Tiger Amulet inspired high-security holographic encryption via liquid crystals

Author:

Huang Xianjing1,Zhu Dong2,Zhou Zhou1,Chen Kuixian1,Zheng Guoxing134ORCID,Chen Peng2ORCID,Lu Yan-Qing2,Li Zile13ORCID

Affiliation:

1. Electronic Information School , Wuhan University , Wuhan 430072 , China

2. National Laboratory of Solid State Microstructures, Key Laboratory of Intelligent Optical Sensing and Manipulation, and College of Engineering and Applied Sciences , Nanjing University , Nanjing 210023 , China

3. Peng Cheng Laboratory , Shenzhen 518055 , China

4. Wuhan Institute of Quantum Technology , Wuhan 430206 , China

Abstract

Abstract Due to the precise and continuous regulation of phase, holographic encryption based on metasurfaces and liquid crystals (LCs) has been proposed to encrypt the information by manipulating the wavelength, polarization, etc. However, the security cannot be fully guaranteed since the requirements of decoding methods for these schemes are generally not very strict and vulnerable for exhaustive attack. Furthermore, any part of the hologram stolen may lead to the disclosure of the hidden information regardless of the generation mode of phase delay or the selection of media material, so the security needs to be further improved. Here, inspired by Tiger Amulet, embodying the encryption consciousness of ancient China, we propose a simple but effective encryption method and design a “four-in-one” hologram based on photopatterned LCs. Specifically, the most important encrypted image can only be displayed when the four LC holograms in the same group are spliced into a whole according to the designed order. On the contrary, the camouflage information would be displayed if the holograms are placed in the optical path separately or spliced in wrong order. It is even more interesting that with the LC directors tilted with applied external voltages, the holographic efficiency of the LC hologram will change accordingly. This sets further demanding requirement on the decryption condition and thus increases the encryption security. With the advantages of simple design, high security, and low crosstalk, our encryption scheme has great potential in the fields of information hiding and image encryption.

Funder

Natural Science Foundation of Jiangsu Province

Innovation Program for Quantum Science and Technology

National Natural Science Foundation of China

Fundamental Research Funds for the Central Universities

Natural Science Foundation of Hubei Province

National Key R&D Program of China

Publisher

Walter de Gruyter GmbH

Subject

Electrical and Electronic Engineering,Atomic and Molecular Physics, and Optics,Electronic, Optical and Magnetic Materials,Biotechnology

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3