Acoustic metaholograms for encrypted information transmission

被引:5
|
作者
Fan, Xudong [1 ,2 ]
Zhu, Yifan [3 ]
Li, Ning [1 ]
Weng, Chunsheng [1 ]
Assouar, Badreddine [4 ]
机构
[1] Nanjing Univ Sci & Technol, Natl Key Lab Transient Phys, Nanjing 210094, Peoples R China
[2] Nanjing Univ, Key Lab Modern Acoust, MOE, Nanjing 210093, Peoples R China
[3] Southeast Univ, Sch Mech Engn, Jiangsu Key Lab Design & Manufacture Micronano Bio, Nanjing 211189, Peoples R China
[4] Univ Lorraine, Inst Jean Lamour, CNRS, F-54000 Nancy, France
基金
中国国家自然科学基金;
关键词
METASURFACE HOLOGRAMS;
D O I
10.1103/PhysRevApplied.20.044048
中图分类号
O59 [应用物理学];
学科分类号
摘要
We report on the theoretical, numerical, and experimental investigation of secure acoustic holography. This secure holography is achieved via an encoded hologram generated by a transducer array decoded by a transmissive acoustic metakey. An unreadable image is received if directly using the encoded hologram, while the desired image can be obtained only with the aid of a decoding metastructure, i.e., a correctly decoding metakey. The proposed metakey consists of a series of unit cells, each of them is composed of a straight channel decorated with several opening panels. By adjusting the opening size of unit cells within the metakey, its transmitted phase profile can be effectively controlled; hence, the desired decoding metakey can be successfully constructed. The patterns of a butterfly, sunglasses, and the letters NJUST are chosen as examples to demonstrate the performance of the secure acoustic holography. Vulnerability tests of the metakey further confirm the safety and reliability of secure acoustic holography. With the advantages of simple design, flexible functionality, and high quality for reconstructed images, our work opens an alternative avenue for acoustic holography and may find applications in secure acoustic communications based on holograms.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Transmission of Chaotically Encrypted Signals over an Optical Channel
    Lembrikov, B. I.
    Ben-Ezra, Y.
    Yurchenko, Yu.
    2014 16TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2014,
  • [42] WSN recruitments for encrypted medical image transmission securely
    Abdalla, Israa Hussain
    Yaser, Rusul Fadhil
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07): : 1981 - 1990
  • [43] Multi-Dimensional Information Encrypted Transmission and Efficient Decryption Using Power-Exponent Airy Vortex Beams
    Yu, Xinyang
    Fan, Junqiu
    Li, Xin
    Zhu, Huifeng
    Nie, Shouping
    Ma, Jun
    Yuan, Caojin
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2025, 43 (06) : 2535 - 2543
  • [44] Simultaneous distance measurement and information transmission in mobile environment using digital acoustic communication
    Wada, Kohei
    Ebihara, Tadashi
    Wakatsuki, Naoto
    Zempo, Keiichi
    Mizutani, Koichi
    JAPANESE JOURNAL OF APPLIED PHYSICS, 2023, 62 (SJ)
  • [45] Impact of acoustic similarity on efficiency of verbal information transmission via subtle prosodic cues
    Chen, Bohan
    Kitaoka, Norihide
    Takeda, Kazuya
    EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2016,
  • [46] Impact of acoustic similarity on efficiency of verbal information transmission via subtle prosodic cues
    Bohan Chen
    Norihide Kitaoka
    Kazuya Takeda
    EURASIP Journal on Audio, Speech, and Music Processing, 2016
  • [47] Radio-Acoustic Integrated Network for Ocean Information Transmission: Framework and Enabling Technologies
    Chen, Fangjiong
    Jiang, Zilong
    Ji, Fei
    Yu, Hua
    Guan, Quansheng
    Liu, Feng
    CHINA COMMUNICATIONS, 2021, 18 (09) : 62 - 70
  • [48] Radio-Acoustic Integrated Network for Ocean Information Transmission: Framework and Enabling Technologies
    Fangjiong Chen
    Zilong Jiang
    Fei Ji
    Hua Yu
    Quansheng Guan
    Feng Liu
    China Communications, 2021, 18 (09) : 62 - 70
  • [49] Analysis of information leakage from encrypted Skype conversations
    Benoît Dupasquier
    Stefan Burschka
    Kieran McLaughlin
    Sakir Sezer
    International Journal of Information Security, 2010, 9 : 313 - 325
  • [50] Information-flow control for programming on encrypted data
    Mitchell, John C.
    Sharma, Rahul
    Stefan, Deian
    Zimmerman, Joe
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 45 - 60