Browse Definitions :
Definition

Stanford Bunny

The Stanford Bunny is a computer graphics test model (GTM) for 3-D graphics. The Bunny is a data-set for constructing digital, three dimensional models. The original model for the Bunny was a clay rabbit figure. The data from the clay rabbit was collected by using a technique called range scan that was developed by Greg Turk of Georgia Institute of Technology and Marc Levoy of Stanford University. 

In a range scan, the color or shade of each pixel represents a specific radial distance, technically known as range, from the observer's point of view. Mathematically, the range scan of the original clay rabbit is a collection of 69,451 triangles. The paper version below is a simple illustration of how a programmer might use shade data from a range scan to re-create the bunny.

In a range scan, radial distances can be portrayed as colors of the spectrum in a red-green-blue ( RGB ) image or as levels of brightness in a grayscale image. In a color range scan, for example, the shortest ranges might be rendered as white, progressing through the colors of the spectrum according to decreasing wavelength -- red, orange, yellow, green, blue, indigo and violet -- as the range increases, with maximum or infinite range represented as a black background. A grayscale range scan might portray the shortest ranges as white, with increasing ranges as progressively darker shades of gray until the background, at infinite range, is rendered as black. When a real-world three-dimensional ( 3D ) solid object is scanned in this way, the resulting image resembles a false-color or false-grayscale photograph.

See videos:
Stanford bunny: Linear elastic model
Stanford bunny: Neohookean elastic model

 

The Stanford Bunny is the oldest and best-known of a collection of models in the Stanford 3D Scanning Repository. Other models include a drill bit, an armadillo, an angel, a dragon and a Buddha.

This was last updated in April 2010

Continue Reading About Stanford Bunny

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • cipher block chaining (CBC)

    Cipher block chaining (CBC) is a mode of operation for a block cipher -- one in which a sequence of bits are encrypted as a ...

  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close