.1042559
    [9] Z. Z. Bai, Y. M. Huang, M. K. Ng, On preconditioned iterative methods for certain time-dependent partial differential equations, SIAM J. Numer. Anal., 47 (2009), 1019–1037. https://doi.org/10.1137/080718176 doi: 10.1137/080718176
    [10] Z. Z. Bai, R. H. Chan, Z. R. Ren, On sinc discretization and banded preconditioning for linear third-order ordinary differential equations, Numer. Linear Algebra Appl., 18 (2011), 471–497. https://doi.org/10.1002/nla.738 doi: 10.1002/nla.738
    [11] X. M. Gu, Y. L. Zhao, X. L. Zhao, B. Carpentieri, Y. Y. Huang, A note on parallel preconditioning for the all-at-once solution of Riesz fractional diffusion equations, Numer. Math. Theory Methods Appl., 14 (2021), 893–919. https://doi.org/10.48550/arXiv.2003.07020 doi: 10.48550/arXiv.2003.07020
    [12] Y. L. Zhao, X. M. Gu, A. Ostermann, A preconditioning technique for an all-at-once system from Volterra subdiffusion equations with graded time steps, J. Sci. Comput., 88 (2021), 11. https://doi.org/10.1007/s10915-021-01527-7 doi: 10.1007/s10915-021-01527-7
    [13] Z. Z. Bai, K. Y. Lu, Optimal rotated block-diagonal preconditioning for discretized optimal control problems constrained with fractional time-dependent diffusive equations, Appl. Numer. Math., 163 (2021), 126–146. https://doi.org/10.1016/j.apnum.2021.01.011 doi: 10.1016/j.apnum.2021.01.011
    [14] Z. Z. Bai, K. Y. Lu, Fast matrix splitting preconditioners for higher dimensional spatial fractional diffusion equations, J. Comput. Phys., 404 (2020), 1. https://doi.org/10.1016/j.jcp.2019.109117 doi: 10.1016/j.jcp.2019.109117
    [15] W. H. Luo, X. M. Gu, Y. Liu, M. Jing, A Lagrange-quadratic spline optimal collocation method for the time tempered fractional diffusion equation, Math. Comput. Simul., 182 (2021), 1–24. https://doi.org/10.1016/j.matcom.2020.10.016 doi: 10.1016/j.matcom.2020.10.016
    [16] M. Li, X. M. Gu, C. M. Huang, M. F. Fei, G. Y. Zhang, A fast linearized conservative finite element method for the strongly coupled nonlinear fractional Schrödinger equations, J. Comput. Phys., 358 (2018), 256–282. https://doi.org/10.1016/j.jcp.2017.12.044 doi: 10.1016/j.jcp.2017.12.044
    [17] Z. Y. Liu, X. R. Qin, N. C. Wu, Y. L. Zhang, The shifted classical circulant and skew circulant splitting iterative methods for Toeplitz matrices, Can. Math. Bull., 60 (2017), 807–815. https://doi.org/10.4153/CMB-2016-077-5 doi: 10.4153/CMB-2016-077-5
    [18] Z. Y. Liu, N. C. Wu, X. R. Qin, Y. L. Zhang, Trigonometric transform splitting methods for real symmetric Toeplitz systems, Comput. Math. Appl., 75 (2018), 2782–2794. https://doi.org/10.1016/j.camwa.2018.01.008 doi: 10.1016/j.camwa.2018.01.008
    [19] Z. Y. Liu, S. H. Chen, W. J. Xu, Y. L. Zhang, The eigen-structures of real (skew) circulant matrices with some applications, Comput. Appl. Math., 38 (2019), 178. https://doi.org/10.1007/s40314-019-0971-9 doi: 10.1007/s40314-019-0971-9
    [20] S. L. Lei, Y. C. Huang, Fast algorithms for high-order numerical methods for space fractional diffusion equations, Int. J. Comput. Math., 94 (2016), 1062–1078. http://dx.doi.org/10.1080/00207160.2016.1149579 doi: 10.1080/00207160.2016.1149579
    [21] Y. C. Huang, S. L. Lei, A fast numerical method for block lower triangular Toeplitz with dense Toeplitz blocks system with applications to time-space fractional diffusion equations, Numerical Algorithms, 76 (2017), 605–616. https://doi.org/10.1007/s11075-017-0272-6 doi: 10.1007/s11075-017-0272-6
    [22] Z. L. Jiang, T. T. Xu, Norm estimates of ω-circulant operator matrices and isomorphic operators for ω-circulant algebra, Sci. China Math., 59 (2016), 351–366. https://doi.org/10.1007/s11425-015-5051-z doi: 10.1007/s11425-015-5051-z
    [23] Y. R. Fu, X. Y. Jiang, Z. L. Jiang, S. Jhang, Fast algorithms for finding the solution of CUPL-Toeplitz linear system from Markov chain, Appl. Math. Comput., 396 (2021), 125859. https://doi.org/10.1016/j.amc.2020.125859 doi: 10.1016/j.amc.2020.125859
    [24] X. Y. Jiang, K. Hong, Skew cyclic displacements and inversions of two innovative patterned matrices, Appl. Math. Comput., 308 (2017), 174–184. https://doi.org/10.1016/j.amc.2017.03.024 doi: 10.1016/j.amc.2017.03.024
    [25] Y. P. Zheng, S. Shon, J. Kim, Cyclic displacements and decompositions of inverse matrices for CUPL Toeplitz matrices, J. Math. Anal. Appl., 455 (2017), 727–741. https://doi.org/10.1016/j.jmaa.2017.06.016 doi: 10.1016/j.jmaa.2017.06.016
    [26] Z. L. Jiang, X. T. Chen, J. M. Wang, The explicit inverses of CUPL-Toeplitz and CUPL-Hankel matrices, East Asian J. Appl. Math., 7 (2017), 38–54. https://doi.org/10.4208/eajam.070816.191016a doi: 10.4208/eajam.070816.191016a
    [27] X. Zhang, X. Y. Jiang, Z. L. Jiang, H. Byun, An improvement of methods for solving the CUPL-Toeplitz linear system, Appl. Math. Comput., 421 (2022), 126932. https://doi.org/10.1016/j.amc.2022.126932 doi: 10.1016/j.amc.2022.126932
    [28] L. Du, T. Sogabe, S. L. Zhang, A fast algorithm for solving tridiagonal quasi-Toeplitz linear systems, Appl. Math. Lett., 75 (2018), 74–81. https://doi.org/10.1016/j.aml.2017.06.016 doi: 10.1016/j.aml.2017.06.016
    [29] P. P. Xie, Y. M. Wei, The stability of formulae of the Gohberg-Semencul-Trench type for Moore-Penrose and group inverses of Toeplitz matrices, Linear Algebra Appl., 498 (2016), 117–135. https://doi.org/10.1016/j.laa.2015.01.029 doi: 10.1016/j.laa.2015.01.029
    [30] J. Wu, X. M. Gu, Y. L. Zhao, Y. Y. Huang, B. Carpentieri, A note on the structured perturbation analysis for the inversion formula of Toeplitz matrices, Jpn. J. Ind. Appl. Math., 40 (2023), 645–663. https://doi.org/10.1007/s13160-022-00543-w doi: 10.1007/s13160-022-00543-w
    [31] I. Gohberg, V. Olshevsky, Circulants, displacements and decompositions of matrices, Integr. Equations Oper. Theory, 15 (1992), 730–743. https://doi.org/10.1007/BF01200697 doi: 10.1007/BF01200697
    [32] R. Chan, X. Q. Jin, An Introduction to Iterative Toeplitz Solvers, SIAM, Philadelphia, 2007. https: //doi.org/10.1137/1.9780898718850
    [33] R. E. Blahut, Fast Algorithms for Signal Processing, Cambridge University Press, New York, 2010. https://doi.org/10.1017/CBO9780511760921
    [34] H. Y. Jian, T. Z. Huang, X. M. Gu, X. L. Zhao, Y. L. Zhao, Fast implicit integration factor method for nonlinear space Riesz fractional reaction–diffusion equations, J. Comput. Appl. Math., 378 (2020), 112935. https://doi.org/10.1016/j.cam.2020.112935 doi: 10.1016/j.cam.2020.112935
    [35] M. Batista, A. A. Karawia, The use of the Sherman-Morrison-Woodbury formula to solve cyclic block tri-diagonal and cyclic block penta-diagonal linear systems of equations, Appl. Math. Comput., 210 (2009), 558–563. https://doi.org/10.1016/j.amc.2009.01.003 doi: 10.1016/j.amc.2009.01.003
    [36] M. K. Ng, Circulant and skew-circulant splitting methods for Toeplitz systems, J. Comput. Appl. Math., 159 (2003), 101–108. https://doi.org/10.1016/S0377-0427(03)00562-4 doi: 10.1016/S0377-0427(03)00562-4
  • This article has been cited by:

    1. Xin Fan, Ji-Teng Jia, An incomplete tridiagonalization-based determinant evaluation for a generalized periodic tridiagonal matrix, 2024, 1017-1398, 10.1007/s11075-024-01978-7
    2. Yi-Fan Wang, Ji-Teng Jia, Xin Fan, A tridiagonalization-based arbitrary-stride reduction approach for (p,q)-pentadiagonal linear systems, 2025, 01689274, 10.1016/j.apnum.2025.02.017
    3. Xin Fan, Ji-Teng Jia, Fast breakdown-free algorithm for computing the determinants of a generalized comrade matrix, 2025, 0259-9791, 10.1007/s10910-025-01714-z
    4. Su-Mei Li, Xin Fan, Yi-Fan Wang, Fast and accurate recursive algorithms for solving cyclic tridiagonal linear systems, 2025, 0259-9791, 10.1007/s10910-025-01716-x
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1514) PDF downloads(60) Cited by(4)

Figures and Tables

Figures(3)  /  Tables(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog