Chen ZK, Hong MH. All-optical vector visual cryptography with high security and rapid decryption. Opto-Electron Adv 6, 230073 (2023). doi: 10.29026/oea.2023.230073
Citation: Chen ZK, Hong MH. All-optical vector visual cryptography with high security and rapid decryption. Opto-Electron Adv 6, 230073 (2023). doi: 10.29026/oea.2023.230073

News & Views Open Access

All-optical vector visual cryptography with high security and rapid decryption

More Information
  • Meta optics-empowered vector visual cryptography at the abundant degrees of freedom of light and spatial dislocation can open an avenue for optical information security and anti-counterfeiting with a compact footprint and rapid decryption.
  • As the world increasingly goes digital, any part of the application that deals with e-commerce, banking, or finance requires the heaviest data security and encryption. Information security is of utmost importance in various applications, including anti-counterfeiting and communications. In the past decades, optical cryptography techniques have gained considerable attention due to their advantages of low-power consumption, high-speed parallel processing, and multi-dimensional capabilities1, 2 compared to their electrical counterparts. The new technology appearance of the optical cryptography, including optical watermarking3, steganography4, and visual cryptography5, 6 open up a gate for securing information. Current optical encryption strategies are difficult to be popularized, suffering from bulky system volume, relatively low-security level, redundant measurement, and/or requirement of digital decryption algorithms. The vast majority of meta-optics-based cryptography techniques can be potentially cracked by adjusting the polarization state of input and output light or illumination wavelength, leading to a limited security level7. Conventional approaches to enhance the security level are combining holographic cryptography with computational imaging8, significantly impeding the decryption speed and measurement convenience. The main bottleneck in this realm is to achieve high security and rapid decryption speed simultaneously. The spatially varied polarization property of vector light9, 10 is not fully exploited in optical cryptography. Therefore, it is crucial to develop new techniques that can fully exploit the degrees of freedom in light for optical cryptography without resorting to indirect imaging methods. Such techniques would enhance the security of optical cryptography while retaining the benefits of parallel processing, high-speed, and low-power consumption properties.

    In a recent paper published in Nature Communications11, Xiangang Luo and his team at Institute of Optics and Electronics, Chinese Academy of Sciences propose a new encryption and decryption method based on the vector optical imaging of a single meta-device, called vector visual cryptography, to solve the bottleneck problem in this realm, i.e., high security and rapid decryption speed can hardly be achieved simultaneously in an all-optical manner. The key physics behind is the custom-defined vectorial synthesis between the opposite spin components enabled by spin-decoupled metasurfaces, including the spin-division of a complex-amplitude optical ciphertext, single-to-dual or dual-to-single mapping, and complex interference with spatial dislocation. Consequently, the complex encryption process can be reversely decrypted via a compact meta-camera with an instantaneous measurement.

    Figure 1 demonstrates the concept of the meta-camera, including two elements. Pixel-wise spatial dislocation and overlap are generated between the two spin replicas of a ciphertext image via spin-decoupled dual-axis metalens. A vector sensor is used, including a vector polarization analyzer attached to a photodetector. The imaging mechanism of the decryption camera is equivalent to the reversal process of the coding procedure. The metalens separates any pixel to the vector coherent synthesis of RCP and LCP components at the overlapping region on the image plane under the illumination of linearly polarized light. Furthermore, the vector visual cryptography is demonstrated at the wavelength of 10.6 μm to prove the proposed concept. All-silicon nanopillars are arranged in a square lattice with the period and height being kept as meta-atoms, which are fabricated by direct laser writing. Optical ciphertexts with binary pure-amplitude, binary pure-phase, and grayscale complex-amplitude encryption are fabricated and also characterized. Optical ciphertext with arbitrary complex-amplitude distributions is also decrypted directly by the decryption meta-camera with proper design and a set of matched key parameters. Security of the vector visual cryptography is verified under different physical parameters. The decryption is failed when missing any of secret keys. Confidential information can only be retrieved with relatively high image fidelity in a small area. The hidden image can be reconstructed precisely at the center of the hot spots.

    Figure 1.  Schematics of a meta-optics-empowered decryption camera for vector visual cryptography11.

    The proposed vector visual cryptography is expected to find applications in optical information security and anti-counterfeiting with the advantages of a compact footprint, high-security level, and rapid decryption. It enhances a high-security level due to the abundance of key parameters, including wavelength, phase, amplitude, polarization, and spatial dislocation. These parameters make it difficult to decrypt the system by try-and-error attacks, significantly upgrading the security level compared to scalar visual cryptography and polarization multiplexed holography12. In addition, such an approach improves the decryption speed and measurement convenience significantly, which are of significance in the future development of optical security13. Its potential for all-optical image processing and intelligent recognition makes it a compelling solution that can be integrated into compact systems while maintaining high-security levels and real-time decryption.

  • The authors declare no competing financial interests.

  • [1] Georgi P, Wei QS, Sain B, Schlickriede C, Wang YT et al. Optical secret sharing with cascaded metasurface holography. Sci Adv 7, eabf9718 (2021). doi: 10.1126/sciadv.abf9718

    CrossRef Google Scholar

    [2] Gao H, Fan XH, Xiong W, Hong MH. Recent advances in optical dynamic meta-holography. Opto-Electron Adv 4, 210030 (2021). doi: 10.29026/oea.2021.210030

    CrossRef Google Scholar

    [3] Sui LS, Cheng Y, Tian AL, Asundi AK. An optical watermarking scheme with two-layer framework based on computational ghost imaging. Opt Lasers Eng 107, 38–45 (2018). doi: 10.1016/j.optlaseng.2018.03.005

    CrossRef Google Scholar

    [4] Cao Y, Tang LL, Li JQ, Lee C, Dong ZG. Multiplexing optical images for steganography by single metasurfaces. Small, 2206319 (2023). https://doi.org/10.1002/smll.202206319

    Google Scholar

    [5] Zheng PX, Li JX, Li ZL, Ge MZ, Zhang S et al. Compressive imaging encryption with secret sharing metasurfaces. Adv Opt Mater 10, 2200257 (2022). doi: 10.1002/adom.202200257

    CrossRef Google Scholar

    [6] Jiao SM, Feng J, Gao Y, Lei T, Yuan XC. Visual cryptography in single-pixel imaging. Opt Express 28, 7301–7313 (2020). doi: 10.1364/OE.383240

    CrossRef Google Scholar

    [7] Liu S, Guo CL, Sheridan JT. A review of optical image encryption techniques. Opt Laser Technol 57, 327–342 (2014). doi: 10.1016/j.optlastec.2013.05.023

    CrossRef Google Scholar

    [8] Anand V, Han ML, Maksimovic J, Ng SH, Katkus T et al. Single-shot mid-infrared incoherent holography using Lucy-Richardson-Rosen algorithm. Opto-Electron Sci 1, 210006 (2022). doi: 10.29026/oes.2022.210006

    CrossRef Google Scholar

    [9] Rubin NA, Shi ZJ, Capasso F. Polarization in diffractive optics and metasurfaces. Adv Opt Photonics 13, 836–970 (2021). doi: 10.1364/AOP.439986

    CrossRef Google Scholar

    [10] Ding F, Pors A, Bozhevolnyi SI. Gradient metasurfaces: a review of fundamentals and applications. Rep Prog Phys 81, 026401 (2018). doi: 10.1088/1361-6633/aa8732

    CrossRef Google Scholar

    [11] Zhang F, Guo YH, Pu MB, Chen LW, Xu MF et al. Meta-optics empowered vector visual cryptography for high security and rapid decryption. Nat Commun 14, 1946 (2023). doi: 10.1038/s41467-023-37510-z

    CrossRef Google Scholar

    [12] Wang JY, Tan XD, Qi PL, Wu CH, Huang L et al. Linear polarization holography. Opto-Electron Sci 1, 210009 (2022). doi: 10.29026/oes.2022.210009

    CrossRef Google Scholar

    [13] Liao MH, Zheng SS, Pan SX, Lu DJ, He WQ et al. Deep-learning-based ciphertext-only attack on optical double random phase encryption. Opto-Electron Adv 4, 200016 (2021). doi: 10.29026/oea.2021.200016

    CrossRef Google Scholar

  • Related articles

    Yonglei Liu, Siting Dai, Yimeng Zhu, Yahong Chen, Peipei Peng, Yangjian Cai, Fei Wang
    Opto-Electronic Advances    2025
    Ke Jiang, Simeng Liang, Xiaojuan Sun, Jianwei Ben, Liang Qu, Shanli Zhang, Yang Chen, Yucheng Zheng, Ke Lan, Dabing Li, Ke Xu
    Opto-Electronic Advances    2023, 6(9)   doi: 10.29026/oea.2023.230004
    Dingyu Xu, Wenhao Xu, Qiang Yang, Wenshuai Zhang, Shuangchun Wen, Hailu Luo
    Opto-Electronic Advances    2023, 6(12)   doi: 10.29026/oea.2023.230120
    Dingyu Xu, Wenhao Xu, Qiang Yang, Wenshuai Zhang, Shuangchun Wen, Hailu Luo
    Opto-Electronic Advances    2024, 7(4)   doi: 10.29026/oea.2024.230120C
    Jr-Hau He
    Opto-Electronic Advances    2023, 6(3)   doi: 10.29026/oea.2023.230022
    Yijia Huang, Tianxiao Xiao, Shuai Chen, Zhengwei Xie, Jie Zheng, Jianqi Zhu, Yarong Su, Weidong Chen, Ke Liu, Mingjun Tang, Peter Müller-Buschbaum, Ling Li
    Opto-Electronic Advances    2023, 6(7)   doi: 10.29026/oea.2023.220073
    Xingde Li
    Opto-Electronic Advances    2023, 6(7)   doi: 10.29026/oea.2023.230086
    Shoulin Jiang, Feifan Chen, Yan Zhao, Shoufei Gao, Yingying Wang, Hoi Lut Ho, Wei Jin
    Opto-Electronic Advances    2023, 6(5)   doi: 10.29026/oea.2023.220085
  • 1.  Xu, L., Wang, Q., Fu, X. et al. Optical Fabrication Technology Based on Vector Optical Field (Invited) | [基 于 矢 量 光 场 的 光 学 加 工 技 术(特 邀)]. Zhongguo Jiguang/Chinese Journal of Lasers, 2024, 51(12): 1202403.
    2.  Jiang, J., Fu, X., Yang, J. et al. Customizable Generation of Arbitrary-Order Polarization Vortices by Spin-Decoupled Geometric Phases. Laser and Photonics Reviews, 2024.
    3.  Zhang, J.C., Chen, M.K., Fan, Y. et al. Miniature tunable Airy beam optical meta-device. Opto-Electronic Advances, 2024, 7(2): 230171.
  • Created with Highcharts 5.0.7Amount of accessChart context menuAbstract Views, PDF Downloads StatisticsAbstract ViewsPDF Downloads2024-042024-052024-062024-072024-082024-092024-102024-112024-122025-012025-022025-03020406080Highcharts.com
    Created with Highcharts 5.0.7Chart context menuAccess Class DistributionFULLTEXT: 86.2 %FULLTEXT: 86.2 %PDF: 13.8 %PDF: 13.8 %FULLTEXTPDFHighcharts.com
    Created with Highcharts 5.0.7Chart context menuAccess Area DistributionOthers: 44.4 %Others: 44.4 %United States: 29.6 %United States: 29.6 %Russia: 15.7 %Russia: 15.7 %France: 2.6 %France: 2.6 %India: 2.1 %India: 2.1 %Germany: 1.1 %Germany: 1.1 %Canada: 0.9 %Canada: 0.9 %Singapore: 0.6 %Singapore: 0.6 %United Kingdom: 0.5 %United Kingdom: 0.5 %Brazil: 0.4 %Brazil: 0.4 %Portugal: 0.4 %Portugal: 0.4 %Japan: 0.2 %Japan: 0.2 %Switzerland: 0.2 %Switzerland: 0.2 %Malaysia: 0.2 %Malaysia: 0.2 %Sweden: 0.2 %Sweden: 0.2 %Poland: 0.2 %Poland: 0.2 %Slovakia: 0.2 %Slovakia: 0.2 %Austria: 0.1 %Austria: 0.1 %Hungary: 0.1 %Hungary: 0.1 %Ukraine: 0.1 %Ukraine: 0.1 %Turkey: 0.1 %Turkey: 0.1 %Norway: 0.1 %Norway: 0.1 %Denmark: 0.1 %Denmark: 0.1 %Italy: 0.1 %Italy: 0.1 %Australia: 0.1 %Australia: 0.1 %Netherlands: 0.1 %Netherlands: 0.1 %OthersUnited StatesRussiaFranceIndiaGermanyCanadaSingaporeUnited KingdomBrazilPortugalJapanSwitzerlandMalaysiaSwedenPolandSlovakiaAustriaHungaryUkraineTurkeyNorwayDenmarkItalyAustraliaNetherlandsHighcharts.com
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Figures(1)

Article Metrics

Article views() PDF downloads() Cited by(3)

Access History

Other Articles By Authors

Catalog

/

DownLoad:  Full-Size Img  PowerPoint