2023
DOI: 10.1021/acsphotonics.2c01943
|View full text |Cite
|
Sign up to set email alerts
|

Spatially Structured-Mode Multiplexing Holography for High-Capacity Security Encryption

Abstract: Holography has been widely used in optical displays, high-security optical encryption, and optical artificial intelligence. Optical multiplexing technologies by utilizing various dimensions of light effectively expand the information capacity and density for holography. In this work, we propose and experimentally demonstrate a novel spatially structured-mode multiplexing holography with the assistance of deep learning algorithms. In the experiment, we utilize Hermite−Gaussian (HG) and Laguerre−Gaussian (LG) mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 52 publications
0
7
0
Order By: Relevance
“…Specifically, neurons are connected to other neurons through a secondary wave that is modulated in amplitude or phase by input filed from the earlier layers and the local transmission coefficient. 55 Currently, the DNN has been intensively investigated in image recognition, 56 logic computing, 57 information encryption, 58 and other light applications. 59 Herein, we simulate a DNN to recognize lowcontrast images.…”
Section: Acsmentioning
confidence: 99%
“…Specifically, neurons are connected to other neurons through a secondary wave that is modulated in amplitude or phase by input filed from the earlier layers and the local transmission coefficient. 55 Currently, the DNN has been intensively investigated in image recognition, 56 logic computing, 57 information encryption, 58 and other light applications. 59 Herein, we simulate a DNN to recognize lowcontrast images.…”
Section: Acsmentioning
confidence: 99%
“…[18] Furthermore, these computational methods have made substantial contributions to optical information security by enhancing system security and increasing the flexibility of optical systems. [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38] Among these advancements, computational holography, particularly computer-generated hologram (CGH), has stood out for its remarkable capability to generate nearly arbitrary wavefronts. [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33] The simplicity of CGH's reconstruction process through optical diffraction or Fourier transform offers unique advantages in image encryption.…”
Section: Introductionmentioning
confidence: 99%
“…As another important property of light, the orbital angular momentum (OAM) modes carried by vortex beams (VBs) are widely used in various fields by virtue of the unique properties brought about by their wavefront structure 51 60 In terms of the combination of the normalD2NN with OAM modes, multiplexing/demultiplexing of OAM modes, 61 63 optical logic gates, 42 holography, 64 , 65 and spectral detection 66 have been reported in recent years. These works show the great potential of normalD2NN in handling complex OAM modes.…”
Section: Introductionmentioning
confidence: 99%