Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2021 May 21;7(21):eabg0363.
doi: 10.1126/sciadv.abg0363. Print 2021 May.

Metasurface-based key for computational imaging encryption

Affiliations

Metasurface-based key for computational imaging encryption

Peixia Zheng et al. Sci Adv. .

Abstract

Optical metasurfaces can offer high-quality multichannel displays by modulating different degrees of freedom of light, demonstrating great potential in the next generation of optical encryption and anti-counterfeiting. Different from the direct imaging modality of metasurfaces, single-pixel imaging (SPI) as a typical computational imaging technique obtains the object image from a decryption-like computational process. Here, we propose an optical encryption scheme by introducing metasurface-images (meta-images) into the encoding and decoding processes as the keys of SPI encryption. Different high-quality meta-images generated by a dual-channel Malus metasurface play the role of keys to encode multiple target images and retrieve them following the principle of SPI. Our work eliminates the conventional digital transmission process of keys in SPI encryption, enables the reusability of a single metasurface in different encryption processes, and thereby paves the way toward a high-security optical encryption between direct and indirect imaging methods.

PubMed Disclaimer

Figures

Fig. 1
Fig. 1. Decryption of different images with a dual-channel Malus metasurface as the keys.
Three meta-images can be achieved by adjusting the polarization directions of the bulk-optic polarizer and the analyzer (Channel 1: α1 = 22.5° and α2 = 67.5°; Channel 2: α1 = −22.5° and α2 = 22.5°; Hybrid channel: α1 = −15° and α2 = 60°). Serving as meta-keys, three meta-images are used together to obtain different cipher images and further fulfill the decoding process based on the SPI principle. Photo credit: Peixia Zheng, University of Macau.
Fig. 2
Fig. 2. Design principle and experimental results of the dual-channel meta-image display.
(A) Unit-cell structure. The designed silver nanobrick has dimensions of length L = 160 nm, width W = 80 nm, height H = 70 nm, and cell size C = 300 nm. (B) Simulated reflectivities (Rl, Rs) and transmissivities (Tl, Ts) under linearly polarized incident light polarized along the long (l) and short axes (s) of the nanobrick, respectively. (C) Calculated transmitted intensity under channels 1 and 2. The black dots indicate the four orientation candidates and their binary intensity code states. (D) Partial SEM photos of the fabricated sample. Scale bar, 500 nm. (E) Illustration of recording two different binary patterns into the same nanobrick arrays shown in (D). (F) Experimentally captured meta-images under four different cases. Channel 1: α1 = 22.5° and α2 = 67.5°; Channel 2: α1 = −22.5° and α2 = 22.5°; Hybrid channel: α1 = −15° and α2 = 60°; Unpolarized: without polarizer and analyzer. Scale bars of 20 μm are shown in all meta-images.
Fig. 3
Fig. 3. Encryption process with meta-images as the key.
The blue area shows the transformation from meta-image 3 into a ternary matrix. The pink area indicates the matrix encoding flow with different matrix operations (i.e., Left-shift and Up-shift). The yellow area is the schematic of the SPI encryption and the least significant bit (LSB) steganography. Target image 1 (Baboon) is from the University of Southern California–Signal and Image Processing (USC-SIPI) Image Database. Cover image is from Peixia Zheng, University of Macau.
Fig. 4
Fig. 4. Scheme of the decryption processes with meta-images as the key.
The red box shows the retrieval of cipher images from meta-image 1. The blue box shows the retrieval of keys with meta-image 2 containing the matrix operations and together with meta-image 3 providing the transformation matrix. Photo credit: Peixia Zheng, University of Macau.
Fig. 5
Fig. 5. Error tolerance study of the decryption processes with correct keys.
The left box shows two recovered images with different error ratios using the compressed sensing TV regularization recovery algorithm. The right box shows recovered images from conventional second-order CF method. The first row shows the recognized images (57 pixels × 57 pixels) from meta-image 3 with different error ratios. Three-valued errors are applied to random pixel in the recognized images, where the white, green, and blue dots represent the error value 2, 1, and 0, respectively. Photo credit: Peixia Zheng, University of Macau.

References

    1. Liu Y., Zhang X., Metamaterials: A new frontier of science and technology. Chem. Soc. Rev. 40, 2494–2507 (2011). - PubMed
    1. Genevet P., Capasso F., Holographic optical metasurfaces: A review of current progress. Rep. Prog. Phys. 78, 024401 (2015). - PubMed
    1. Zhang L., Mei S., Huang K., Qiu C. -W., Advances in full control of electromagnetic waves with metasurfaces. Adv. Opt. Mater. 4, 818–833 (2016).
    1. Chen H. -T., Taylor A. J., Yu N., A review of metasurfaces: Physics and applications. Rep. Prog. Phys. 79, 076401 (2016). - PubMed
    1. Ding F., Pors A., Bozhevolnyi S. I., Gradient metasurfaces: A review of fundamentals and applications. Rep. Prog. Phys. 81, 026401 (2017). - PubMed

LinkOut - more resources