2019
DOI: 10.1364/oe.27.019212
|View full text |Cite
|
Sign up to set email alerts
|

Efficient dielectric metasurface hologram for visual-cryptographic image hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 22 publications
0
21
0
Order By: Relevance
“…Nanopost meta‐atoms (NPMs) can be components of meta‐holograms 71 . NPMs can modulate a phase of the propagating light depending on the size of diameters 72–82 .…”
Section: Effects Of Meta‐atom On Hologram Characteristicsmentioning
confidence: 99%
“…Nanopost meta‐atoms (NPMs) can be components of meta‐holograms 71 . NPMs can modulate a phase of the propagating light depending on the size of diameters 72–82 .…”
Section: Effects Of Meta‐atom On Hologram Characteristicsmentioning
confidence: 99%
“…Since visual cryptography (VC) was developed (Naor and Shamir, 1995), there are many relevant studies for its applications. The VC offers a feasible and straightforward solution for the decryption of secret information based on human vision (Naor and Shamir, 1995;Blundo et al, 2000;Hou, 2003;Wan et al, 2018;Yang et al, 2018;Jiao et al, 2019;Li et al, 2019;Jiao et al, 2020). The first visual cryptographic technique was proposed by Naor and Shamir in 1995, which broke up a secret image into multiple shares (i.e., visual key images) (Naor and Shamir, 1995).…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, visual key images can be further designed using quick response patterns or phase holograms (Wan et al, 2018;Jiao et al, 2020). The visual key images are printed onto holographic optical elements (HOEs) or metasurface, and then the secret images can be visually decoded when these visual key images are overlapped (Yang et al, 2018;Li et al, 2019). Although VC scheme provides an effective way to realize encryption by using pixel expansion rule and decode the secret information based on human vision, conventional VC techniques could have some disadvantages.…”
Section: Introductionmentioning
confidence: 99%
“…Zhao et al implemented the rod slot antennas and C-shaped slot antennas are used as building blocks to achieve multi-image hiding and seeking with polarization control in the terahertz band in 2019 [22]. Li et al hided the encrypted images in two metasurfaces respectively, and superimposed the reconstructed holograms by optical method to realize the reproduction of the target image [23]. Both of the methods use static metasurfaces for achieving hidden encryption of information, thus we would like to extend metasurfaces to a tunable one for information encryption and hiding, which can enhance the diversity of information hiding methods and greatly enhance the security level of information [24].…”
Section: Introductionmentioning
confidence: 99%