scispace - formally typeset
X

Xiang Peng

Researcher at Shenzhen University

Publications -  274
Citations -  5842

Xiang Peng is an academic researcher from Shenzhen University. The author has contributed to research in topics: Encryption & Ciphertext. The author has an hindex of 31, co-authored 269 publications receiving 4802 citations. Previous affiliations of Xiang Peng include Chinese Ministry of Education & Tianjin University.

Papers
More filters
Journal ArticleDOI

Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium.

TL;DR: This paper evaluates the security risk of the optical cryptosystem with spatially incoherent illumination from the view of imaging through scattering medium and demonstrates that it is vulnerable to ciphertext-only attack and shows that a plaintext image can be directly reconstructed from the autocorrelation of its corresponding ciphertext without any prior knowledge about the plaintext or the phase keys.
Journal ArticleDOI

Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain

TL;DR: During decryption, each plaintext image possessing all the correct keys can be successfully decrypted by measurement key regeneration, compression algorithm reconstruction, inverse wavelet transformation, and Fresnel transformation.
Journal ArticleDOI

Optical hierarchical authentication based on interference and hash function

TL;DR: A method to achieve the purpose of hierarchical authentication on the basis of two beams' interference and the one-way hash function and theoretical analysis and computer simulations both validate the effectiveness of this method.
Journal ArticleDOI

Ray calibration and phase mapping for structured-light-field 3D reconstruction.

TL;DR: A novel active method involving ray calibration and phase mapping, to achieve SLF 3D reconstruction, and derived the phase mapping in the SLF that spatial coordinates can be directly mapped from phase.
Journal ArticleDOI

Asymmetric cryptography based on wavefront sensing

TL;DR: A system of asymmetric cryptography based on wavefront sensing (ACWS) is proposed for the first time to the authors' knowledge and formulized mathematically and demonstrated with a set of numerical experiments.