| Literature DB >> 28913433 |
Hong-Chao Liu1, Biao Yang1, Qinghua Guo1,2, Jinhui Shi1,2,3, Chunying Guan1,3, Guoxing Zheng1,4, Holger Mühlenbernd5, Guixin Li1,6, Thomas Zentgraf5, Shuang Zhang1.
Abstract
Different optical imaging techniques are based on different characteristics of light. By controlling the abrupt phase discontinuities with different polarized incident light, a metasurface can host a phase-only and helicity-dependent hologram. In contrast, ghost imaging (GI) is an indirect imaging modality to retrieve the object information from the correlation of the light intensity fluctuations. We report single-pixel computational GI with a high-efficiency reflective metasurface in both simulations and experiments. Playing a fascinating role in switching the GI target with different polarized light, the metasurface hologram generates helicity-dependent reconstructed ghost images and successfully introduces an additional security lock in a proposed optical encryption scheme based on the GI. The robustness of our encryption scheme is further verified with the vulnerability test. Building the first bridge between the metasurface hologram and the GI, our work paves the way to integrate their applications in the fields of optical communications, imaging technology, and security.Entities:
Year: 2017 PMID: 28913433 PMCID: PMC5590780 DOI: 10.1126/sciadv.1701477
Source DB: PubMed Journal: Sci Adv ISSN: 2375-2548 Impact factor: 14.136
Fig. 1Experimental setup and metasurface structure.
(A) Schematic experimental setup of computational GI with reflective metasurface. (B) One-pixel cell structure of the metasurface. (C) Scanning electron microscopy image of the metasurface nanorod structure. (D) Schematic diagram of reflective metasurface hologram with LCP and RCP light.
Fig. 2Simulated and experimental results with different GI algorithms.
(A) Original image. (B) Experimental metasurface holographic image. (C) The intensity distribution of metasurface holographic image in 51 × 51 pixels. Simulated reconstructed image (51 × 51 pixels) from holographic image with different algorithms: (D) standard GI, (E) DGI, and (F) CGI. The sampling measurement is set to N = 51 × 51 = 2601 in the simulation. Experimentally reconstructed image with different algorithms: (G) GI, (H) DGI, and (I) CGI. The incident light is LCP, and the sampling measurement N is 668 in the experiment.
Fig. 3Experimentally recovered images (51 × 51 pixels) and their PSNR with CGI algorithm.
The polarization state of incident light is LCP in the first row and RCP in the second row. The sampling measurements were as follows: N = 200 in (A) and (E), N = 350 in (B) and (F), N = 500 in (C) and (G), and N = 650 in (D) and (H). (I) Experimental PSNR at different measurement N for both LCP and RCP cases.
Fig. 4Optical encryption proposal and its vulnerability test.
(A) Scheme of the optical encryption based on CGI with helicity-dependent metasurface hologram. All holographic and CGI recovered images come from the simulation with a 101 pixel × 101 pixel 1608 original image and measurement N = 8000. Experimentally reconstructed image with LCP light: (B) 15% key mismatch, (C) 30% key mismatch, and (D) 45% key mismatch. Their corresponding recovered hologram image with 0% key mismatch is Fig. 3C. Experimentally reconstructed image with different key ratios of LCP and RCP light: (E) 10% LCP versus 90% RCP, (F) 30% LCP versus 70% RCP, and (G) 50% LCP versus 50% RCP. The key numbers of RCP light in (E) to (G) are fixed at 500.