Chinese Optics Letters, 2023, 21 (12): 120003, Published Online: Dec. 26, 2023  

Cascaded liquid crystal holography for optical encryption

Author Affiliations
1 National Laboratory of Solid State Microstructures, Key Laboratory of Intelligent Optical Sensing and Manipulation, Collaborative Innovation Center of Advanced Microstructures, and College of Engineering and Applied Sciences, Nanjing University, Nanjing 210023, China
2 School of Instrumentation and Optoelectronic Engineering, Beihang University, Beijing 100191, China
Abstract
Cascaded holography coupled with the secret-sharing scheme has recently gained considerable attention due to its enhanced information processing and encryption capabilities. Here, we propose a new holographic iterative algorithm and present the implementation of cascaded liquid crystal (LC) holography for optical encryption. Each LC layer acts as the secret key and can generate a distinct holographic image. By cascading two LC elements, a new holographic image is formed. Additionally, we showcase the dynamic optical encryption achieved by electrically switching LCs with combined electric keys. This work may offer promising applications in optical cryptography, all-optical computing, and data storage.

1. Introduction

The importance of information security has reached an unprecedented level in the wake of rapid advancements in information technology[13]. Significant efforts have been devoted to finding new encryption technologies to improve information security[46]. Optical holography has emerged as a crucial tool due to its ability to provide high-level security and protection for sensitive data[79]. In particular, geometric metasurfaces comprising nanostructured meta-atoms with versatile degrees of freedom supply extraordinary holographic functionalities that are unachievable by ordinary diffractive optics[1013]. They can encode the information[14] in a single element by leveraging a range of light parameters, including the wavelength[15,16], amplitude[17], orbital angular momentum[1820], polarization[21,22], etc. To further enhance the security, secret-sharing optical encryption method is implemented with cascaded metasurfaces, whereby the secret is split into multiple shares[2325]. The enciphered message can only be unveiled with requisite secret keys that are appropriately stacked. Under this arrangement, the stolen secret share will not reveal the secret information. Despite impressive advancements in metaholographic encryption, there still remain some challenging issues, especially easy fabrication and dynamic tunability.

As a typical class of soft building blocks[26,27], liquid crystals (LCs) play a vital role in various electro-optical applications due to their unique anisotropic properties and sensitivity to diverse external stimuli[2831]. Recently, LC holography that can manipulate the light field in the far field has attracted considerable attention[3138], showing the merits of easy fabrication, dynamic tunability, high flexibility, high efficiency, and compact geometry[3942]. For instance, multifunctional LC holographic devices have been demonstrated that display both the surface patterns in the near field and designed holographic images in the far field[3538]. Chiral LC superstructures have also been adopted to realize dynamic hybrid multiplexed holography and optical rotatory dispersion-based polychromatic holography[33,34]. In addition, inspired by the ancient Tiger Amulet, the high-level-security “four-in-one” holographic encryption is obtained via photopatterned LCs, which distribute a secret among four LC regions in the transverse plane[32]. Despite the potential to introduce a secret-sharing design, the exploration of LC holography in a tandem cascaded manner with two or more secret keys has remained elusive, constrained by traditional LC holographic algorithms.

Here, we experimentally demonstrate a cascaded LC holography scheme that enables secret sharing between two LC elements (secret keys, namely, LC_a and LC_b) (Fig. 1). A new holographic iterative algorithm that is simple, efficient, and suitable for various cascaded holographic devices is proposed to calculate these two phase holograms. Two independent holographic images can be achieved in the far field when LC_a and LC_b are illuminated by circularly polarized light separately. When they are carefully aligned and stacked, the cascaded LCs produce a new holographic image that varies from the images created by each individual LC key. Furthermore, we demonstrate the LC-based dynamic optical encryption scheme by applying the electric fields to two LC elements. The ciphertext can only be revealed by applying the correct voltage keys. This strategy proves to be highly efficient in situations where different ciphertexts need to be transmitted to multiple recipients. This work may provide a dynamic secret-sharing LC platform, offering unique advantages such as enhanced security through multilayered holographic encoding and more complex reconstruction processes.

Fig. 1. Schematic illustration depicting the conceptual implementation of the cascaded LC holographic encryption. Three independent holographic images are reconstructed with LC_a, LC_b, and cascaded LC_a and LC_b.

下载图片 查看所有图片

2. Principle

The geometric phase in anisotropic LCs is an intriguing phenomenon. During the geometric phase modulation process, the incident circular polarization is handedness-converted, and the transmitted light carries a space-variant phase factor called the geometric phase [also known as the Pancharatnam–Berry (PB) phase[43,44]], twice the value of the azimuthal orientation distribution of LC α. Conjugated phases are encoded for opposite circularly polarized light. Thus, the phase modulation by LCs can be expressed by φ=±2α, i.e., for circular polarizations: |Re+i2α|L, |Lei2α|R, where |R=22[1i] and |L=22[1i] stand for the right-handed and left-handed circular polarizations.

Our design is to use two LC elements (LC_a and LC_b) as the secret keys for holographic encryption. These two LC elements are encoded with two different phase holograms, φa and φb, which allows them to reconstruct two independent holographic images in the far field under the illumination of circularly polarized light (two channels). By cascading these two LC elements in a tandem manner, the light is modulated by the accumulated phase retardations of both LC_a and LC_b, and a new cascaded holographic image is created. Specifically, for the single-LC-layer mode, the incident right-handed circularly polarized (RCP) light passing through the LC_a (LC_b) will be converted to the opposite circular handedness and modulated by the geometric phase φa (φb). In the cascaded LC (tandem) mode, the two LC elements are tightly stacked. The incident RCP light will be converted to left-handed circularly polarized (LCP) light after transmitting through LC_a and accumulate the phase delay of φa. Then, the light is converted back to RCP and accumulates the total phase retardations of both layers LC_a and LC_b: φa+(φb) after transmitting through LC_b. We aim to accomplish the independent encoding of the phase holograms φa and φb to two LC secret keys, and further introduce an additional channel [φc=φa+(φb)] for displaying a new holographic image, each of which can be custom-designed. Here, the holographic image encoded by the third channel can be regarded as the encrypted information, which is shared by two LC secret keys.

From the expression φc=φa+(φb), it seems these three channels have a certain level of cross talk, which appears to be in conflict over the notion of independent encoding of single LC and cascaded LC holographic images. However, the independent engineering of these three channels is still possible (verified experimentally). First, in our design, only the intensity distribution of the far-field holographic image is paid attention to, with no imposition of direct restrictions on the phase distribution of the holographic image in the far field. This consequently allows for a certain level of flexibility in the design of three holographic images. Second, the fixed phase hologram φc corresponds to multiple combinations of φa and φb, which induces the other degree of freedom. For example, the phase combinations of (φa, φb) and (φa+X, φb+X) produce the same phase holograms φc, where X is an arbitrary value. These degrees of freedom contribute to the independent design of φa, φb, and φc.

The hologram algorithm serves as a pivotal aspect in realizing the above design. Conventional LC holographic algorithms are usually one-layer solutions for multifunctional holography. It is challenging to achieve two independent phase holograms for physically separate LC layers that can reconstruct their respective holographic images as well as a third new holographic image when they are cascaded. Based on the quantified relation of φc=φa+(φb), we propose a modified Gerchberg–Saxton algorithm to encode different holographic images (“N,” “J,” and “U”) onto three channels (φa, φb, and φc). Our algorithm is essentially a phase-retrieval algorithm that can simultaneously calculate φa and φb for the two LC secret keys. The resultant φa, φb, and φa+(φb) will correspond to the generations of holographic image a, image b, and image c (“N,” “J,” and “U”) in the far field.

Figure 2(a) shows the flow chart of our algorithm, which consists of two iterative loops. Here, fast Fourier transform (FFT) and inverse fast Fourier transform (iFFT) are used for constructing iterative loops between the holographic images in the far field and the hologram in the near field. Because of the standard Gaussian beam used to illuminate the cascaded LC elements, a Gaussian distribution (|Eg|2) is used for the replacement of the amplitude in the near field. The first iterative loop is represented by the red part of the flow chart. We input a random phase at the beginning of the iterative loop. The target image c is used for the replacement of the amplitude in the far field, which only participates in the first loop. Then a feedback can be obtained through iFFT back to the near field, which can improve the convergence speed. After obtaining the desired phase distribution φc by sufficient iterations in the first loop, φc is adopted in the next iterative loop indicated by blue and green colors to calculate the phase distributions of φa and φb. The equations of φb=φaφc and φa=φb+φc are used to connect the two parts of the second iterative algorithm and the φc calculated by the first iterative loop. It is worth noting that the participation of image a, image b, and quantitative relationships (φb=φaφc and φa=φb+φc) cause the convergence of the second iterative loop towards a direction, where φa, φb and φa+(φb) can well reconstruct the holographic images of “N,” “J,” and “U” in the far field, respectively. After a sufficient number of iterations, we obtain the optimized phase distributions φa and φb [Fig. 2(b)]. Corresponding director distributions of LC_a and LC_b can be calculated according to φ=±2α.

Fig. 2. Flow chart of the iterative algorithm with the calculated LC phase holograms. (a) Modified Gerchberg–Saxton algorithm. Fast Fourier transform and inverse fast Fourier transform are denoted as FFT and iFFT. The red, blue, and green parts of the flow chart represent the parts involved in the generation of phase profiles of φc, φa, and φb. |Eg|2 corresponds to the amplitude of a standard Gaussian beam. (b) Output phase information for LC elements (LC_a and LC_b).

下载图片 查看所有图片

3. Experiments

3.1. Materials and methods

In our experiment, a commercial nematic LC E7 (Jiangsu Hecheng Display Technology Co., Ltd., China) was utilized for fabricating LC holographic elements. Two glass substrates were assembled to form an LC cell. SD1 (Nanjing Ningcui Optical Technology Co., Ltd.), employed as the photoalignment agent, was dissolved in dimethylformamide at a concentration of 0.35% (mass fraction) (Note 1 in Supplementary Material). After ultrasonic and UV-ozone cleaning procedures, glass substrates (2cm×1.5cm) coated with indium tin oxide (ITO) underwent a spin-coating process using the SD1 solution[33,34,40,45,46]. Following this step, the substrates were transferred to a hot stage and subjected to a curing process at 100°C for a duration of 10 min. To ensure the desired cell gap, two substrates were separated by a mixture of spacer and epoxy glue, resulting in a measured cell gap of 4.5 µm.

The phase holograms were generated by our modified Gerchberg–Saxton algorithm. The director distribution α is calculated according to α=φ/2. Then, we conducted the photopatterning process. The empty LC cell was positioned at the image plane of a digital micromirror device-based microlithography system[40,46,47]. Through a multistep, partly overlapping, exposure process with synchronous polarization control, we recorded the designed pattern of LC director distribution to the alignment layer. Specifically, the calculated director distribution, ranging from 0 to π, was divided into 36 equally sized subregions. Each subregion was assigned a uniform director value, ranging from π/36 to π, with an interval of π/36. A sum region, consisting of five adjacent subregions, was exposed simultaneously with a certain intensity and an exposure time of 3 s. However, these conditions were not sufficient to induce a stable reorientation of SD1. Subsequently, the sum region was exposed again, shifting one subregion at a time, while the polarizer rotated synchronously by 5°, which is 180°/36. This process was repeated until each subregion was exposed 5 times, resulting in a total exposure time of 15 s, which effectively oriented the SD1 molecules according to the designed α. The target LC microstructure comprises 1080pixels×1080pixels. The nematic LC E7 (Jiangsu Hecheng Display Technology Co., Ltd., China) was then capillary-filled into the photopatterned cell at a temperature of 80°C. The cell was slowly cooled to room temperature, ultimately leading to the formation of holographic LC elements. Characterizations are described in Note 2 (Supplementary Material).

3.2. Experimental results

Figures 3 and 4 showcase the characterization of cascaded LC holographic encryption. We depict the experimental setup in Fig. 3(a). A linear polarizer and a quarter-wave plate are strategically placed before the LC elements to achieve the RCP for incidence. Figure 3(b) shows the calculated LC director distributions αa and αb of LC_a and LC_b. Then, the two LC elements are photopatterned according to αa and αb using the homemade high-precision photoalignment technique (see details in Section 3.1). Polarization optical microscope (POM) images of central enlarged regions of the two LC elements are captured, exhibiting high-quality architectures with striped textures consistent with their respective director distributions. Then, LC_a and LC_b are placed individually (single-layer mode) or simultaneously (cascaded-layer mode) in the optical path to carry out the holographic displays. A high sensitivity of the alignment of these two LC elements is anticipated. We fix the position of LC_a while carefully adjusting LC_b pixelwise within the transverse plane using a high-precision displacement stage, until obtaining the encrypted cascaded holographic image.

Fig. 4. Theoretically and experimentally reconstructed holographic images of letters “N,” “J,” “U,” “O,” “K,” and “L” for cascaded holographic encryption. (a), (b) Reconstructed holographic images (letters “N” and “J” from LC_a and LC_b, and letters “O” and “K” from LC_d and LC_e) in the single-LC framework; (c) holographic images of letters “U” and “L” in the cascaded LC framework. These images are marked by white dotted lines.

下载图片 查看所有图片

Fig. 3. Experimental setup and two LC elements (LC_a and LC_b) for secret sharing. (a) Experimental setup to record the holographic images. The optical path contains either one LC element or both the LC_a and LC_b. LP, linear polarizer; QWP, quarter-wave plate. (b) Designed phase profile of LC director distributions and the crossed polarized microscopic textures of LC_a and LC_b; the orthogonal polarizer and analyzer are represented by crossed white arrows. Scale bar: 75 µm.

下载图片 查看所有图片

As illustrated in Figs. 4(a) and 4(b), when illuminated by circularly polarized light at a wavelength of 633 nm, the two phase holograms of LC_a and LC_b successfully reconstruct high-quality target holographic images of the letters “N” and “J” in the far field, respectively, with little background noise. In the cascaded mode, the close stacking of two LC elements along the propagation direction results in the decryption of the holographic image of the letter “U” [Fig. 4(c)]. The above experimental results agree well with the simulated holographic images in the second row. In comparison to the single-LC mode, the holographic image in the cascaded-LC mode exhibits slight noise. It is worth noting that each LC element consists of two glass substrates and a photopatterned LC layer between the two substrates, implying an inevitable distance between the two LC layers (the thickness of two substrates: 1.4mm). While the algorithm does not take into account the factor of light propagation between φa and φb, this may be attributed to such noise. In addition, the slightly mismatched alignment between these two LC secret keys may influence the quality of the cascaded holographic image. These factors can be further improved either by incorporating a propagation function into the algorithm (Fig. S1 in Supplementary Material), or adopting microstructured LC polymers as the secret keys, or conducting a more rigorous experimental procedure. Broadband holographic performances (at 470, 580, and 540 nm) are also demonstrated. Holograms implemented with different wavelengths exhibit different sizes of the holographic images[47]. Moreover, we found that the wavelength difference also has an impact on the efficiency of polarization conversion of the geometric phase, thus affecting the holographic efficiency. This is determined by the half-wave condition 2π(Δn)d/λ = , where Δn represents the birefringence of the LC, d is the thickness of the LC layer, m is an arbitrary integer, and λ is the wavelength.

To further demonstrate the arbitrary design of holographic images for the three independent channels, we also fabricate secret keys of LC_d and LC_e (Fig. S2 in Supplementary Material) and demonstrate their holographic encryption capability. As shown in Fig. 4, all the holographic images (“O,” “K,” and “L”) reconstructed in the single-LC and cascaded-LC frameworks conform to the expected outcomes. The holographic images of “O” and “K” do not leak any information of the ciphertext “L”, implying an effective, flexible, and highly secure encryption scheme of optical information in the cascaded channel. This is also important in applications such as optical data storage, communication networks, and anti-counterfeiting measures.

Based on the LC holographic performance in the cascaded LC mode, we further highlight the dynamic cascaded LC holographic encryption by taking advantage of the remarkable electro-optical tunability of LCs. The basic principle is rooted in the electrically controlled reorientation of LC molecules. As depicted in Fig. 5(a), before we apply an electric field to the LC element, i.e., the applied voltage is at 0 V, LC molecules align parallel to the glass substrates in accordance with the underlying alignment pattern, thereby yielding an “on” state for the holographic image. The cascaded holographic information is “on” only if the two LC elements are both in the “on” states [Fig. 5(b)]. As the voltage increases, the LC molecules gradually undergo a transition to upright orientations, which are perpendicular to the substrates when the voltage reaches 14 V (1 kHz, square-wave signal). In this case, the holographic functionality of the LC hologram is disrupted, resulting in an “off” state. When both the LC elements are in the “off” states, the resulting holographic information appears blank.

Fig. 5. Electrically dynamic optical encryption based on cascaded LC holography. (a) Schematic illustration of the electric switching of LC hologram with different applied voltages (0 V and 14 V); (b) four basic holographic images in the cascaded LC framework with different combinations of applied voltages; (c) electrically dynamic optical encryption based on cascaded LC holography for the scenario, where ciphers or passwords are sent to multiple receivers. Scale bar: 250 µm.

下载图片 查看所有图片

The ability to electrically program both LC_a and LC_b permits advanced optical information processing and encryption. We define a coding rule that each cipher corresponds to a combination of applied voltages (Ua,Ub) to the cascaded LC elements, which acts as the private key. By sequentially switching the LC elements according to the key, the receiver can decrypt and safely receive the message. For instance, the key of {1. (14, 0); 2. (0, 0)} can decrypt the message of “JU.” With any other key, incorrect information will be obtained.

Following the above rule, we present a robust, dynamic, secure method for optical encryption and decryption utilizing the dynamic cascaded LC holography. As illustrated in Fig. 5(c), Kevin would like to send different ciphers or passwords to multiple receivers, including Chris, Haley, Tim, and so on. These messages are all encrypted and shared in LC_a and LC_b. Each receiver is provided with the two LC elements and is informed of the customized decryption key. Chris gets the key {1. (0, 14); 2. (14, 0)} and then obtains the reconstructed holographic image of “NJ.” Thus, she reads out the message of “NJ,” which is abbreviated from Nanjing. Similarly, Haley receives the ciphertext of “NJU,” which is the abbreviation for Nanjing University. Furthermore, the encryption key can be programmed to incorporate more complex voltage combinations. For example, Tim first applies (0, 0) to obtain the letter “U”; then he uses (14, 14) and reads out a blank space. “J,” “U,” “N,” and “J” are sequentially obtained according to the following voltages {3. (14, 0); 4. (0, 0); 5. (0, 14); 6. (14, 0)}. Therefore, he receives the password “U˽JUNJ.” Other receivers can also decode their respective message by the provided keys. This dynamic cascaded encryption scheme allows for obtaining arbitrarily and nearly unlimited encoding capabilities (passwords such as N˽UJJJUNJ˽˽UJJN˽N) from the holographic images by providing customized voltage keys. This indicates an enhanced holographic encryption technique, holding great potential in large-capacity optical cryptography with multiple receivers.

4. Discussion

The new aspect of the current work is mainly the LC implementation of cascaded holography for optical encryption. A modified Gerchberg–Saxton algorithm is proposed to calculate the LC holograms for secret sharing. The encrypted cipher or password can only be read out with cascaded LCs. Notably, the cascaded LC configuration plays a crucial role in optical encryption, as it incorporates an independent and physically separated secret-sharing design, thereby enabling a higher level of security in optical encryption[2325]. Without the proper cascaded procedure of these secret keys, incorrect or misleading information can be obtained. The conversion efficiency of cross-polarization is another important parameter, which is determined by the half-wave condition. When the LC element satisfies the half-wave condition, the efficiency of LC-holographic performance is maximized. Any deviation from the half-wave condition will result in a decrease in efficiency. By leveraging the electro-optical tunability of LCs, we further create a dynamic cascaded LC platform for advanced optical encryption. This is achieved through the reprogramming of applied electric signals to two cascaded LC elements. A typical encryption scenario is proposed where Kevin transmits different passwords to multiple receivers. This strategy adds more dimensions of complexity to the optical encryption process.

This cascaded LC holography offers an enhanced level of security through the implementation of dual-layered holographic encryption. Actually, more adjustable parameters can be leveraged in the design of an optical encryption system. These parameters include the number of LC elements, lateral displacement of and distance between adjacent LC elements, parameters of external stimuli, diffraction angle, etc. These additional parameters can significantly impede unauthorized access or decryption. Additionally, the tunable nature of LCs allows for the flexible and dynamic manipulation of holographic performance, establishing a dynamic secret-sharing platform. Further incorporation of both the applied voltage and frequency of the electric field or light field will enable potentially high-speed information processing and real-time complex encryption schemes. Third, this work can be extended to diversified LC systems (such as cholesteric LCs and blue-phase LCs). We can anticipate more alluring optical multiplexing systems with well-designed broadband reflective and polychromatic features for future advanced optical encryption systems.

The experimental demonstration of cascaded LC holography in this study highlights its potential in both cascaded optical encryption with secret sharing and electrically dynamic optical encryption with unlimited encoding capabilities. The utilization of more than one LC layer, the cascaded configuration, and the high-quality holographic images offer enhanced security, flexibility, and potential applications in various fields, such as visual optical cryptography, optical communications, anti-counterfeiting measures, optical data storage, dynamic holographic display, all-optical computing, and diffractive neural networks.

References

[1] B. Xiong, Y. Liu, Y. Xu, L. Deng, C. W. Chen, J. N. Wang, R. Peng, Y. Lai, Y. Liu, M. Wang. Breaking the limitation of polarization multiplexing in optical metasurfaces with engineered noise. Science, 2023, 379: 294.

[2] J. Li, S. Kamin, G. Zheng, F. Neubrech, S. Zhang, N. Liu. Addressable metasurfaces for dynamic holography and optical information encryption. Sci. Adv., 2018, 4: eaar6768.

[3] X. Fang, H. Ren, M. Gu. Orbital angular momentum holography for high-security encryption. Nat. Photonics, 2019, 14: 102.

[4] N. Mao, G. Zhang, Y. Tang, Y. Li, Z. Hu, X. Zhang, K. Li, K. Cheah, G. Li. Nonlinear vectorial holography with quad-atom metasurfaces. Proc. Natl. Acad. Sci. USA, 2022, 119: e2204418119.

[5] M. Ouyang, H. Yu, D. Pan, L. Wan, C. Zhang, S. Gao, T. Feng, Z. Li. Optical encryption in spatial frequencies of light fields with metasurfaces. Optica, 2022, 9: 1022.

[6] R. Zhao, B. Sain, Q. Wei, C. Tang, X. Li, T. Weiss, L. Huang, Y. Wang, T. Zentgraf. Multichannel vectorial holographic display and encryption. Light Sci. Appl., 2018, 7: 95.

[7] Z. Li, X. Kong, J. Zhang, L. Shao, D. Zhang, J. Liu, X. Wang, W. Zhu, C. W. Qiu. Cryptography metasurface for one-time-pad encryption and massive data storage. Laser Photonics Rev., 2022, 16: 2200113.

[8] X. Guo, J. Zhong, B. Li, S. Qi, Y. Li, P. Li, D. Wen, S. Liu, B. Wei, J. Zhao. Full-color holographic display and encryption with full-polarization degree of freedom. Adv. Mater., 2022, 34: 2103192.

[9] H. Zhou, B. Sain, Y. Wang, C. Schlickriede, R. Zhao, X. Zhang, Q. Wei, X. Li, L. Huang, T. Zentgraf. Polarization-encrypted orbital angular momentum multiplexed metasurface holography. ACS Nano, 2020, 14: 5553.

[10] Z. Zhou, Y. Wang, C. Chen, R. Fu, Z. Guan, Z. Li, G. Zheng, S. Yu. Multifold integration of printed and holographic meta-image displays enabled by dual-degeneracy. Small, 2022, 18: 2106148.

[11] G. Zheng, H. Muhlenbernd, M. Kenney, G. Li, T. Zentgraf, S. Zhang. Metasurface holograms reaching 80% efficiency. Nat. Nanotechnol., 2015, 10: 308.

[12] N. A. Rubin, A. Zaidi, A. H. Dorrah, Z. Shi, F. Capasso. Jones matrix holography with metasurfaces. Sci. Adv., 2021, 7: eabg7488.

[13] Y. Hu, X. Ou, T. Zeng, J. Lai, J. Zhang, X. Li, X. Luo, L. Li, F. Fan, H. Duan. Electrically tunable multifunctional polarization-dependent metasurfaces integrated with liquid crystals in the visible region. Nano Lett., 2021, 21: 4554.

[14] H. Yang, K. Ou, H. Wan, Y. Hu, Z. Wei, H. Jia, X. Cheng, N. Liu, H. Duan. Metasurface-empowered optical cryptography. Mater. Today, 2023, 67: 424.

[15] L. Jin, Z. Dong, S. Mei, Y. F. Yu, Z. Wei, Z. Pan, S. D. Rezaei, X. Li, A. I. Kuznetsov, Y. S. Kivshar, J. K. W. Yang, C.-W. Qiu. Noninterleaved metasurface for (26−1) spin- and wavelength-encoded holograms. Nano Lett., 2018, 18: 8016.

[16] H. Zhou, X. Li, Z. Xu, X. Li, G. Geng, J. Li, Y. Wang, L. Huang. Correlated triple hybrid amplitude and phase holographic encryption based on a metasurface. Photonics Res., 2022, 10: 678.

[17] P. Zheng, Q. Dai, Z. Li, Z. Ye, J. Xiong, H. C. Liu, G. Zheng, S. Zhang. Metasurface-based key for computational imaging encryption. Sci. Adv., 2021, 7: eabg0363.

[18] P. Yu, J. Li, X. Li, G. Schutz, M. Hirscher, S. Zhang, N. Liu. Generation of switchable singular beams with dynamic metasurfaces. ACS Nano, 2019, 13: 7100.

[19] F. Wang, X. Zhang, R. Xiong, X. Ma, X. Jiang. Angular multiplexation of partial helical phase modes in orbital angular momentum holography. Opt. Express, 2022, 30: 11110.

[20] H. Ren, X. Fang, J. Jang, J. Burger, J. Rho, S. A. Maier. Complex-amplitude metasurface-based orbital angular momentum holography in momentum space. Nat. Nanotechnol., 2020, 15: 948.

[21] I. Kim, J. Jang, G. Kim, J. Lee, T. Badloe, J. Mun, J. Rho. Pixelated bifunctional metasurface-driven dynamic vectorial holographic color prints for photonic security platform. Nat. Commun., 2021, 12: 3614.

[22] J. P. Balthasar Mueller, N. A. Rubin, R. C. Devlin, B. Groever, F. Capasso. Metasurface polarization optics: independent phase control of arbitrary orthogonal states of polarization. Phys. Rev. Lett., 2017, 118: 113901.

[23] P. Georgi, Q. Wei, B. Sain, C. Schlickriede, Y. Wang, L. Huang, T. Zentgraf. Optical secret sharing with cascaded metasurface holography. Sci. Adv., 2021, 7: eabf9718.

[24] Q. Wei, L. Huang, R. Zhao, G. Geng, J. Li, X. Li, Y. Wang. Rotational multiplexing method based on cascaded metasurface holography. Adv. Opt. Mater., 2022, 10: 2102166.

[25] J. Wang, G. Zhu, W. Zhang, Z. Zhou, Z. Li, G. Zheng. Cascaded metasurface for separated information encryption. Chin. Opt. Lett., 2023, 21: 020003.

[26] L.-L. Ma, C.-Y. Li, J.-T. Pan, Y.-E. Ji, C. Jiang, R. Zheng, Z.-Y. Wang, Y. Wang, B.-X. Li, Y.-Q. Lu. Self-assembled liquid crystal architectures for soft matter photonics. Light Sci. Appl., 2022, 11: 270.

[27] H. K. Bisoyi, Q. Li. Liquid crystals: versatile self-organized smart soft materials. Chem. Rev., 2022, 122: 4887.

[28] L. L. Ma, C. Liu, S. B. Wu, P. Chen, Q. M. Chen, J. X. Qian, S. J. Ge, Y. H. Wu, W. Hu, Y. Q. Lu. Programmable self-propelling actuators enabled by a dynamic helical medium. Sci. Adv., 2021, 7: eabh3505.

[29] Z. Song, Z. Li, X. Shang, C. Li, L. Ma, Y. Lu, B. Li. Electrically switchable structural patterns and diffractions in a dual frequency nematic liquid crystal. Chin. Opt. Lett., 2023, 21: 010501.

[30] L. L. Ma, S. B. Wu, W. Hu, C. Liu, P. Chen, H. Qian, Y. Wang, L. Chi, Y. Q. Lu. Self-assembled asymmetric microlenses for four-dimensional visual imaging. ACS Nano, 2019, 13: 13709.

[31] C. T. Xu, D. W. Zhang, R. Yuan, Q. M. Chen, X. Liang, W. Hu. Optical orbital angular momentum processors with electrically tailored working bands. Laser Photonics Rev., 2023, 17: 2201013.

[32] X. Huang, D. Zhu, Z. Zhou, K. Chen, G. Zheng, P. Chen, Y.-Q. Lu, Z. Li. Tiger Amulet inspired high-security holographic encryption via liquid crystals. Nanophotonics, 2023, 12: 1787.

[33] P. Chen, Z. X. Shen, C. T. Xu, Y. H. Zhang, S. J. Ge, L. L. Ma, W. Hu, Y. Q. Lu. Simultaneous realization of dynamic and hybrid multiplexed holography via light-activated chiral superstructures. Laser Photonics Rev., 2022, 16: 2200011.

[34] S. J. Liu, L. Zhu, Y. H. Zhang, W. Chen, D. Zhu, P. Chen, Y. Q. Lu. bi-chiral nanostructures featuring dynamic optical rotatory dispersion for polychromatic light multiplexing. Adv. Mater., 2023, 35: 2301714.

[35] D. Tang, Z. Shao, Y. Zhou, Y. Lei, L. Chen, J. Xie, X. Zhang, X. Xie, F. Fan, L. Liao, S. Wen. Simultaneous surface display and holography enabled by flat liquid crystal elements. Laser Photonics Rev., 2022, 16: 2100491.

[36] X. Xie, W. Du, Z. Shao, Y. Zhou, Z. Lou, R. Ji, D. Wen, B. Wei, X. Gan, J. Zhao, F. Fan, D. Tang. Multichannel binary-image and holographic display based on planar liquid crystal devices. Laser Photonics Rev., 2023, 17: 2300193.

[37] G.-Y. Wang, C.-Y. Huang, H. Cao, C.-T. Xu, W. Hu. A tri-channel liquid crystal device for single-pixel-imaging encryption. Appl. Phys. Lett., 2023, 123: 091102.

[38] K. Chen, C. Xu, Z. Zhou, Z. Li, P. Chen, G. Zheng, W. Hu, Y. Lu. Multifunctional liquid crystal device for grayscale pattern display and holography with tunable spectral-response. Laser Photonics Rev., 2022, 16: 2100591.

[39] J. Xiong, Q. Yang, Y. Li, S. T. Wu. Holo-imprinting polarization optics with a reflective liquid crystal hologram template. Light Sci. Appl., 2022, 11: 54.

[40] W. Duan, L.-L. Ma, P. Chen, W. Hu, Q.-H. Wang, Y.-Q. Lu. Patterned optical anisotropic film for generation of non-diffracting vortex beams. Appl. Phys. Lett., 2022, 120: 031101.

[41] T. Zeng, J. Xie, Y. Zhou, F. Fan, S. Wen. Selectively reflective edge detection system based on cholesteric liquid crystal. Opt. Lett., 2023, 48: 795.

[42] J. Xiong, H. Zhong, D. Cheng, S.-T. Wu, Y. Wang. Full degree-of-freedom polarization hologram by freeform exposure and inkjet printing. PhotoniX, 2023, 4: 35.

[43] D. Xu, H. Yang, W. Xu, W. Zhang, K. Zeng, H. Luo. Inverse design of Pancharatnam–Berry phase metasurfaces for all-optical image edge detection. Appl. Phys. Lett., 2022, 120: 241101.

[44] H. Cao, G. Wang, L. Zhang, Q. Tan, W. Duan, W. Hu. Reflective optical vortex generators with ultrabroadband self-phase compensation. Adv. Photonics Nexus, 2023, 2: 026009.

[45] J. Pan, J. Qian, L. Ma, Z. Wang, R. Zheng, N. Wang, B. Li, Y. Lu. Dual photopatterning of rotational fingerprint superstructures. Chin. Opt. Lett., 2023, 21: 041603.

[46] L.-L. Ma, M.-J. Tang, W. Hu, Z.-Q. Cui, S.-J. Ge, P. Chen, L.-J. Chen, H. Qian, L.-F. Chi, Y.-Q. Lu. Smectic layer origami via preprogrammed photoalignment. Adv. Mater., 2017, 29: 1606671.

[47] Z. Yue, G. Xue, J. Liu, Y. Wang, M. Gu. Nanometric holograms based on a topological insulator material. Nat. Commun., 2017, 8: 15354.

Zeyu Wang, Han Zhang, Xiaoheng Liu, Yunjie Dou, Wei Duan, Wei Chen, Lingling Ma, Yanqing Lu. Cascaded liquid crystal holography for optical encryption[J]. Chinese Optics Letters, 2023, 21(12): 120003.

引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!