• Opto-Electronic Advances
  • Vol. 7, Issue 1, 230121 (2024)
Keyao Li1、2、†, Yiming Wang3、†, Dapu Pi1, Baoli Li1, Haitao Luan1, Xinyuan Fang1、*, Peng Chen3、**, Yanqing Lu3, and Min Gu1
Author Affiliations
  • 1Institute of Photonic Chips, University of Shanghai for Science and Technology, Shanghai 200093, China
  • 2Centre for Artificial-Intelligence Nanophotonics, School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
  • 3National Laboratory of Solid State Microstructures, and College of Engineering and Applied Sciences, Nanjing University, Nanjing 210093, China
  • show less
    DOI: 10.29026/oea.2024.230121 Cite this Article
    Keyao Li, Yiming Wang, Dapu Pi, Baoli Li, Haitao Luan, Xinyuan Fang, Peng Chen, Yanqing Lu, Min Gu. Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms[J]. Opto-Electronic Advances, 2024, 7(1): 230121 Copy Citation Text show less

    Abstract

    Secret sharing is a promising technology for information encryption by splitting the secret information into different shares. However, the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited. Herein, we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal (LC) holograms. The LC holograms are used as spatially separated shares to carry secret images. The polarization of the incident light and the distance between different shares are served as secret keys, which can significantly improve the information security and capacity. Besides, the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency, which further increases the information security. In implementation, an artificial neural network (ANN) model is developed to carefully design the phase distribution of each LC hologram. With the advantage of high security, high capacity and simple configuration, our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.

    Introduction

    Secret sharing distributes the secret image to different shareholders and decodes the secret images by conjoining sufficient shares together. It is considered as a trustworthy cryptographic method and has been widely used in the fields of privacy protection and intellectual property rights1, 2. Due to the parallel information processing ability and multi-dimensional multiplexing capability, optical encryption has attracted more attention in the last decade3-19. As an essential security element, optical holography, where the secret images are embedded into the pre-encoded phase-only holograms, is an effective way to realize optical secret sharing20-27. Nevertheless, the bulky optical components and limited modulation ability hinder optical holography to build up a compact and multifunctional secret sharing system28. To break these bottlenecks, cascaded metasurface has further been used for secret sharing. In this method, the secret information can only be decrypted when the metasurfaces are accurately combined, thus ensuring the security of the secret sharing system29-32. However, owing to the inherent limitations of metasurface, it is difficult to create secret sharing platforms massively with merit of dynamic tunability.

    Due to the multi-dimensional modulation capacity, voltage sensitivity and high diffraction efficiency, liquid crystals (LCs) with anisotropic molecule architectures have evolved as a promising candidate for information encryption33-37. For example, LC holograms based on chirality invertible superstructures have been proposed to enable a high-dimensional multiplexing information encryption platform38. However, so far, constrained by traditional algorithm, most LC holographic devices are one-layer configuration, which only allow for the access to different information channels, but not the physical segmenting of these information channels among different shareholders. In this context, cascaded LC holograms provide the possibility for the physical separation of the secret information and have great potential for creating a multi-dimensional multiplexing, dynamic adjustable and high diffraction efficiency secret sharing platform.

    In this work, we experimentally demonstrate a hybrid-multiplexing LC optical secret sharing framework. The secret information is decomposed and dispensed into two co-constrained LC holograms, each of which can reconstruct an authentication image in the specific location. Moreover, when these two LC holograms are stacked together, six independent new holographic images can be decrypted with different secret keys, including polarization of the incident light and the distance between the cascaded LC holograms. We utilize the ANN to complete the inverse deign of the sophisticated multi-confined and cascaded multilayer issues. This cascaded LC scheme breaks the limitations of traditional optical secret sharing, and blazes a trail in broad areas of optical visual cryptography, dynamic holographic display, and ultra-high-capacity information storage.

    Design principle

    The optical secret sharing framework based on the cascaded LC holograms is illustrated in Fig. 1(a). By optimizing the corresponding phase distribution of each LC hologram through ANN method, the incident light with specific polarization state is modulated by the cascaded LC holograms and the secret information is decrypted at the predetermined distance. The LC element consists of two indium-tin-oxide glass outside, two photoalignment layers inside and one nematic LC layer in the middle. The modulation function of the LC can be changed by setting different external voltages, as displayed in the zoom-in view in Fig. 1(a). If the incident light is left circular polarization (LCP), and only the LC hologram 1 is in the ‘on’ state (Uon), the authentication image ‘2’ will be decrypted at the predetermined location and recorded by the charge-coupled device (CCD). In this situation, the incident light is modulated only by LC hologram 1 and equivalent to directly passing through LC hologram 2 without phase modulation. When the working state of the two LC holograms is inverse, the authentication image ‘4’ will be decrypted at the same position. Keeping the position of LC hologram 1 unchanged and moving the LC hologram 2, six secret images will be decrypted when the corresponding polarized light and distance are used as the secret keys, as shown in Fig. 1(b). Specifically, the polarization state of incident light includes LCP and right circular polarization (RCP). In addition, the initial distance between the cascaded LC holograms is d1=4 cm, and the moving step length of the LC hologram 2 along the axial direction is 1.5 cm (d2=5.5 cm, d3=7 cm). The peak signal-to-noise ratio (PSNR) is adopted to evaluate the quality of the holographic reconstructed images. To obtain the value range of the distance with good effectiveness, the relationship of the average PSNR of the two circular-polarization-multiplexing images with the distance has been firstly analyzed (Fig. S1). In this way, the optical secret sharing framework with cascaded LC holograms can reconstruct eight different holographic images containing two authentication images and six secret images.

    Illustration diagram of the multi-dimensional multiplexing optical secret sharing framework based on the cascaded LC holograms. (a) A neural network is adapted to inversely design the phase distribution of the LC holograms and the secret images can be decrypted when the circular polarization light illuminates on the distance-adjustable cascaded LC holograms with appropriate external voltage. (b) The different secret keys and the corresponding decrypted holographic images.

    Figure 1.Illustration diagram of the multi-dimensional multiplexing optical secret sharing framework based on the cascaded LC holograms. (a) A neural network is adapted to inversely design the phase distribution of the LC holograms and the secret images can be decrypted when the circular polarization light illuminates on the distance-adjustable cascaded LC holograms with appropriate external voltage. (b) The different secret keys and the corresponding decrypted holographic images.

    According to the above-mentioned approach, we structure a neural network with multi-dimensional and co-constrained input fields as shown in Fig. 2. The polarization states of the incident light, the imposed external voltage and the moving distance between the two LC holograms are presumed as the input parameters. The angular spectrum diffraction theory builds up the full connection of all layers. The forward propagation model of the wavefronts in the free space after modulated by the layers can be described as

    Design principle of multi-dimensional multiplexing optical holographic secret sharing framework. The polarization states of the incident light, the imposed external voltage and the moving distance between the two LC holograms are the input parameters of the ANN model. The difference between the reconstructed images and the ideal images is defined as the loss function. Through the back-propagation optimization process, the phase distributions of the two LC holograms are calculated.

    Figure 2.Design principle of multi-dimensional multiplexing optical holographic secret sharing framework. The polarization states of the incident light, the imposed external voltage and the moving distance between the two LC holograms are the input parameters of the ANN model. The difference between the reconstructed images and the ideal images is defined as the loss function. Through the back-propagation optimization process, the phase distributions of the two LC holograms are calculated.

    E(x,y)=F1{F[ES(x,y)]Hd(u,v)},

    where F and F–1 denote the Fourier transform and the inverse Fourier transform, respectively. ES(x, y) represents the product of input field O(x0, y0) and the transmission coefficient of the neurons g(φs). The transfer function Hd (u, v) is expressed as

    Hd(u,v)=exp[ikd1λ2u2λ2v2],

    where u and v are spatial frequencies, and k = 2π/λ is the wave number. The distance between the cascaded LC holograms is d = d0+nΔd, where d0 is the initial distance between the cascaded LC holograms and Δd is the moving step length. According to the above framework, different input fields can be mapped to the corresponding secret image in the output plane by using the error back-propagation algorithm to update the learnable parameters g(φs). The aim of the error back-propagation algorithm is to minimize the loss function (mean squared error, MSE) between the actual and ideal output intensity distribution. The phase distribution of the LC holograms can be obtained when the loss function gradient with regard to phase distribution converges. Owing to the spin-orbital interplay of light in anisotropic medium, the consecutive phase modulation in LC through PB phase is feasible. In practice, all LC unit-cells possess orientation angle in the plane as well as out of plane, called LC director. The Pancharatnam–Berry (PB) phase modulation is twofold of the orientation angle in-plane of each unit-cell. In this way, different in-plane orientation angles ranged in (−90°, 90°) can correspondingly realize the PB phase modulation of (0, 2π).

    Results and discussion

    Through the effective and convenient network, the design of the multi-multiplexing optical holographic secret sharing framework based on the cascaded LC holograms can be accomplished. We verify the performance and practicality of the proposed secret sharing framework using the experimental equipment displayed in Fig. 3(a). In order to import and transmit the expected circular polarization state of the incident light, a linear polarizer (OPPF1-VIS, JCOPTIX, China) and a quarter-wave plate (TWP20Q, JCOPTIX, China) are placed in front of as well as behind the cascaded LC holograms as circular polarizer and analyzer. Two LC holograms are laid on two three-dimensional translation stages to achieve the precise alignment and moving step length, meanwhile the initial distance between the two LC holograms is set as 4 cm. All the decrypted holographic images are collected by a CCD in the same imaging plane and the wavelength of the illumination light is 633 nm (HNL20L, Thorlabs, America). Each LC hologram has an effective size of 2.12 mm×2.12 mm and contains 768×768 pixels. The zoom-in view of Fig. 3(a) individually shows the simulated phase distribution and the polarized micrograph of the fabricated LC hologram samples.

    The experimental setup and the diffraction efficiency of the LC holograms. (a) Optical setup for multi-multiplexing optical holographic secret sharing framework. The grayscale images in the top-left and bottom-right corner are the simulated phase distribution of share 1 and share 2. The reddish-brown images in the zoom-in view are the corresponding polarized micrograph of the fabricated LC holograms. Q-wave plate, quarter-wave plate. (b) The diffraction efficiency of the LC holograms with different external voltage.

    Figure 3.The experimental setup and the diffraction efficiency of the LC holograms. (a) Optical setup for multi-multiplexing optical holographic secret sharing framework. The grayscale images in the top-left and bottom-right corner are the simulated phase distribution of share 1 and share 2. The reddish-brown images in the zoom-in view are the corresponding polarized micrograph of the fabricated LC holograms. Q-wave plate, quarter-wave plate. (b) The diffraction efficiency of the LC holograms with different external voltage.

    In implementation, the anisotropy will alter when an external electric field is imposed to change the LC director from in-plane to out-of-plane. The variation of anisotropic refractive index bestowed the LC director with the ability of electrically adjustable phase retardation. Therefore, the diffraction efficiency can be dynamically controlled by imposing different external voltages. The tendencies of the diffraction efficiency versus voltage for two LC holograms at working wavelength of 633 nm are depicted in Fig. 3(b), respectively. The optimum on-state voltage for LC hologram 1 and LC hologram 2 is 5.4 V and 5.8 V respectively, and the corresponding diffraction efficiency can reach 61.5% and 62.4%. Nevertheless, the two LC holograms are off-state when the voltages are set as 3.6 V and 3.8 V, respectively. Here, the efficiency, or polarization conversion efficiency, at the activation voltage is determined by the diffraction efficiency of the phase pattern and the transmittance of the LC device. As such, the quality of holographic images from single LC hologram can be improved after selecting the appropriate polarization states. However, for secret sharing, the noise cannot be separated thoroughly from the final secret images through polarization filtering because the polarization states remain unchanged in the processes. Benefitting from the sensitivity of external voltage stimuli, LC holograms acquire the dynamic modulation ability, which provides the possibility to unlock information without detaching any shares and enables the optical secret sharing platform more compact and stable. According to above characteristics, we can conveniently acquire the authentication information and the secret images through the optical secret sharing framework by user-friendly adjusting the external voltage.

    Numerous encoding information can transmit in different users with high security through the optical secret sharing framework as displayed in Fig. 4. In the optical secret sharing framework, different secrets are shared and customized keys are assigned to two different users. By using the identity keys, user 1 and user 2 can acquire the authentication images ‘2’ and ‘4’, as shown in Fig. 4(a). Utilizing different operator keys from other information recipient, i.e., the different polarization states and separation distance of two LC samples, the operator images including multiplication (×), division (÷), exponentiation (∧), integer rounding (%), calculating residue (//) and radical sign (), can be experimentally reconstructed as shown in Fig. 4(b). Combining the authentication images with the operator images to carry out the second decryption, the eventual secret information is worked out. Here, the spatial position of the LC holograms along the propagation direction was adopted as the pre-negotiated calculation order of the secrets in our proposed scheme. The PSNR of experimental results in Fig. 4(b) can be calculated as 16.11 dB (‘2’), 16.77 dB (‘4’), 15.51 dB (‘×’), 15.8 dB (‘÷’), 15.06 dB (‘∧’), 13.58 dB (‘%’), 14.62 dB (‘//’), and 13.91 dB (‘’), which are close to the theoretical results in Fig. 2. To explain the insufficient image quality, the optimization process in our scheme can mathematically be seen as a multiple loss optimization problem, wherein the loss function is co-constrained by all the mean square error (MSE) for reconstructing multiple images (Supplementary Section 1). As such, the increase of the multiplexing images results in more MSE terms in loss functions, which can be physically interpreted as the noises (or crosstalk) which results in the decrease of the PSNR values (Fig. S2). Without losing generality, to analyze the pixel match problem, we have evaluated the effect of displacement in the x direction between two holograms as shown in the Fig. S3. To analyze the distance sensitivity, some deviation along the light propagation direction (Δd) has been added on the original location (Fig. S4). The deviation of the fast axis of the first QWP results in the elliptically-polarized incident beams. Here, the secret images reconstructed by different elliptically-polarized beams are given in Fig. S5 to illustrate the robustness.

    The experimental demonstration of the designed optical secret sharing framework. (a) The authentication images decrypted from user 1 and user 2. (b) The operator images decrypted by the secret keys and the final secret images retrieved from the second decryption.

    Figure 4.The experimental demonstration of the designed optical secret sharing framework. (a) The authentication images decrypted from user 1 and user 2. (b) The operator images decrypted by the secret keys and the final secret images retrieved from the second decryption.

    The proposed multi-dimensional multiplexing optical secret sharing framework allows for the simultaneous and ultra-high security transmission of multiple messages, which overcomes the drawbacks of traditional holographic encryption methods and has lots of superiorities than earlier solutions. Firstly, the secret images are hidden into different shares (LC holograms) and the terminal secret images can only be decrypted through the cascaded shares. Even if one of the shares is stolen, the secret image cannot be retrieved and only the authentication image as camouflage will be revealed, which greatly improves the security of the secret sharing platform. The crack difficulty of the framework was also analyzed when one hologram is fixed and the effective pixel number of the other hologram is ranging (Supplementary Section 2, Fig. S6). Secondly, the multi-dimensional multiplexing technique increases the complexity of secret key, which enhances the security and information capacity. Notably, the multiplexing information channels for encryption can be further increased by incorporating more secret shares (Supplementary Section 3, Fig. S7). Also, it is possible to utilize the linear polarization states to increase the information channels of this holographic secret sharing scheme. (Supplementary Section 4, Fig. S8). Thirdly, owing to the electrical adjustable ability of the LC device, the security of the proposed secret sharing framework can be further improved. The imposed external voltage can be mapped independently to the different secret shares, which sets more stringent conditions to decrypt the secret information and reduces the possibility of information disclosure. Notably, in comparison to the holographic secret schemes with metasurface holograms29, the unique advantages of LC devices, such as high diffraction efficiency, controllable efficiency, and low manufacturing cost, is more suitable for such secret sharing scheme with cascaded diffractive holograms. Considering current advanced technology in LC display industry, the mass manufacturing of this secret sharing platform could be feasible as well.

    Conclusions

    In this work, we propose and experimentally demonstrate the multi-dimensional multiplexing optical secret sharing framework with cascaded LC holograms. We create a dependable and practical neural network of error back-propagation based on the angular spectrum diffraction theory to design the framework. The multi-dimensional inputs of our network in the encryption process, such as polarization of light, distance between the LC holograms and the applied external electrical voltage, enhance the security of the secret information. The two authentication images and six operator images can be respectively decrypted if all the secret keys are correct, and the final secret information will be revealed through the second decoding. The full-fledged manufacturing technology of LC devices allows our proposal to be more practicable and versatile. Therefore, with merits of convenient design, extensive fabrication and outstanding security, the multi-dimensional multiplexing optical secret sharing framework has great potential to be used in information storage, dynamic display, and multi-functional optical information processing.

    References

    [1] A Shamir. How to share a secret. Commun ACM, 22, 612-613(1979).

    [2] GR Blakley. Safeguarding cryptographic keys. In 1979 International Workshop on Managing Requirements Knowledge, 313-318(1979). http://doi.org/10.1109/MARK.1979.8817296

    [3] GY Qu, WH Yang, QH Song et al. Reprogrammable meta-hologram for optical encryption. Nat Commun, 11, 5484(2020).

    [4] HR Ren, XY Fang, J Jang et al. Complex-amplitude metasurface-based orbital angular momentum holography in momentum space. Nat Nanotechnol, 15, 948-955(2020).

    [5] ZF Li, M Premaratne, WR Zhu. Advanced encryption method realized by secret shared phase encoding scheme using a multi-wavelength metasurface. Nanophotonics, 9, 3687-3696(2020).

    [6] XY Fang, HR Ren, M Gu. Orbital angular momentum holography for high-security encryption. Nat Photonics, 14, 102-108(2020).

    [7] H Yang, P He, K Ou et al. Angular momentum holography via a minimalist metasurface for optical nested encryption. Light Sci Appl, 12, 79(2023).

    [8] M Ouyang, HY Yu, DP Pan et al. Optical encryption in spatial frequencies of light fields with metasurfaces. Optica, 9, 1022-1028(2022).

    [9] XH Luo, YQ Hu, X Li et al. Integrated metasurfaces with microprints and helicity-multiplexed holograms for real-time optical encryption. Adv Opt Mater, 8, 1902020(2020).

    [10] XY Fang, HC Yang, WZ Yao et al. High-dimensional orbital angular momentum multiplexing nonlinear holography. Adv Photonics, 3, 015001(2021).

    [11] PX Zheng, Q Dai, ZL Li et al. Metasurface-based key for computational imaging encryption. Sci Adv, 7, eabg0363(2021).

    [12] YT Tang, Y Intaravanne, JH Deng et al. Nonlinear vectorial metasurface for optical encryption. Phys Rev Appl, 12, 024028(2019).

    [13] XY Fang, HR Ren, KY Li et al. Nanophotonic manipulation of optical angular momentum for high-dimensional information optics. Adv Opt Photonics, 13, 772-833(2021).

    [14] K Wang, J Liang, R Chen et al. Geometry-programmable perovskite microlaser patterns for two-dimensional optical encryption. Nano Lett, 21, 6792-6799(2021).

    [15] SM Jiao, Y Gao, T Lei et al. Known-plaintext attack to optical encryption systems with space and polarization encoding. Opt Express, 28, 8085-8097(2020).

    [16] WJ Meng, YL Hua, K Cheng et al. 100 Hertz frame-rate switching three-dimensional orbital angular momentum multiplexing holography via cross convolution. Opto-Electron Sci, 1, 220004(2022).

    [17] F Zhang, YH Guo, MB Pu et al. Meta-optics empowered vector visual cryptography for high security and rapid decryption. Nat Commun, 14, 1946(2023).

    [18] C Choi, SE Mun, J Sung et al. Hybrid state engineering of phase‐change metasurface for all‐optical cryptography. Adv Funct Mater, 31, 2007210(2021).

    [19] ZL Deng, QA Tu, YJ Wang et al. Vectorial compound metapixels for arbitrary nonorthogonal polarization steganography. Adv Mater, 33, 2103472(2021).

    [20] DJ Lu, MH Liao, WQ He et al. Experimental optical secret sharing via an iterative phase retrieval algorithm. Opt Lasers Eng, 126, 105904(2020).

    [21] XR Liu, XF Meng, YR Wang et al. Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography. Opt Lasers Eng, 137, 106370(2021).

    [22] SM Jiao, J Feng, Y Gao et al. Visual cryptography in single-pixel imaging. Opt Express, 28, 7301-7313(2020).

    [23] YS Shi, XB Yang. Optical hiding with visual cryptography. J Opt, 19, 115703(2017).

    [24] YB Dong, HT Luan, DJ Lin et al. Laser-induced graphene hologram reconfiguration for countersurveillance multisecret sharing. Laser Photonics Rev, 17, 2200805(2023).

    [25] BL Li, H Su, WJ Meng et al. Orbital angular momentum holographic multicasting for switchable and secure wireless optical communication links. Opt Express, 31, 23106-23114(2023).

    [26] DL Tang, ZL Shao, X Xie et al. Flat multifunctional liquid crystal elements through multi-dimensional information multiplexing. Opto-Electron Adv, 6, 220063(2023).

    [27] X Li, QM Chen, X Zhang et al. Time-sequential color code division multiplexing holographic display with metasurface. Opto-Electron Adv, 6, 220060(2023).

    [28] DP Pi, J Liu, YT Wang. Review of computer-generated hologram algorithms for color dynamic holographic three-dimensional display. Light Sci Appl, 11, 231(2022).

    [29] P Georgi, QS Wei, B Sain et al. Optical secret sharing with cascaded metasurface holography. Sci Adv, 7, eabf9718(2021).

    [30] QS Wei, LL Huang, RZ Zhao et al. Rotational multiplexing method based on cascaded metasurface holography. Adv Opt Mater, 10, 2102166(2022).

    [31] R Fu, KX Chen, ZL Li et al. Metasurface-based nanoprinting: principle, design and advances. Opto-Electron Sci, 1, 220011(2022).

    [32] H Zhao, XK Wang, ST Liu et al. Highly efficient vectorial field manipulation using a transmitted tri-layer metasurface in the terahertz band. Opto-Electron Adv, 6, 220012(2023).

    [33] P Chen, BY Wei, W Hu et al. Liquid‐crystal‐mediated geometric phase: from transmissive to broadband reflective planar optics. Adv Mater, 32, 1903665(2020).

    [34] SJ Liu, L Zhu, YH Zhang et al. Bi‐chiral nanostructures featuring dynamic optical rotatory dispersion for polychromatic light multiplexing. Adv Mater, 35, 2301714(2023).

    [35] L Zhu, CT Xu, P Chen et al. Pancharatnam–Berry phase reversal via opposite-chirality-coexisted superstructures. Light Sci Appl, 11, 135(2022).

    [36] P Chen, LL Ma, W Hu et al. Chirality invertible superstructure mediated active planar optics. Nat Commun, 10, 2518(2019).

    [37] KX Chen, CT Xu, Z Zhou et al. Multifunctional liquid crystal device for grayscale pattern display and holography with tunable spectral‐response. Laser Photonics Rev, 16, 2100591(2022).

    [38] P Chen, ZX Shen, CT Xu et al. Simultaneous realization of dynamic and hybrid multiplexed holography via light-activated chiral superstructures. Laser Photonics Rev, 16, 2200011(2022).

    Keyao Li, Yiming Wang, Dapu Pi, Baoli Li, Haitao Luan, Xinyuan Fang, Peng Chen, Yanqing Lu, Min Gu. Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms[J]. Opto-Electronic Advances, 2024, 7(1): 230121
    Download Citation