Y
Yongkai Yin
Researcher at Shandong University
Publications - 86
Citations - 1149
Yongkai Yin is an academic researcher from Shandong University. The author has contributed to research in topics: Encryption & Ghost imaging. The author has an hindex of 17, co-authored 78 publications receiving 805 citations. Previous affiliations of Yongkai Yin include Tianjin University & Shenzhen University.
Papers
More filters
Journal ArticleDOI
Calibration of fringe projection profilometry with bundle adjustment strategy
TL;DR: A more reliable calibration approach based on the stereo vision model of the FPP scheme in conjunction with the bundle adjustment strategy can adjust the coordinates of benchmarks and thereby estimate the scheme parameters more accurately even with an imperfect target.
Journal ArticleDOI
Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme
Xianye Li,Xiangfeng Meng,Xiulun Yang,Yurong Wang,Yongkai Yin,Xiang Peng,Wenqi He,Guoyan Dong,Hongyi Chen +8 more
TL;DR: Theoretical analysis and numerical simulations validate the feasibility of the proposed multiple-image encryption method via lifting wavelet transform (LWT) and XOR operation, based on a row scanning compressive ghost imaging scheme.
Journal ArticleDOI
Structured light field 3D imaging.
TL;DR: This paper analyzed and derived the phase-depth mapping in the structured light field and then proposed a flexible ray-based calibration approach to determine the independent mapping coefficients for each ray.
Journal ArticleDOI
Fringe projection 3D microscopy with the general imaging model
TL;DR: Newly developed fringe projection 3D microscopy is presented, configured according to camera-projector layout and long working distance lenses, and a dedicated calibration procedure is developed to realize quantitative 3D imaging.
Journal ArticleDOI
Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling
Xianye Li,Xiangfeng Meng,Xiulun Yang,Yongkai Yin,Yurong Wang,Xiang Peng,Wenqi He,Guoyan Dong,Hongyi Chen +8 more
TL;DR: During the decryption, the original secret images can be successfully decrypted by the logistic map algorithm, measurement matrix generations, compressive sensing reconstruction, DCT distribution extraction, inverse DCT transform, and filtering operation.