scispace - formally typeset
X

Xiang Peng

Researcher at Shenzhen University

Publications -  274
Citations -  5842

Xiang Peng is an academic researcher from Shenzhen University. The author has contributed to research in topics: Encryption & Ciphertext. The author has an hindex of 31, co-authored 269 publications receiving 4802 citations. Previous affiliations of Xiang Peng include Chinese Ministry of Education & Tianjin University.

Papers
More filters
Proceedings ArticleDOI

Ray-based calibration for the micro optical metrology system

TL;DR: The ray-based general imaging model is introduced to describe the FP-3DM, which has the potential to get a unified expression for different system arrangements and the dedicated calibration procedure is presented to realize quantitative 3D imaging.
Proceedings ArticleDOI

A modified phase unwrapping algorithm based on phase filtering

TL;DR: A modified phase unwrapping method based on the phase filtering is presented, which can be used to achieve correct phase-unwrapping with use of fewer numbers of fringe frequencies.
Proceedings ArticleDOI

Speckle-correlation-based ciphertext-only attack on the double random phase encoding scheme

TL;DR: It is revealed a fact that the ciphertext’s autocorrelation is essentially identical to the plaintext's own autoc orrelation, which could lead to a potential security flaw because an unauthorized user could directly retrieve the plain text from an intercepted ciphertext by performing proposed COA approach.
Journal ArticleDOI

Dictionary-based compressive Fourier ptychography.

TL;DR: In this article , a multiplexing and compressible Fourier ptychography (FP) scheme based on structured illuminations and compressive sensing technique was proposed to improve the spatial bandwidth product with limited device.
Patent

Sub secret key generation method and decryption or authentication method for optical threshold coding

TL;DR: In this article, a sub secret key generation method and decryption or authentication method for optical threshold coding was proposed. But the method was used for generating three sub secret keys in pure phase distribution for plaintext image information or authentication image information.