全息术
解码方法
计算机科学
声全息术
加密
传输(电信)
声学
传感器
脆弱性(计算)
图像质量
光学
图像(数学)
计算机视觉
电信
物理
计算机网络
计算机安全
作者
Xudong Fan,Yifan Zhu,Ning Li,Chunsheng Wang,Badreddine Assouar
出处
期刊:Physical review applied
[American Physical Society]
日期:2023-10-18
卷期号:20 (4)
标识
DOI:10.1103/physrevapplied.20.044048
摘要
We report on the theoretical, numerical, and experimental investigation of secure acoustic holography. This secure holography is achieved via an encoded hologram generated by a transducer array decoded by a transmissive acoustic metakey. An unreadable image is received if directly using the encoded hologram, while the desired image can be obtained only with the aid of a decoding metastructure, i.e., a correctly decoding metakey. The proposed metakey consists of a series of unit cells, each of them is composed of a straight channel decorated with several opening panels. By adjusting the opening size of unit cells within the metakey, its transmitted phase profile can be effectively controlled; hence, the desired decoding metakey can be successfully constructed. The patterns of a butterfly, sunglasses, and the letters NJUST are chosen as examples to demonstrate the performance of the secure acoustic holography. Vulnerability tests of the metakey further confirm the safety and reliability of secure acoustic holography. With the advantages of simple design, flexible functionality, and high quality for reconstructed images, our work opens an alternative avenue for acoustic holography and may find applications in secure acoustic communications based on holograms.
科研通智能强力驱动
Strongly Powered by AbleSci AI