Next Article in Journal
Volume-Increasing Inextensional Deformations of Platonic Polyhedra
Previous Article in Journal
Novel Approach for Robust Control of Axial Piston Pump
Previous Article in Special Issue
On Lusztig’s Character Formula for Chevalley Groups of Type Al
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The General Solution to a System of Tensor Equations over the Split Quaternion Algebra with Applications

1
Department of Mathematics and Newtouch Center for Mathematics, Shanghai University, Shanghai 200444, China
2
Collaborative Innovation Center for the Marine Artificial Intelligence, Shanghai University, Shanghai 200444, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(4), 644; https://doi.org/10.3390/math13040644
Submission received: 14 January 2025 / Revised: 9 February 2025 / Accepted: 12 February 2025 / Published: 16 February 2025

Abstract

:
This paper presents a systematic investigation into the solvability and the general solution of a tensor equation system within the split quaternion algebra framework. As an extension of classical quaternions with distinctive pseudo-Euclidean properties, split quaternions offer unique advantages in multidimensional signal processing applications. We establish rigorous necessary and sufficient conditions for the existence of solutions to the proposed tensor equation system, accompanied by explicit formulations for general solutions when solvability criteria are satisfied. The theoretical framework is further strengthened by the development of computational algorithms and numerical validations through concrete examples. Notably, we demonstrate the practical implementation of our theoretical findings through encryption/decryption algorithms for color video data.

1. Introduction

In 1843, William Rowan Hamilton introduced the concept of real quaternions [1] defined by
H = { q = q 0 + q 1 i + q 2 j + q 3 k : i 2 = j 2 = k 2 = 1 , i j k = 1 , q 0 , q 1 , q 2 , q 3 R } ,
where H and R , respectively, denote the set of real quaternions and the set of real numbers. Quaternions have been utilized in numerous areas, including the analysis of quaternion random signals [2], color image processing [3] and face recognition [4]. As the theory of quaternions evolved, James Cockle introduced the concept of split quaternions [5] in 1849:
Q S = { q = q 0 + q 1 i + q 2 j + q 3 k : q 0 , q 1 , q 2 , q 3 R } ,
where the imaginary identities i , j , k satisfied
i 2 = 1 , j 2 = k 2 = 1 , i j k = 1 ,
i j = j i = k , j k = k j = i , k i = i k = j .
Split quaternions have diverse applications across various fields. In physics, they are used to model spacetime symmetries and rotations in relativity [6]. In computer graphics, split quaternions assist in efficiently handling 3D rotations and transformations [7]. Split quaternions also have applications in control theory, signal processing, and robotics, where they help in representing and solving complex spatial relationships and transformations [8].
Tensors, as mathematical constructs that generalize scalars, vectors, and matrices to higher dimensions, are extensively applied across a wide range of scientific and engineering domains due to their capability to manage complex data structures. In computer vision and image processing, tensors are used to represent multidimensional image data, with convolution operations in neural networks being performed as tensor operations [9]. In physics, tensors are fundamental in general relativity for describing spacetime geometry [10] and in electromagnetism for unifying electric and magnetic fields [11]. In machine learning, tensors are core data structures in frameworks like TensorFlow and PyTorch, playing a crucial role in optimization and model training [12,13]. They are also essential in data analysis for dimensionality reduction and feature extraction, particularly within recommendation systems [14]. The multidimensional nature of tensors makes them powerful tools for handling complex data, and their significance continues to grow with advancements in computational power and algorithms.
A = ( a i 1 i N ) ( 1 i j I j , j = 1 , , N ) presents an N-dimensional tensor, which is a natural extension of the matrix. For  N = 1 , A is a vector. For  N = 2 , A is a matrix. In recent decades, numerous researchers have made significant contributions to the study of tensors and quaternions. For example, Qi et al. [15,16,17,18,19] researched the spectral theory of tensor and tensor eigenvalues. Zhang et al. [20,21] investigated some terative solutions of generalized Sylvester quaternion tensor equations. Gao et al. [22] established the necessary and sufficient conditions for the existence of (anti-) η -Hermitian solutions to a system of matrix equations over split quaternion algebra. Xie et al. [23] proposed the BiCG algorithm for solving the minimal Frobenius norm solution of generalized Sylvester tensor equation over the quaternions. Yang et al. [24] researched a system of tensor equations over the dual split quaternion algebra with an application.
To the best of our knowledge, research on systems of tensor equations over split quaternions remains relatively scarce in the current literature. Building upon the aforementioned studies and leveraging the existing applications of tensor equation systems within split quaternion algebra, this paper aims to systematically investigate the solvability conditions and derive the general solution for the following system of split quaternion tensor equations
A 1 N X 1 = P 1 , X 1 N B 1 = Q 1 , A 2 N X 2 = P 2 , X 2 N B 2 = Q 2 , A n N X n = P n , X n N B n = Q n , t = 1 n E t N X t N F t = H ,
where A t , P t , B t , Q t , E t , F t ( t = 1 , , n ) and H are given quaternion tensors and X t ( t = 1 , , n ) are unknown split quaternion tensors.
Significantly, this study marks the first successful resolution of complex multilinear tensor equation systems over split quaternion algebra, representing a substantial advancement in the field. Moreover, our research can provide an application of split quaternion tensor equations in practical cryptographic implementations.
This paper is organized as follows: In Section 2, some basic theories and relevant properties of quaternion tensors are reviewed. In Section 3, we derive some practical necessary and sufficient conditions for the existence of the general solution to system (1) over Q S . Furthermore, the formula of the general solution to system (1) is also given when it is solvable. Especially, the unique solution is given when the uniqueness condition is satisfied. In Section 4, two algorithms and one numerical example are given in order to illustrate our results. In Section 5, we provide four algorithms and two examples for color video encryption and decryption. In Section 6, we present a conclusion to summarize this paper.
In subsequent sections, the symbols R m × n , C m × n , Q S n , and Q S m × n are used to represent the set of all m × n real matrices, all m × n complex matrices, all n dimensional split quaternion column vectors, and all m × n split quaternion matrices. The symbol r ( A ) denotes the rank of the matrix A. I denotes the identity matrix and O the zero matrix with an appropriate size. A ¯ , A T , A , A denote the conjugate, the transpose, the conjugate transpose, and the Moore–Penrose inverse of the matrix A, respectively. Let R I 1 × × I N × J 1 × × J N , C I 1 × × I N × J 1 × × J N , and Q S I 1 × × I N × J 1 × × J N represent the set of all corresponding dimensional real tensors, complex tensors, and split quaternion tensors, respectively.

2. Preliminaries

This section primarily introduces split quaternion tensors, the Einstein product of split quaternion tensors, the complex representation and related properties of split quaternion matrices, and so on. These concepts lay the groundwork for deriving the main conclusions presented in the subsequent sections.
Definition 1 
([25]). For two split quaternion tensors A = ( a i 1 i N j 1 j L ) Q S I 1 × × I N × J 1 × × J L and B = ( b j 1 j L k 1 k M ) Q S J 1 × × J L × K 1 × × K M , the Einstein product of A and B is defined by the operation L via
( A L B ) i 1 i N k 1 k M = j 1 j L a i 1 i N j 1 j L b j 1 j L k 1 k M ,
where A L B Q S I 1 × × I N × K 1 × × K M .
The Einstein product of tensors is closely related to matrix multiplication. We introduce a mapping that establishes an isomorphic relationship between tensors with respect to the Einstein product and matrices with respect to the general matrix product.
Definition 2 
([26]). There exists an isomorphic mapping f from Q S I 1 × × I N × J 1 × × J N to Q S I × J denoted as
f : Q S I 1 × × I N × J 1 × × J N Q S I × J a i 1 i N j 1 j N a [ i N + K = 1 N 1 ( i K 1 ) S = K + 1 N I S ] [ j N + K = 1 N 1 [ ( j K 1 ) S = K + 1 N J S ] ,
where I = I 1 I N and J = J 1 J N .
It is apparent that f is a one-to-one mapping. Therefore, the inverse mapping f 1 : Q S I × J Q S I 1 × × I N × J 1 × × J N exists. Subsequently, we prove that f is an isomorphic mapping.
Proof. 
For A = ( a i 1 i N j 1 j L ) Q S I 1 × × I N × J 1 × × J L and B = ( b j 1 j L k 1 k M ) Q S J 1 × × J L × K 1 × × K M , we need to prove that f ( A L B ) = f ( A ) · f ( B ) , where L and · denote the Einstein product and matrix product, respectively.
Through the definition of the Einstein product, then
( A L B ) i 1 i N k 1 k M = j 1 j L a i 1 i N j 1 j L b j 1 j L k 1 k M .
By direct computation, we obtain
f ( A L B ) = f ( j 1 j L a i 1 i N j 1 j L b j 1 j L k 1 k M ) = j 1 j L a [ i N + K = 1 N 1 ( i K 1 ) S = K + 1 N i S ] [ j L + K = 1 L 1 [ ( j K 1 ) S = K + 1 L j S ] b [ j L + K = 1 L 1 [ ( j K 1 ) S = K + 1 L j S ] [ k M + K = 1 M 1 ( i K 1 ) S = K + 1 M i S ] = j = 1 J 1 J N f ( A ) i j f ( B ) j k = ( f ( A ) · f ( B ) ) .
Therefore, f is isomorphic.    □
As f is an isomorphic mapping, utilizing f can convert split quaternion tensors into matrices during operations. In what follows, we present the complex representation of split quaternions and split quaternion matrices.
For any split quaternion q = q 0 + q 1 i + q 2 j + q 3 k Q S , it can be uniquely expressed as q = c 1 + c 2 j where c 1 = q 0 + q 1 i and c 2 = q 2 + q 3 i are complex numbers, which is known as the complex representation of split quaternions. Noting that c 1 j = j c 1 ¯ and c 2 j = j c 2 ¯ , we know the algebra of split quaternions is a noncommutative algebra.
Definition 3. 
The complex representation of a split quaternion is q = d 1 + d 2 j Q S where d 1 = q 0 + q 1 i ,   d 2 = q 2 + q 3 i C . We use the symbol g to denote it as
g ( q ) = d 1 d 2 d 2 ¯ d 1 ¯ C 2 × 2 .
Similarly, for any given split quaternion matrix A, the complex representation of matrix A = A 1 + A 2 j Q S m × n where A 1 , A 2 C m × n , is denoted by G as
G ( A ) = A 1 A 2 A 2 ¯ A 1 ¯ C 2 m × 2 n .
It is evident that G ( A ) and A correspond one to one. Moreover, considering its properties, we can summarise this as the following proposition.
Proposition 1. 
If  A , B Q S n × n  and G is defined in Definition 3, then
(a) 
A = B  if and only if  G ( A ) = G ( B ) ;
(b) 
G ( A + B ) = G ( A ) + G ( B ) ;
(c) 
G ( I n ) = I 2 n ;
(d) 
G ( A B ) = G ( A ) G ( B ) .
Proof. 
It is evident that (a), (b), and (c) hold, so we just need to prove (d). By computation, on the one hand,
A B = ( A 1 + A 2 j ) ( B 1 + B 2 j ) = A 1 B 1 + A 2 B 2 ¯ + ( A 1 B 2 + A 2 B 1 ¯ ) j .
On the other hand,
G ( A B ) = A 1 B 1 + A 2 B 2 ¯ A 1 B 2 + A 2 B 1 ¯ A 1 ¯ B 2 ¯ + A 2 ¯ B 1 A 1 ¯ B 1 ¯ + A 2 ¯ B 2 = A 1 A 2 A 2 ¯ A 1 ¯ B 1 B 2 B 2 ¯ B 1 ¯ = G ( A ) G ( B ) .
   □
In what follows, we explore the structure of the operator vec ( U X V ) .
Definition 4 
([27]). For any A Q S m × n , A can be uniquely expressed as A = A 11 + A 12 i + A 21 j + A 22 k where A 11 , A 12 , A 21 , A 22 R m × n . It can also be uniquely expressed as A = A 1 + A 2 j where A 1 = A 11 + A 12 i , A 2 = A 21 + A 22 i C m × n . According to this, we define
A = A 1 + A 2 j Φ A = [ A 1 , A 2 ]
where the symbol ≅ denotes an equivalence relation. We define that
A 1 ^ = Re ( A 1 ) Im ( A 1 ) , A ^ = Re ( A 1 ) Im ( A 1 ) Re ( A 2 ) Im ( A 2 ) .
It is evident that the following is true:
vec ( A 1 ^ ) = vec ( Re ( A 1 ) ) vec ( Im ( A 1 ) ) , vec ( A ^ ) = vec ( Re ( A 1 ) ) vec ( Im ( A 1 ) ) vec ( Re ( A 2 ) ) vec ( Im ( A 2 ) ) .
Then, we focus on the main properties related to Φ A as follows.
Proposition 2. 
Let  E , F Q S m × n , H Q S n × s  and  p R . Φ is defined in Definition 4. Then,
(a) 
E = F  if and only if  Φ E = Φ F ;
(b) 
Φ E + F = Φ E + Φ F , Φ p E = p Φ E ;
(c) 
Φ E H = Φ E G ( H ) .
Proof. 
It is evident that (a) and (b) hold, so we only need to prove (c). By calculating, we have
E H = ( E 1 + E 2 j ) ( H 1 + H 2 j ) = E 1 H 1 + E 2 H 2 ¯ + ( E 1 H 2 + E 2 H 1 ¯ ) j .
Then,
Φ E H = [ E 1 H 1 + E 2 H 2 ¯ , E 1 H 2 + E 2 H 1 ¯ ] = [ E 1 , E 2 ] H 1 H 2 H 2 ¯ H 1 ¯ = Φ E G ( H ) .
   □
Based on this proposition, we then investigate the structure of the operator vec ( U X V ) .
Theorem 1 
([27]). Suppose that U = U 1 + U 2 j Q S m × n , V = V 1 + V 2 j Q S s × t and X = X 1 + X 2 j Q S n × s , where U 1 , U 2 C m × n , V 1 , V 2 C s × t and X 1 , X 2 C n × s . Then,
vec ( Φ U X V ) = G ( V ) T U 1 , G ( V j ) U 2 vec ( Φ X ) vec ( Φ j X j ) .
The result on vec ( Φ U X V ) in Theorem 1 about the complex representation of split quaternion matrix product U X V is an essential tool for transforming the split quaternion matrix equation into the complex matrix equation.
Lemma 1. 
For B = B 1 + B 2 j Q S r × t , B 1 , B 2 C r × t . Let
K t = I r t i I r t 0 0 0 0 I r t i I r t I r t i I r t 0 0 0 0 I r t i I r t ,
and then
vec ( Φ B ) vec ( Φ j B j ) = K t vec ( B ^ ) .
Proof. 
According to the given conditions, it follows that
vec ( Φ B ) vec ( Φ j B j ) = vec ( B 1 ) vec ( B 2 ) vec ( B 1 ¯ ) vec ( B 2 ¯ ) = I r t i I r t 0 0 0 0 I r t i I r t I r t i I r t 0 0 0 0 I r t i I r t vec ( Re ( B 1 ) ) vec ( Im ( B 1 ) ) vec ( Re ( B 2 ) ) vec ( Im ( B 2 ) ) = K t vec ( B ^ ) .
   □
By Theorem 1 and Lemma 1, we can obtain the following corollary.
Corollary 1. 
Suppose U = U 1 + U 2 j Q S m × n , V = V 1 + V 2 j Q S s × t , and X = X 1 + X 2 j Q S n × s , where U 1 , U 2 C m × n , V 1 , V 2 C s × t , and X 1 , X 2 C n × s . Then,
vec ( Φ U X V ) = [ G ( V ) T U 1 , G ( V j ) U 2 ] K s vec ( X ^ ) .
Lemma 2 
([28]). With A R m × n and b R m , the matrix equation A x = b has a solution x R n if and only if
A A b = b .
In that case, it has the general solution given by
x = A b + ( I n A A ) y ,
where y R n is an arbitrary vector. In particular, it has a unique solution x = A b if rank ( A ) = n .

3. Solution of System (1)

From the previous discussion, we now turn our attention to solving the system of split quaternion matrix Equation (1). For convenience, we define some useful notations that will be used in the following section. For  t = 1 , , n , we denote A t = f ( A t ) , B t = f ( B t ) , P t = f ( P t ) , Q t = f ( Q t ) , E t = f ( E t ) , F t = f ( F t ) , H = f ( H ) , and then A t = A t 1 + A t 2 j , P t = P t 1 + P t 2 j Q S m × r , B t = B t 1 + B t 2 j , Q t = Q t 1 + Q t 2 j Q S r × k , E t = E t 1 + E t 2 j Q S l × r , F t = F t 1 + F t 2 j Q S r × w , and H Q S l × w , where m = I 1 I N , r = J 1 J N , k = K 1 K N , l = L 1 L N , w = W 1 W N . We set
L 1 = G ( F 1 ) T E 11 G ( F 1 j ) E 12 G ( I ) T A 11 G ( I j ) A 12 G ( B 1 ) T I G ( B 1 j ) I 0 0 0 0 0 0 0 0 K r , L 2 = G ( F 2 ) T E 21 G ( F 2 j ) E 22 0 0 0 0 G ( I ) T A 21 G ( I j ) A 22 G ( B 2 ) T I G ( B 2 j ) I 0 0 0 0 K r ,
, L n = G ( F n ) T E n 1 G ( F n j ) E n 2 0 0 0 0 0 0 0 0 0 0 0 0 G ( I ) T A n 1 G ( I j ) A n 2 G ( B n ) T I G ( B n j ) I K r , Z = vec ( Φ H ) vec ( Φ P 1 ) vec ( Φ Q 1 ) vec ( Φ P 2 ) vec ( Φ Q 2 ) vec ( Φ P n 1 ) vec ( Φ Q n 1 ) vec ( Φ P n ) vec ( Φ Q n ) .
For t = 1 , , n , we suppose
L t 1 = Re ( L t ) , L t 2 = Im ( L t ) , V 1 = [ L 11 , L 21 , , L n 1 ] , V 2 = [ L 12 , L 22 , , L n 2 ]
and
Z 1 = vec ( Re ( Φ H ) ) vec ( Re ( Φ P 1 ) ) vec ( Re ( Φ Q 1 ) ) vec ( Re ( Φ P 2 ) ) vec ( Re ( Φ Q 2 ) ) vec ( Re ( Φ P n ) ) vec ( Re ( Φ Q n ) ) , Z 2 = vec ( Im ( Φ H ) ) vec ( Im ( Φ P 1 ) ) vec ( Im ( Φ Q 1 ) ) vec ( Im ( Φ P 2 ) ) vec ( Im ( Φ Q 2 ) ) vec ( Im ( Φ P n ) ) vec ( Im ( Φ Q n ) ) , z = Z 1 Z 2 .
Evidently, the following equation
V 1 V 2 vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) = z
holds. Now, according to Lemma 2 and Equation (10), we can give the expression of general solution to system (1).
Theorem 2. 
For t = 1 , . . . , n , we suppose E t Q S L 1 × × L N × J 1 × × J N , F t Q S J 1 × × J N × W 1 × × W N , A t , P t Q S I 1 × × I N × J 1 × × J N , B t , Q t Q S J 1 × × J N × K 1 × × K N , and H Q S L 1 × × L N × W 1 × × W N . For  t = 1 , , n , we denote A t = f ( A t ) , B t = f ( B t ) , P t = f ( P t ) , Q t = f ( Q t ) , E t = f ( E t ) , F t = f ( F t ) , H = f ( H ) , and then A t = A t 1 + A t 2 j , P t = P t 1 + P t 2 j Q S m × r , B t = B t 1 + B t 2 j , Q t = Q t 1 + Q t 2 j Q S r × k , E t = E t 1 + E t 2 j Q S l × r , F t = F t 1 + F t 2 j Q S r × w , and H Q S l × w , where m = I 1 I N , r = J 1 J N , k = K 1 K N , l = L 1 L N , w = W 1 W N . Meanwhile, V 1 , V 2 , Z 1 , Z 2 , z are defined in Equations (8) and (9). Then, system (1) has a set of solutions X 1 , X 2 , , X n Q S J 1 × × J N × J 1 × × J N if and only if
V 1 V 2 V 1 V 2 z = z .
In this case, the set of general solutions can be expressed as
X = [ f 1 ( X 1 ) , f 1 ( X 2 ) , , f 1 ( X n ) ] | vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) = V 1 V 2 z + I 4 n r 2 V 1 V 2 V 1 V 2 y ,
where y is an arbitrary vector with appropriate size. Furthermore, the system of split quaternion matrix equation (1) has a unique solution if and only if
rank V 1 V 2 = 4 n r 2 .
After calculation, we have
X = [ f 1 ( X 1 ) , f 1 ( X 2 ) , , f 1 ( X n ) ] | vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) = V 1 V 2 z .
Proof. 
According to Corollary 1 and Theorem 2, it follows that
s y s t e m ( 1 ) t = 1 n f ( E t N X t N F t ) = f ( H ) , f ( A 1 N X 1 ) = f ( P 1 ) , f ( X 1 N B 1 ) = f ( Q 1 ) , f ( A 2 N X 2 ) = f ( P 2 ) , f ( X 2 N B 2 ) = f ( Q 2 ) , , f ( A n N X n ) = f ( P n ) , f ( X n N B n ) = f ( Q n ) , t = 1 n E t X t F t = H , A 1 X 1 = P 1 , X 1 B 1 = Q 1 , A 2 X 2 = P 2 , X 2 B 2 = Q 2 , A n X n = P n , X n B n = Q n , t = 1 n Φ E t X t F t = Φ H , Φ A 1 X 1 = Φ P 1 , Φ X 1 B 1 = Φ Q 1 , Φ A 2 X 2 = Φ P 2 , Φ X 2 B 2 = Φ Q 2 , , Φ A n X n = Φ P n , Φ X n B n = Φ Q n , L 1 vec ( X 1 ^ ) + L 2 vec ( X 2 ^ ) + + L n vec ( X n ^ ) = Z ,
( Re ( L 1 ) + i Im ( L 1 ) ) vec ( X 1 ^ ) + ( Re ( L 2 ) + i Im ( L 2 ) ) vec ( X 2 ^ ) + + ( Re ( L n ) + i Im ( L n ) ) vec ( X n ^ ) = Z 1 + i Z 2 , Re ( L 1 ) Re ( L 2 ) Re ( L n ) Im ( L 1 ) Im ( L 2 ) Im ( L n ) vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) = Z 1 Z 2 , V 1 V 2 vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) = z , [ X 1 , X 2 , , X n ] = [ f 1 ( X 1 ) , f 1 ( X 2 ) , , f 1 ( X n ) ] .
By Lemma 2, we can obtain that system (1) has a solution if and only if Equation (11) holds. That is to say,
vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) = V 1 V 2 z + I 4 n r 2 V 1 V 2 V 1 V 2 y ,
which is expressed as set (12). Moreover, if Equation (11) holds, then system (1) has a unique solution if and only if
V 1 V 2 V 1 V 2 = I 4 n r 2 .
Equivalently, Equation (13) holds and set (14) is the unique solution.    □
In the next part, we consider the Moore–Penrose generalized inverse of the column block matrix. Let
p = 2 w l + 2 n m r + 2 n k r , K = ( I 4 n r 2 V 1 V 1 ) V 2 T , W = ( I p + ( I p K K ) V 2 V 1 V 1 T V 2 T ( I p K K ) ) 1 , J = K + ( I p K K ) W V 2 V 1 V 1 T ( I 4 n r 2 V 2 T K ) , θ 1 = I p V 1 V 1 + V 1 T V 2 T W ( I p K K ) V 2 V 1 , θ 2 = V 1 T V 2 T ( I p K K ) W , θ 3 = ( I p K K ) W ,
where n is same as system (1) and m , k , r , l , w are the same as in Theorem 2. From the results in [29], we have
V 1 V 2 = V 1 J T V 2 V 1 J T , V 1 V 2 V 1 V 2 = V 1 V 1 + K K .
I 2 p V 1 V 2 V 1 V 2 = θ 1 θ 2 θ 2 T θ 3 .
Corollary 2 
([30]). The system of split quaternion matrix in Equation (1) has a solution [ X 1 , X 2 , , X n ] if and only if
θ 1 θ 2 θ 2 T θ 3 z = 0 .
In this case, the set of general solution of system (1) can be expressed as X =
[ f 1 ( X 1 ) , f 1 ( X 2 ) , , f 1 ( X n ) ] | vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) = V 1 J T V 2 V 1 J T z + I 4 n r 2 V 1 V 1 K K y ,
where X 1 , X 2 , , X n Q S r × r and y is an arbitrary vector with appropriate size. Furthermore, if Equation (18) holds, then system (1) has a unique solution [ X 1 , X 2 , , X n ] X if and only if Equation (13) holds. In this case,
X = [ f 1 ( X 1 ) , f 1 ( X 2 ) , , f 1 ( X n ) ] | vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) = V 1 J T V 2 V 1 J T z ,
Corollary 3. 
Let the condition be satisfied in Corollary 2. Then, the optimization problem
min [ X 1 , X 2 , , X n ] X ( Φ X 1 2 + Φ X 2 2 + + Φ X n 2 )
has a unique minimizer [ X 1 w , X 2 w , , X n w ] = [ f ( X 1 w ) , f ( X 2 w ) , , f ( X n w ) ] that satisfies
vec ( X 1 w ^ ) vec ( X 2 w ^ ) vec ( X n w ^ ) = V 1 J T V 2 V 1 J T z .
Proof. 
From the solution set (19), we can see that the solution set X is a nonempty closed convex set. Hence,
min [ X 1 , X 2 , , X n ] X ( Φ X 1 2 + Φ X 2 2 + + Φ X n 2 ) = min [ X 1 , X 2 , , X n ] X ( X 1 ^ 2 + X 2 ^ 2 + + X n ^ 2 ) = min [ X 1 , X 2 , , X n ] X ( vec ( X 1 ^ ) 2 + vec ( X 2 ^ ) 2 + + vec ( X n ^ ) 2 ) = min [ X 1 , X 2 , , X n ] X vec ( X 1 ^ ) vec ( X 2 ^ ) vec ( X n ^ ) 2 .
By Corollary 2, we have that vec ( X 1 w ^ ) vec ( X 2 w ^ ) vec ( X n w ^ ) is in the form (21).    □

4. Numerical Exemplification

In this section, we give two numerical algorithms (Algorithms 1 and 2) and one numerical example to solve system (1).
Algorithm 1 General Solution of System (1)
(1) Input the factors: n.
(2) Input the tensors:  A 1 , A 2 , , A n , P 1 , P 2 , , P n Q S I 1 × × I N × J 1 × × J N ,
B 1 , B 2 , , B n , Q 1 , Q 2 , , Q n Q S J 1 × × J N × K 1 × × K N , E 1 , E 2 , , E n Q S L 1 × × L N × J 1 × × J N ,
F 1 , F 2 , , F n Q S J 1 × × J N × W 1 × × W N and H Q S L 1 × × L N × W 1 × × W N .
(3) Calculate the matrices A 1 , A 2 , , A n , P 1 , P 2 , , P n Q S m × r , B 1 , B 2 , , B n , Q 1 , Q 2 , , Q n Q S r × k , E 1 , E 2 , , E n Q S l × r , F 1 , F 2 , , F n Q S r × w and H Q S l × w , where m = I 1 I N , r = J 1 J N , k = K 1 K N , l = L 1 L N , w = W 1 W N .
(4) Calculate V 1 , V 2 by (8) and z by (9).
(5) If both Equation (11) and Equation (13) hold, then calculate the unique solution [ X 1 , X 2 , , X n ] X by Equation (14).
(6) If Equation (11) holds and Equation (13) fails, then calculate [ X 1 , X 2 , , X n ] X according to (12).
(7) Output:  [ X 1 , X 2 , , X n ] .
Algorithm 2 General Solution of System (1)
(1) Input the factors: n.
(2) Input the tensors:  A 1 , A 2 , , A n , P 1 , P 2 , , P n Q S I 1 × × I N × J 1 × × J N ,
B 1 , B 2 , , B n , Q 1 , Q 2 , , Q n Q S J 1 × × J N × K 1 × × K N , E 1 , E 2 , , E n Q S L 1 × × L N × J 1 × × J N ,
F 1 , F 2 , , F n Q S J 1 × × J N × W 1 × × W N and H Q S L 1 × × L N × W 1 × × W N .
(3) Calculate the matrices A 1 , A 2 , , A n , P 1 , P 2 , , P n Q S m × r , B 1 , B 2 , , B n , Q 1 , Q 2 , , Q n Q S r × k , E 1 , E 2 , , E n Q S l × r , F 1 , F 2 , , F n Q S r × w and H Q S l × w , where m = I 1 I N , r = J 1 J N , k = K 1 K N , l = L 1 L N , w = W 1 W N .
(4) Calculate V 1 , V 2 by (8), z by (9) and p , K , W , J , θ 1 , θ 2 , θ 3 by (15).
(5) If both Equation (18) and Equation (13) hold, then calculate the unique solution [ X 1 , X 2 , , X n ] X by Equation (21).
(6) If Equation (18) holds and Equation (13) fails, then calculate [ X 1 , X 2 , , X n ] X according to (19).
(7) Output:  [ X 1 , X 2 , , X n ] .
Example 1. 
Given the split quaternion tensors:
A 1 ( : , : , 1 , 1 ) = i + k 1 0 0.5 i + j + 2 k i + 2 j + k i , A 1 ( : , : , 1 , 2 ) = i 2 i + j + 2 k 2 i + j + k 4 k 1 j + k , A 1 ( : , : , 2 , 1 ) = i i + j + 4 k i + k 2 j 0 i + 2 j + 2 k , A 1 ( : , : , 2 , 2 ) = 1 j + 5 k 2 i + j + 3 k i 0 i + j + k , A 1 ( : , : , 3 , 1 ) = 0.5 i 0 i + 2 j + k 3 i 0 3 i + j + k , A 1 ( : , : , 3 , 2 ) = 2 i + 3 k 0 2 j i + 0.5 j + 4 k 1 i , P 1 ( : , : , 1 , 1 ) = 7 + 4.25 i 3.5 j + 3 k 11 + 3.25 i + 2.75 j + 8.5 k 6 2.75 i + 2.5 j + 1.75 k 9.5 + 4.5 i j + 8.5 k 2 + 2 j + 2 k 2 + 4.75 i 3 j + 4 k , P 1 ( : , : , 1 , 2 ) = 1.25 + 7.5 i 2.5 j + 8.5 k 12.5 + i + 8 j + 5.75 k 7.5 2.25 j + 4.25 k 13.5 + 11.5 i + 1 j 5 + 1.25 i + 0.5 j + 4 k 4 + 3 i + 5.25 j + 3.25 k ,
P 1 ( : , : , 2 , 1 ) = 0.5 + 9.5 i + 8 k 11 + 11 i + 0.5 k 13 + 5 i + 0.5 j + 8.5 k 20.5 + 22 i + 10 j + 5.5 k 1 + 3.5 i + 6 j + 1 k 5 + 9 i + 2.5 j + 12.5 k , P 1 ( : , : , 2 , 2 ) = 2 + 8.5 i 4.5 j + 4 k 24 + 8 i + 2 j + 3.5 k 9 + 8 i + 8 k 21.5 + 10.75 i + 4.25 j + 8.5 k 2.5 + i + 3.5 j + 6.5 k 10 + 2 i + 6 j + 3 k , P 1 ( : , : , 3 , 1 ) = 7 i + 7.5 k 1 + 4 i + 12 j + 3 k 11 j + 3 k 9 + 11 i + 9 j + 4.5 k i + 3 j k 3 + 10 i + 7 j + 2 k , P 1 ( : , : , 3 , 2 ) = 1.5 + 9.5 i 2 j + 7 k 13 + 7 i + 4 j + 7 k 2 + 4 i 9.5 + 7 i + 16 j + 5 k 6 + 7 i + 3 j + 6 k 6 + 2 i + 4 j + 8 k , B 1 ( 1 , 1 , : , : ) = i i + 4 j + k 0 i + 3 j + k , B 1 ( 1 , 2 , : , : ) = k 5 i + j + k 0 i + j + 0.5 k , B 1 ( 2 , 1 , : , : ) = i + 3 j 1 j + k i + j + 3 k , B 1 ( 2 , 2 , : , : ) = 2 i + k 1 + k 0 2 + k , B 1 ( 3 , 1 , : , : ) = 2 j i + k 1 + k 2 i + j , B 1 ( 3 , 2 , : , : ) = 2 i + k 2 i + 3 k j i , Q 1 ( : , : , 1 , 1 ) = 3 + 2 j + 7 k 8.5 + 16 i + 12.75 j + 0.5 k 1 + 5.25 i + 11 j + 8 k 6 2.5 i + j 5.5 k 5 + 13 i + 13 j + 3 k 1.5 + 7 i + 10 j 0.5 k , Q 1 ( : , : , 1 , 2 ) = 2 0.5 i + 6.5 j 6.5 k 7.75 + 2.5 i + 16.75 j + 11.25 k 1 + 9.25 i + 2 j + 7.25 k 3 + 9 i + 16.5 j k 4 + 14 i + 8 j + 14 k 5.5 + 13.5 i + 4.5 j + 2 k , Q 1 ( : , : , 2 , 1 ) = 5 4 j + 3 k 5 + 2 i + 0.5 j + 3.5 k 3 + 6 i j + 2 k 3 i j 4 3 i + 5 j + 6 k 9 + 2 i 2 j + 6 k , Q 1 ( : , : , 2 , 2 ) = 0.25 1.5 i 5.5 j + 4 k 18.25 + 4 i + 14.375 j + 11.75 k 9.75 i + 0.75 j + 9.75 k 3 + 3 i + 9 j 1.25 k 8 + 8 i + 12 j + 13.5 k 7.5 + 12 i + 9.5 j + 2.25 k , A 2 ( : , : , 1 , 1 ) = i + k 1 0 0.5 i + j + 2 k i + 2 j + k i , A 2 ( : , : , 1 , 2 ) = 2 + 3 i 2 i + 2 k 1 + 2 i + k 3 k 1 + 3 k j + 0.5 k , A 2 ( : , : , 2 , 1 ) = j + 2 k i + j + 5 k 3 i + k 2 j + 0.25 k 0.25 + j 1 + i + 2 j , A 2 ( : , : , 2 , 2 ) = 1 + 2 i 0.5 j + 5 k 2 i + 3 k i + 3 j 0 2 + i + j , A 2 ( : , : , 3 , 1 ) = 3 + i 0.5 i + j + 2 k 2 i + 3 k 0.25 + j 3 i + j , A 2 ( : , : , 3 , 2 ) = 0 2 i + j 2 j 0.5 + i + j + k 1 + j i + 2 k , P 2 ( : , : , 1 , 1 ) = 1 + 3.5 i 0.75 j + 9.5 k 0.5 + 8.25 i + 2.75 j + 2.5 k 3 + 3.75 i + 1.5 j 2.75 k 4 0.5 i + 4.5 j 4.4375 k 1.0625 + 1.25 i + 0.25 j 5.75 k 5.25 0.25 i + 2.5 j + 1.5 k , P 2 ( : , : , 1 , 2 ) = 2.5 + 8.5 i 12 j + 9 k 26.25 + 7.5 i + 7 j + 4 k 11 + 1.5 i 2.5 j + 7 k 11.25 3.75 i 1.5 j + 3 k 15.125 + 3.75 j + 8.25 k 3 + 2.5 i 2.5 j + 13.5 k , P 2 ( : , : , 2 , 1 ) = 3 + 7 i 3 j + 10 k 17 + 3 i + 6 j + 3 k 5 + 8 i 7 j + 6 k 10 + 4 i + 4.75 j + 3 k 16 + 0.25 i + 4.5 j + 7.5 k 1 + 2 j + 6 k ,
P 2 ( : , : , 2 , 2 ) = 3 + 2 i j + 6.5 k 24 + 2.5 i + 5.5 j + 4 k 10 + 1.5 i 8.5 j + 6 k 8.25 4.75 i 1.5 j + 2.5 k 7 + i + 5 j + 1.25 k 4 + 1.25 i 4 j + 9 k , P 2 ( : , : , 3 , 1 ) = 3 + 3 i 2.5 j + 8 k 12.5 4 i + 6.5 j + 4 k 4 2.5 i 4 j + 0.5 k 9.5 6 i 0.75 j + 1.125 k 2.375 4.75 i + 6.5 j + 2 k 1.5 + 2.5 i 7.5 j + k , P 2 ( : , : , 3 , 2 ) = 0.5 + 19 i 5 j + 8 k 15.5 + 13.5 i + 2.75 j + 6.5 k 2 + 6 i 1 j + 13.5 k 13.75 + 0.75 i + 11 j + 10 k 13.25 + 1.25 i + 13 j + 5.25 k 9.5 + 0.5 i + 11 k , B 2 ( 1 , 1 , : , : ) = 5 i + j 1 2 k j + 4 k , B 2 ( 1 , 2 , : , : ) = 0 0.5 j + k i + k 2 i , B 2 ( 2 , 1 , : , : ) = 2 i + j 2 k 0 2 i , B 2 ( 2 , 2 , : , : ) = 3 i i + j + 2 k 0 i + 0.5 j + k , B 2 ( 3 , 1 , : , : ) = j 1 + j 2 2 i + k , B 2 ( 3 , 2 , : , : ) = 2 k i + k 0 1 + 2 k , Q 2 ( : , : , 1 , 1 ) = 5 + 4 i + 12 j + 4 k 3 + 8 i + 7 j 5.5 k 6 0.75 i + 7.75 j k 1.5 + 2 i + 14 j 0.5 k 3 + i + 4 j 4 k 11 + 2 i + 3 j k , Q 2 ( : , : , 1 , 2 ) = 3 + j + 6 k 10.5 + 2 i + 0.5 j + 5.5 k 8.25 1.5 i 3.5 j + k 11 + 7.5 i + 4.5 k 1 3 i + 0.25 j + 2.5 k 8.5 + 1.5 i + 3 j + 4 k , Q 2 ( : , : , 2 , 1 ) = 6 2 i 2 j 2 + i + 2 j + k 2 + i + j + 3.5 k 3 + 2 k 4 + 0.5 i 2 j + 4.5 k 1 + 3 i 3 j + 5 k , Q 2 ( : , : , 2 , 2 ) = 10 + 3 i + 0.5 j + 2 k 2.25 + 5 i + 6 j + 0.5 k 0.5 5.5 i + 11.25 j + 0.5 k 3.5 1.5 i + 8 j + 3.5 k 7.5 + 2 i j k 5 + 1.5 i 6 j k , E 1 ( : , : , 1 , 1 ) = i + j + k 0 3 i + 0.5 j + 2 k i 2 i + k , E 1 ( : , : , 1 , 2 ) = 1 i + j + 2 k 0.5 i i + j + 5 k 3 j j + 2 k , E 1 ( : , : , 2 , 1 ) = 3 k j + 2 k j 0 i + j 2 i , E 1 ( : , : , 2 , 2 ) = j + 2 k 4 i + j + k k 0 3 i 1 , E 1 ( : , : , 3 , 1 ) = k 3 i + j 0 i + 5 j + k i 2 j , E 1 ( : , : , 3 , 2 ) = i 2 i + 3 k k 0 i 5 j , F 1 ( 1 , 1 , : , : ) = i i + 4 j + k 0 i + 3 j + k , F 1 ( 1 , 2 , : , : ) = k 5 i + j + k 0 i + j + 0.5 k , F 1 ( 2 , 1 , : , : ) = i + j 2 + 3 k 0 i + k , F 1 ( 2 , 2 , : , : ) = 3 + k 1 j 2 j + k , F 1 ( 3 , 1 , : , : ) = 1 + i + j 2 k 2 i 2 i + j + k , F 1 ( 3 , 2 , : , : ) = 2 + 2 k i 1 + 3 j + k 0.5 + k , E 2 ( : , : , 1 , 1 ) = i + 2 k i + 0.5 j + 2 k 2 k 0 i + 0.25 k i + 2 j , E 2 ( : , : , 1 , 2 ) = 1 + j + k 2 i 3 i + j 3 + i 3 j + k i + k , E 2 ( : , : , 2 , 1 ) = 2 i + 3 k 0 2 j 2 i + j i + k , E 2 ( : , : , 2 , 2 ) = 2 + i + 2 k 0 k i + j + k 3 j 1 + k , E 2 ( : , : , 3 , 1 ) = i + 0.25 j 3 k i + 2 j + 0.5 k 0 i + k 2 j + 3 k , E 2 ( : , : , 3 , 2 ) = i + 0.5 j 0 3 + k 2 i + k i + 2 k 3 j + 0.5 k ,
F 2 ( 1 , 1 , : , : ) = 3 + i + j 1 + i + 2 k 3 i + 3 j + k , F 2 ( 1 , 2 , : , : ) = 2 j + k 2 + j + k 0 i + j + 0.5 k , F 2 ( 2 , 1 , : , : ) = 2 + j + k 1 + i j + k 1 + k , F 2 ( 2 , 2 , : , : ) = 2 i + j + k 1 + 0.5 i 2 j + k i + k , F 2 ( 3 , 1 , : , : ) = i + k j 1 + 0.5 i + k 1 + j + 2 k , F 2 ( 3 , 2 , : , : ) = 1 + j 1 + k 3 i + j + 2 k 2 j + k , H ( : , : , 1 , 1 ) T = 172 + 157.63 i + 101.75 j + 218 k 147.75 + 120.5 i + 144 j + 145.75 k 71.25 + 156 i + 58.5 j + 174 k 34 48.5 i + 99.5 j 20 k 58.75 + 63.25 i + 101.75 j + 68.625 k 196.5 + 42.5 i + 99.25 j + 0.5 k , H ( : , : , 1 , 2 ) T = 106.88 + 136.75 i + 89.5 j + 101.5 k 166.75 + 54 i + 51 j + 138.5 k 39.75 + 144.25 i 21 j + 209.25 k 40 66.75 i + 44.875 j + 57.5 k 72 + 72.125 i + 3.125 j + 42.875 k 115.75 26.75 i + 163.75 j 11.75 k , H ( : , : , 2 , 1 ) T = 49 + 158.25 i + 79.75 j + 133.38 k 41 + 79.5 i + 66.5 j + 44.25 k 35.75 + 51.5 i + 50 j + 59.75 k 21.5 + 18.375 i + 42.625 j 33.25 k 66 + 44 i + 95.75 j + 38 k 87 2.75 i + 104.25 j 13.5 k , H ( : , : , 2 , 2 ) T = 110.88 + 109.69 i + 82.125 j + 141.88 k 143.63 + 98.125 i + 60.125 j + 78.875 k 18.875 + 129.25 i + 48.5 j + 153.13 k 29.125 2.75 i + 71.5 j 24.5 k 31.625 + 37.625 i + 73.625 j + 89.438 k 145.63 20.5 i + 115.5 j 41.5 k .
By MATLAB calculation, the output is that there exists a unique solution and the unique numerical solution is
X 1 ( : , : , 1 , 1 ) = 1 + 1 i 9.2704 × 10 15 j + 1 k 2 + 1.088 × 10 14 i + 8.88 × 10 16 j 3.33 × 10 15 k 0.25 6.1062 × 10 15 i + 1.5848 × 10 14 j 3.6082 × 10 15 k 0.5 3.1086 × 10 15 i 1.1324 × 10 14 j + 2 k 2 + 1 i 3.7192 × 10 15 j + 1 k 4.885 × 10 15 + 1 i + 5.4609 × 10 15 j + 3 k , X 1 ( : , : , 1 , 2 ) = 1.4821 × 10 14 + 1.1324 × 10 14 i + 2 j + 0.5 k 1.9651 × 10 14 + 0.25 i + 1.1879 × 10 14 j + 2 k 1 + 2 i + 1 j + 1.36 × 10 15 k 0.5 6.9389 × 10 16 i + 6.4393 × 10 15 j + 2 k 1 5.107 × 10 15 i + 8.9928 × 10 15 j + 5.5511 × 10 15 k 0.5 + 1.1435 × 10 14 i + 1 j 3.2196 × 10 15 k , X 1 ( : , : , 2 , 1 ) = 1.138 × 10 14 + 3 i + 2 j 8.7846 × 10 15 k 1.3496 × 10 14 + 0.5 i + 1 j + 3 k 5.3187 × 10 15 + 1 i + 9.6867 × 10 15 j + 1 k 6.5781 × 10 15 + 7.7716 × 10 16 i + 2 j + 1.2434 × 10 14 k 3 + 1.2879 × 10 14 i + 2 j + 9.2079 × 10 15 k 1.0042 × 10 14 + 1 i + 2 j + 2 k , X 1 ( : , : , 2 , 2 ) = 1 + 6.9944 × 10 15 i 2.387 × 10 15 j + 0.5 k 2 + 8.2157 × 10 15 i + 1 j + 5 k 6.2728 × 10 15 + 2 i + 5.4401 × 10 15 j + 3 k 1.2434 × 10 14 + 1 i + 2 j + 3.6152 × 10 15 k 3 1.4849 × 10 14 i + 5.4956 × 10 15 j 5.3985 × 10 15 k 5.4956 × 10 15 + 1 i + 1 j + 0.5 k , X 1 ( : , : , 3 , 1 ) = 7.0499 × 10 15 + 2 i 5.3291 × 10 15 j + 3.1752 × 10 14 k 8.6042 × 10 15 7.1054 × 10 15 i + 1 j + 1 k 1 + 2 i 1.5418 × 10 14 j 9.4369 × 10 16 k 1.571 × 10 14 + 1 i + 3.8858 × 10 15 j + 7.77 × 10 15 k 2 2.7756 × 10 15 i + 1 j 3.7748 × 10 15 k 2 + 1 i 4.774 × 10 15 j + 2 k , X 1 ( : , : , 3 , 2 ) = 1 1.1102 × 10 15 i + 3 j 6.5226 × 10 15 k 5.5511 × 10 15 + 2 i 3.7748 × 10 15 j + 1 k 2 + 7.9242 × 10 15 i + 1 j + 3 k 1.0103 × 10 14 1.1102 × 10 16 i + 1 j + 1.2768 × 10 14 k 1 + 1 i 1.1324 × 10 14 j 9.4369 × 10 16 k 5.7732 × 10 15 + 1 i + 1 j + 1 k ,
X 2 ( : , : , 1 , 1 ) = 1.07 × 10 14 + 1 i 1.55 × 10 15 j + 2 k 8.33 × 10 15 2.78 × 10 15 i + 1 j + 2.36 × 10 15 k 0.25 2.22 × 10 16 i 5.7732 × 10 15 j 8.9581 × 10 15 k 7.3275 × 10 15 + 0.5 i + 1 j + 1 k 1.44 × 10 15 + 1 i + 4.16 × 10 15 j + 1 k 5.41 × 10 15 + 3 i 2.83 × 10 15 j + 5.61 × 10 15 k , X 2 ( : , : , 1 , 2 ) = 5.7732 × 10 15 1.0214 × 10 14 i + 2 j + 5.7732 × 10 15 k 1 2.6645 × 10 15 i 3.3307 × 10 15 j + 2 k 1.4433 × 10 14 2.5535 × 10 15 i + 1 j + 1 k 3.9968 × 10 15 + 2 i + 1.249 × 10 14 j + 3 k 0.5 + 1.4058 × 10 14 i 2.0539 × 10 15 j 8.4377 × 10 15 k 2 1.5543 × 10 15 i + 1 j + 1 k , X 2 ( : , : , 2 , 1 ) = 1 + 1 i + 6.4393 × 10 15 j 4.4409 × 10 15 k 2 + 2.9976 × 10 15 i + 2.7478 × 10 15 j + 4 k 2.4425 × 10 15 + 1 i 1.0769 × 10 14 j + 2 k 4.996 × 10 16 + 2 i + 9.8047 × 10 15 j 4.996 × 10 15 k 9.992 × 10 16 + 2.3315 × 10 15 i + 2 j + 1.0214 × 10 14 k 5.5511 × 10 15 + 1 i + 1 j 5.6066 × 10 15 k , X 2 ( : , : , 2 , 2 ) = 1 + 6.8834 × 10 15 i 1.8319 × 10 15 j + 3.5527 × 10 15 k 1.3545 × 10 14 + 5.218 × 10 15 i + 0.5 j + 1 k 3.3307 × 10 15 + 2 i + 1 j + 1 k 4.55 × 10 15 + 1.11 × 10 16 i 1.06 × 10 14 j + 3 k 1.6653 × 10 15 8.9928 × 10 15 i + 1 j + 1.1047 × 10 14 k 4.3299 × 10 15 + 1.3212 × 10 14 i + 2 j + 1 k , X 2 ( : , : , 3 , 1 ) = 1 3.9135 × 10 15 i + 1.8874 × 10 15 j + 1 k 3.8511 × 10 15 + 1 i 3.858 × 10 15 j 7.4662 × 10 15 k 0.5 + 1 i + 1.1435 × 10 14 j + 2 k 5.1625 × 10 15 + 1 i + 5.2909 × 10 15 j + 1 k 1 + 7.2164 × 10 16 i + 1.4988 × 10 15 j + 2 k 3.1086 × 10 15 + 1 i + 1 j + 2 k , X 2 ( : , : , 3 , 2 ) = 1 + 8.3822 × 10 15 i + 2 j + 1 k 2.9976 × 10 15 + 3 i + 9.992 × 10 16 j + 1 k 1.5543 × 10 15 1.1768 × 10 14 i + 3 j + 1 k 0.5 + 6.9944 × 10 15 i 1.131 × 10 15 j + 2 k 1 + 1 i + 1 j 2.2204 × 10 16 k 1 + 3.1086 × 10 15 i 2.1094 × 10 15 j + 2 k ,
The true solution is
X 1 ( : , : , 1 , 1 ) = 1 + i + k 2 0.25 0.5 + 2 k 2 + i + k i + 3 k , X 1 ( : , : , 1 , 2 ) = 2 j + 0.5 k 0.25 i + 2 k 1 + 2 i + j 0.5 + 2 k 1 0.5 + j , X 1 ( : , : , 2 , 1 ) = 3 i + 2 j 0.5 i + j + 3 k i + k 2 j 3 + 2 j i + 2 j + 2 k , X 1 ( : , : , 2 , 2 ) = 1 + 0.5 k 2 + j + 5 k 2 i + 3 k i + 2 j 3 i + j + 0.5 k , X 1 ( : , : , 3 , 1 ) = 2 i j + k 1 + 2 i i 2 + j 2 + i + 2 k , X 1 ( : , : , 3 , 2 ) = 1 + 3 j 2 i + k 2 + j + 3 k j 1 + i i + j + k , X 2 ( : , : , 1 , 1 ) = i + 2 k j 0.25 0.5 i + j + k i + k 3 i , X 2 ( : , : , 1 , 2 ) = 2 j 1 + 2 k j + k 2 i + 3 k 0.5 2 + j + k , X 2 ( : , : , 2 , 1 ) = 1 + i 2 + 4 k i + 2 k 2 i 2 j i + j , X 2 ( : , : , 2 , 2 ) = 1 0.5 j + k 2 i + j + k 3 k j 2 j + k , X 2 ( : , : , 3 , 1 ) = 1 + k i 0.5 + i + 2 k i + k 1 + 2 k i + j + 2 k , X 2 ( : , : , 3 , 2 ) = 1 + 2 j + k 3 i + k 3 j + k 0.5 + 2 k 1 + i + j 1 + 2 k .
It is worth noting that the error between the numerical solution and the true solution is 4.5778 × 10 13 , which undoubtedly demonstrates the accuracy of our results.

5. One Application Based on (1)

Sylvester-type quaternion tensor equations hold great significance across numerous fields, such as systems science, cybernetics, and signal processing. This section centers around utilizing the outcomes of system (1) to present an application example. Split quaternion tensors are capable of representing color videos, especially when the video is divided into multiple image slices. Here, we introduce a method for the encryption and decryption of videos by employing Theorem 2. In what follows, we provide encryption and decryption algorithms (Algorithms 3 and 4), block encryption and decryption algorithms (Algorithms 5 and 6), and two examples to demonstrate our results.
Algorithm 3 Encryption Process of Videos
(1) Input: n original videos and system coefficients A 1 , A 2 , , A n , B 1 , B 2 , , B n ,
E 1 , E 2 , , E n and F 1 , F 2 , , F n .
(2) Parse the videos:  X i represents the i-th video where i = 1 , , n and X i ( : , : , j ) represents the j-th frame of the i-th video.
(3) Calculate the tensors P 1 , P 2 , , P n , Q 1 , Q 2 , , Q n and H by system (1).
(4) Encrypt the i-th video X i by P i Q i where i = 1 , , n . P i , Q i and H is the key of the i-th video.
(5) Output: Encrypted video.
Algorithm 4 Decryption Process of Videos
(1) Input: Encrypted videos X i , keys P i , Q i , H and system coefficients A i , B i , E i , F i where i = 1 , , n .
(2) Calculate the numerical tensors [ X 1 ˙ , X 2 ˙ , , X n ˙ ] by Algorithm 1.
(3) Recover the videos:  X i ˙ represents the i-th recovered video where i = 1 , , n and X i ˙ ( : , : , j ) represents the j-th recovered frame of the i-th video.
(4) Calculate the error norm for [ X 1 , X 2 , , X n ] and [ X 1 ˙ , X 2 ˙ , , X n ˙ ] .
(5) Output: Decrypted video.
In order to more intuitively understand Algorithms 5 and 6 that we present next, we give the corresponding flowcharts (Figure 1).
First, we take a frame from the video and parse its pixel data. We divide the 480 × 480 frame into 3600 3 × 3 subblocks. Then, we set the coefficients A i , B i , E i , F i by generating random matrices. We calculate P i , Q i , H for each subblock. We take ( P i Q i ) as the cryptographic subblock corresponding to each subblock. Then, ( P i Q i ) is restored to the corresponding position and the encrypted frame is generated. The decryption process is that the input coefficients A i , B i , E i , F i , P i , Q i , H calculate the new subblock X i and then it is restored according to the corresponding position to generate the decrypted frame. Then, we calculate that the decrypted frame has a good restoration effect with the original frame.
Algorithm 5 Block Encryption Process of Frame
(1) Input: one original frame and system coefficients A 1 , A 2 , , A n , B 1 , B 2 , , B n ,
E 1 , E 2 , , E n and F 1 , F 2 , , F n Q S 3 × 3 .
(2) Parse the frames:  X Q S 480 × 480 represents the frame and X i Q S 3 × 3 represents the i-th sub-frame of the frame where i = 1 , , n .
(3) Calculate the matrices P 1 , P 2 , , P n , Q 1 , Q 2 , , Q n Q S 3 × 3 and H Q S 3 × 3 by system (1).
(4) Assemble the i-th sub-frame X i , P i , Q i where i = 1 , , n back into the frame X , P , Q Q S 480 × 480 . Encrypt the frame X by ( P Q ) Q S 480 × 480 .
(5) Output: Encrypted frame.
Algorithm 6 Block Decryption Process of Frame
(1) Input: Encrypted frame X Q S 480 × 480 , keys P , Q , H Q S 480 × 480 and system coefficients A i , B i , E i , F i Q S 3 × 3 where i = 1 , , n .
(2) Calculate the matrices [ X 1 ˙ , X 2 ˙ , , X n ˙ ] by Algorithm 1.
(3) Recover the frame:  X i ˙ Q S 3 × 3 represents the i-th recovered sub-frame where i = 1 , , n ; assemble the X i ˙ back into the frame X ˙ Q S 480 × 480 .
(4) Calculate the error norm between X and X ˙ .
(5) Output: Decrypted frame.
Remark 1. 
As the dimensions of the decrypted video increase, the time and space complexity of Algorithms 3 and 4 increase exponentially. Therefore, we propose a block encryption and decryption algorithm in Algorithms 5 and 6. By reusing Algorithms 5 and 6, the memory usage can be reduced and the operational speed can be significantly enhanced. It is worth mentioning that Algorithms 5 and 6 are also suitable for local encryption and decryption tasks.
All numerical experiments in this paper were performed in the following hardware and software configurations: Intel(R) Core(TM) i5-10210U CPU @ 1.60 GHz 2.11 GHz, 16 GB RAM, Windows 11 operating system, and MATLAB R2018a. In addition, all test videos were taken using the author’s camera.
Example 2. 
Let us input two videos and execute the above algorithms. The following is the result using MATLAB (Figure 2):
In the result, the average error between the numerical solution and the true solution is 2.7106 × 10 9 . The error of each frame is shown in Table 1 as follows.
To further evaluate the quality of the decrypted videos, we use the Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Feature Similarity Index (FSIM) [31]. The results are summarized in Table 2. All PSNR values exceed 50, while both SSIM and FSIM values are 1, demonstrating the outstanding quality of our decrypted videos.
Example 3. 
Let us input two videos and finish local encryption and decryption using Algorithms 5 and 6 with MATLAB (Figure 3):
In the result, the average error between the numerical solution and the true solution is 8.9857 × 10 10 . The error of each frame is listed in Table 3 as follows.
The results of PSNR, SSIM, and FSIM are shown in Table 4. PSNR values all exceed 50, while both SSIM and FSIM values reach 1, indicating that the quality of local decryption is excellent.

6. Conclusions

The system of quaternion tensor equation (1) is universal, encompassing many other systems. This kind of system of quaternion tensor equations has practical applications in many areas. In this paper, we first transformed the quaternion tensor equations into quaternion matrix equations through the function f. By using the complex representation of split quaternion matrices and Moore–Penrose inverse, we presented a necessary and sufficient condition for the existence of a general solution to system (1). When the solvability conditions hold, we also derived the expression of the general solution to system (1). In particular, the unique solution was also given when the uniqueness condition held. Then, we converted the obtained quaternion matrix solution back into a quaternion tensor solution using the function f 1 . Additionally, we established two algorithms to solve system (1), and one example was given to prove the correctness of our results. In the last part, we provided the algorithms and two examples for color video encryption and decryption using the obtained results of system (1). To the best of our knowledge, a substantial body of excellent work has been dedicated to the encryption and decryption of color images. For instance, Feng et al. [32,33,34,35] have put forward numerous effective algorithms for color image encryption and decryption. Kong et al. [36] realized image encryption on a Field-Programmable Gate Array (FPGA). Similarly, Yu et al. [37] developed a system that was implemented on an FPGA digital hardware platform. Moving forward, we will concentrate on some systems of tensor equations over the split quaternion algebra and delve deeper into the study of encryption and decryption.

Author Contributions

Methodology, Z.-R.J. and Q.-W.W.; Software, Z.-R.J.; Investigation, Q.-W.W.; Writing—original draft, Z.-R.J.; Writing—review and editing, Q.-W.W.; Supervision, Q.-W.W.; Funding acquisition, Q.-W.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the National Natural Science Foundation of China (No. 12371023).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be constructed as a conflict of interest.

References

  1. Hamilton, W.R. Lectures on Quaternions; Hodges and Smith: Dublin, Ireland, 1853. [Google Scholar]
  2. Took, C.C.; Mandic, D.P. Augmented second-order statistics of quaternion random signals. Signal Process. 2011, 91, 214–224. [Google Scholar] [CrossRef]
  3. Miao, J.; Kou, K.I. Color image recovery using low-rank quaternion matrix completion algorithm. IEEE Trans. Image Process. 2021, 31, 190–201. [Google Scholar] [CrossRef]
  4. Jia, Z.G.; Ling, S.T.; Zhao, M.X. Color two-dimensional principal component analysis for face recognition based on quaternion model. In Intelligent Computing Theories and Application: Proceedings of the 13th International Conference, Liverpool, UK, 7–10 August 2017; Springer: Cham, Switzerland, 2017; pp. 177–189. [Google Scholar] [CrossRef]
  5. Cockle, J. LII. On systems of algebra involving more than one imaginary; and on equations of the fifth degree. Lond. Edinb. Dublin Philos. Mag. J. Sci. 1849, 35, 434–437. [Google Scholar] [CrossRef]
  6. Adler, S.L. Quaternionic Quantum Mechanics and Quantum Fields; Oxford University Press: Cary, NC, USA, 1995. [Google Scholar]
  7. Shoemake, K. Animating rotation with quaternion curves. ACM SIGGRAPH Comput. Graph. 1985, 19, 245–254. [Google Scholar] [CrossRef]
  8. Antonelli, G.; Chiaverini, S. Fault tolerant kinematic control of platoons of autonomous vehicles. IEEE Int. Conf. Robot. Autom. 2004, 4, 3313–3318. [Google Scholar] [CrossRef]
  9. Krizhevsky, A.; Sutskever, I.; Hinton, G.E. Imagenet classification with deep convolutional neural networks. Commun. ACM 2017, 60, 84–90. [Google Scholar] [CrossRef]
  10. Carroll, S.M. Spacetime and Geometry: An Introduction to General Relativity, 2nd ed.; Cambridge University Press: Cambridge, UK, 2019. [Google Scholar]
  11. Griffiths, D.J.; Heald, M.A. Introduction to Electrodynamics, 4th ed.; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
  12. Abadi, M.; Barham, P.; Chen, J.; Chen, Z.; Davis, A.; Dean, J.; Zheng, X. Tensorflow: A system for large-scale machine learning. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 16; USENIX Association: Savannah, GA, USA, 2016; pp. 265–283. [Google Scholar]
  13. Paszke, A.; Gross, S.; Massa, F.; Lerer, A.; Bradbury, J.; Chanan, G.; Chintala, S. Pytorch: An imperative style, high-performance deep learning library. Adv. Neural Inf. Process. Syst. 2019, 32, 8026–8037. [Google Scholar]
  14. Zhang, S.; Yao, L.; Sun, A.; Tay, Y. Deep learning based recommender system: A survey and new perspectives. ACM Comput. Surv. 2019, 52, 1–38. [Google Scholar] [CrossRef]
  15. Qi, L.Q.; Luo, Z.Y. Tensor Analysis: Spectral Theory and Special Tensors; Society for Industrial & Applied Mathematics: Philadelphia, PA, USA, 2017. [Google Scholar]
  16. Qi, L.Q. Tensor Eigenvalues and Their Applications; Springer Nature: Singapore, 2018. [Google Scholar]
  17. Ding, W.Y.; Luo, Z.Y.; Qi, L.Q. P-tensors, P0-tensors, and their applications. Linear Algebra Appl. 2018, 555, 336. [Google Scholar] [CrossRef]
  18. He, Z.H.; Wang, X.X.; Zhao, Y.F. Eigenvalues of quaternion tensors with applications to color video processing. J. Sci. Comput. 2023, 94, 1. [Google Scholar] [CrossRef]
  19. He, Z.H.; Liu, T.T.; Wang, X.X. Eigenvalues of quaternion tensors: Properties, algorithms and applications. Adv. Appl. Clifford Algebr. 2025, 35, 4. [Google Scholar] [CrossRef]
  20. Zhang, X.F.; Zhang, W.D.; Li, T. Tensor form of GPBiCG algorithm for solving the generalized Sylvester quaternion tensor equations. J. Franklin Inst. 2023, 360, 5929–5946. [Google Scholar] [CrossRef]
  21. Zhang, X.F.; Li, T.; Ou, Y.G. Iterative solutions of generalized sylvester quaternion tensor equations. Linear Multilinear Algebra 2023, 72, 1259–1278. [Google Scholar] [CrossRef]
  22. Gao, Z.H.; Wang, Q.W.; Xie, L.M. The (anti-)η-hermitian solution to a novel system of matrix equations over the split quaternion algebra. Math. Methods Appl. Sci. 2024, 47, 13896–13913. [Google Scholar] [CrossRef]
  23. Xie, M.Y.; Wang, Q.W.; Zhang, Y. The BiCG algorithm for solving the minimal frobenius norm solution of generalized sylvester tensor equation over the quaternions. Symmetry 2024, 16, 1167. [Google Scholar] [CrossRef]
  24. Yang, L.Q.; Wang, Q.W.; Kou, Z. A system of tensor equations over the dual split quaternion algebra with an application. Mathematics 2024, 12, 3571. [Google Scholar] [CrossRef]
  25. Sun, L.Z.; Zheng, B.D.; Bu, C.J.; Wei, Y.M. Moore–Penrose inverse of tensors via Einstein product. Linear Multilinear Algebra 2016, 64, 686–698. [Google Scholar] [CrossRef]
  26. Liu, T.T.; Yu, S.W. Some properties of reduced biquaternion tensors. Symmetry 2024, 16, 1260. [Google Scholar] [CrossRef]
  27. Yuan, S.F.; Wang, Q.W.; Yu, Y.B.; Tian, Y. On hermitian solutions of the split quaternion matrix equation AXB + CXD = E. Adv. Appl. Clifford Algebras 2017, 27, 3235–3252. [Google Scholar] [CrossRef]
  28. Ben-Israel, A.; Greville, T.N.E. Generalized Inverses: Theory and Applications; Springer Science & Business Media: New York, NY, USA, 2006. [Google Scholar]
  29. Magnus, J.R. L-structured matrices and linear matrix equations. Linear Multilinear Algebra 1983, 14, 67–88. [Google Scholar] [CrossRef]
  30. Xie, L.M.; Wang, Q.W. A system of matrix equations over the commutative quaternion ring. Filomat 2023, 37, 97–106. [Google Scholar] [CrossRef]
  31. Sara, U.; Akter, M.; Uddin, M.S. Image quality assessment through FSIM, SSIM, MSE and PSNR-a comparative study. J. Comput. Commun. 2019, 7, 8–18. [Google Scholar] [CrossRef]
  32. Feng, W.; Zhang, J.; Qin, Z.T. A secure and efficient image transmission scheme based on two chaotic maps. Complexity 2021, 2021, 1898998. [Google Scholar] [CrossRef]
  33. Feng, W.; Zhao, X.Y.; Zhang, J.; Qin, Z.T.; Zhang, J.K.; He, Y.G. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
  34. Feng, W.; Yang, J.X.; Zhao, X.Y.; Qin, Z.T.; Zhang, J.; Zhu, Z.G.; Wen, H.P.; Qian, K. A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps. Mathematics 2024, 12, 3917. [Google Scholar] [CrossRef]
  35. Feng, W.; Zhang, J.; Chen, Y.; Qin, Z.T.; Zhang, Y.S.; Ahmad, M.; Woźniak, M. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 2024, 246, 123190. [Google Scholar] [CrossRef]
  36. Kong, X.X.; Yu, F.; Yao, W.; Cai, S.; Zhang, J.; Lin, H.R. Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: Image encryption and FPGA implementation. IEEE Trans. Neural Netw. 2024, 171, 85–103. [Google Scholar] [CrossRef]
  37. Yu, F.; Lin, Y.; Yao, W.; Cai, S.; Lin, H.R.; Li, Y. Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT. IEEE Trans. Neural Netw. 2025, 182, 106904. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Flowcharts of Algorithms 5 and 6.
Figure 1. Flowcharts of Algorithms 5 and 6.
Mathematics 13 00644 g001
Figure 2. Frames before and after Encryption and Decryption.
Figure 2. Frames before and after Encryption and Decryption.
Mathematics 13 00644 g002
Figure 3. Frames before and after Block Encryption and Decryption.
Figure 3. Frames before and after Block Encryption and Decryption.
Mathematics 13 00644 g003
Table 1. Error between numerical solution and true solution.
Table 1. Error between numerical solution and true solution.
Video 1ErrorVideo 2Error
1-frame 2.6377 × 10 9 1-frame 2.7776 × 10 9
10-frame 2.6527 × 10 9 10-frame 2.7644 × 10 9
16-frame 2.6655 × 10 9 16-frame 2.7569 × 10 9
25-frame 2.6595 × 10 9 25-frame 2.7707 × 10 9
Table 2. PSNR, SSIM, and FSIM of video 1 and video 2.
Table 2. PSNR, SSIM, and FSIM of video 1 and video 2.
Video 1PSNRSSIMFSIMVideo 2PSNRSSIMFSIM
1-frame245.4833111-frame244.659811
10-frame246.19601110-frame245.867911
16-frame246.04691116-frame245.622011
25-frame246.04571125-frame245.492011
Table 3. Error between numerical solution and true solution.
Table 3. Error between numerical solution and true solution.
Video 1ErrorVideo 2Error
3-frame 4.0604 × 10 10 3-frame 4.1622 × 10 10
12-frame 8.4663 × 10 10 12-frame 7.7403 × 10 10
18-frame 1.1171 × 10 9 18-frame 9.9505 × 10 10
27-frame 1.4076 × 10 9 27-frame 1.2259 × 10 9
Table 4. PSNR, SSIM, and FSIM of video 1 and video 2.
Table 4. PSNR, SSIM, and FSIM of video 1 and video 2.
Video 1PSNRSSIMFSIMVideo 2PSNRSSIMFSIM
3-frame245.0190113-frame244.371311
12-frame244.55301112-frame244.835911
18-frame244.63911118-frame246.706911
27-frame245.34031127-frame246.391011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jia, Z.-R.; Wang, Q.-W. The General Solution to a System of Tensor Equations over the Split Quaternion Algebra with Applications. Mathematics 2025, 13, 644. https://doi.org/10.3390/math13040644

AMA Style

Jia Z-R, Wang Q-W. The General Solution to a System of Tensor Equations over the Split Quaternion Algebra with Applications. Mathematics. 2025; 13(4):644. https://doi.org/10.3390/math13040644

Chicago/Turabian Style

Jia, Zong-Ru, and Qing-Wen Wang. 2025. "The General Solution to a System of Tensor Equations over the Split Quaternion Algebra with Applications" Mathematics 13, no. 4: 644. https://doi.org/10.3390/math13040644

APA Style

Jia, Z.-R., & Wang, Q.-W. (2025). The General Solution to a System of Tensor Equations over the Split Quaternion Algebra with Applications. Mathematics, 13(4), 644. https://doi.org/10.3390/math13040644

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop