scispace - formally typeset
Search or ask a question

Showing papers by "Xiang Peng published in 2002"


Journal ArticleDOI
TL;DR: A new method based on the concept of virtual optics for both encryption and decryption is proposed, which shows the possibility to encode/decode any digital information.
Abstract: A new method based on the concept of virtual optics for both encryption and decryption is proposed. The technique shows the possibility to encode/decode any digital information. A virtual wavelength and a pseudo-random covering mask (PRCM) are used to design “double locks” and “double keys” for image encryption. Numerical experiments are presented to test the sensitivity of the virtual wavelength. The possible dimensions of keys are roughly estimated and show a high security level.

78 citations


Journal ArticleDOI
TL;DR: The procedures of the encryption and decryption of digital information, including text and picture, are described in detail and an enhanced scheme with a random mask encoding is proposed in order to increase the security level.

74 citations


Journal ArticleDOI
TL;DR: A new parameterized multi-dimensional data encryption method for data encryption in hyperspace is presented and quantitatively analyzed and illustrated with numerical simulations.

34 citations


Journal ArticleDOI
01 Jan 2002-Optik
TL;DR: This method works by first constructing a quality map based on the characteristic of the active triangulation system from the wrapped phase data and then using this map to guide the unwrapping.

23 citations


Journal ArticleDOI
01 Jan 2002-Optik
TL;DR: A self-made optical digitizer that is employed for quickly acquiring range data from multiple views is presented, and a visualized registration procedure is introduced that can provide a reliable estimate for the fine registration of multiple range images in a unified coordinate system.

20 citations


Journal ArticleDOI
01 Jan 2002-Optik
TL;DR: A new approach for merging multiple range images to build up a complete geometric model of the objects in 3-D space is proposed, based on the segmentation of a pair of range images using the concepts of “double stitching lines”, as well as a constrained local triangulation process.

8 citations


Proceedings ArticleDOI
16 Sep 2002
TL;DR: A new method based on the concept of virtual optics for both encryption and decryption is proposed, which shows the possibility to encrypt/decrypt digital information.
Abstract: A new method based on the concept of virtual optics for both encryption and decryption is proposed. The technique shows the possibility to encrypt/decrypt digital information. Virtual wavelength, virtual focal length, and virtual diffractive distance can all be used to design locks and keys for image encryption. Numerical experiments are presented to test the effectiveness of the method. The possible dimensions of keys are roughly estimated and show a high security level.

3 citations


Proceedings ArticleDOI
05 Sep 2002
TL;DR: A self-made optical digitizer that is used for quick acquisition of range images from multiple views is presented, and a visualized registration scheme is described that can reliably provide an initial estimate for the fine registration of multiple range images in a unified coordinate system.
Abstract: The key modules in a typical reverse engineering system consist of the acquisition, registration, and the integration of three-dimensional range surface data. We present a self-made optical digitizer that is used for quick acquisition of range images from multiple views, and describe a visualized registration scheme that can reliably provide an initial estimate for the fine registration of multiple range images in a unified coordinate system. We also present an efficient approach for merging multiple range images in order to build a complete geometric model of the objects in 3-D space and experiment results showing the effectiveness of this approach in 3-D imaging and modeling for the application of reverse engineering

3 citations


Proceedings ArticleDOI
10 Sep 2002
TL;DR: The experimental results show that the technique proposed is efficient for the reconstruction of broken part of skull surface and convenient to surgical repair of skull defect and robust in implementation.
Abstract: This article presents a technique, based on PC system, of skull surface triangulation representation for coronal CT images. First, the end-user selects interactively a point within the Region of Interest (ROI), and the computer will automatically position the selected ROI. The boundary points of the ROI is extracted and ordered according to their spatial orientation. Then, the boundary points between two adjacent slices are triangulated by virtual of the optical local morphology. We briefly introduce the technique how to get the patch of skull defect in the commercial software package Surfacer. So the geometric representation using triangular patch can be produced by rapid prototyping and tooling. Finally, the experimental results show that the technique proposed is efficient for the reconstruction of broken part of skull surface and convenient to surgical repair of skull defect. Also, we have found that the technique is robust in implementation.

2 citations