Abstract
Metasurfaces have attracted considerable interest in optical encryption due to their remarkable ability to manipulate light at subwavelength scales, however the aspect of encryption security remains an area requiring deeper exploration. Here, we propose and demonstrate metasurface-enabled optical encryption and steganography that provides dual-layer information protection. A secret information is embedded within multiple carrier images using a run-length encoding algorithm, dispersing the data to safeguard it against direct observation and brute-force attacks, thereby establishing the first layer of security. The second layer is achieved by encoding the multiple carrier images onto a silicon metasurface, leveraging light wavelength and polarization to generate diverse optical keys post-steganography. To validate the proposed scheme, several silicon metasurface samples are fabricated and characterized in the visible spectrum. By adjusting various combinations of optical keys, three encrypted carrier images are retrieved with high fidelity and negligible crosstalk, and the concealed secret information is successfully extracted through a corresponding decryption algorithm. The proposed approach enhances optical information security at the hardware level, making it less susceptible to leakage. It is anticipated that the demonstrated advancement will hold significant potential for applications in information security and optical anti-counterfeiting.
1 Introduction
Nowadays, information security is of great importance in every aspect of life. Various encryption technologies have emerged to prevent information from being stolen. Among them, optical encryption, with its unique advantages, utilizes transformations such as light interference, diffraction, and imaging to convert plaintext into complex and difficult-to-decipher optical signals, providing an efficient and reliable way for the encryption and processing of highly secure information [1], [2], [3]. With the development of new optical devices, the emergence of metasurfaces has injected new vitality into the field of modern optical encryption. Metasurfaces are artificially designed two-dimensional optical metamaterials, typically composed of arrays of nanostructures (meta-atoms) with customized shapes and subwavelength feature sizes. Due to its unprecedented manipulation capabilities over degrees of freedom (DoFs) including polarization, amplitude, phase, and orbital angular momentum of light at the sub-wavelength scale [4], [5], [6], [7], [8], [9], [10], metasurface has been successfully applied in the realization of various compact and miniaturized planar functional devices, enabling numerous applications such as hologram display [11], [12], [13], polarization conversion [14], [15], [16], [17], optical cloaking [18], [19], light focusing [20], [21], and vortex beams [22], dynamic modulation devices [23], [24], computation [25], [26], [27], and biological imaging [28], [29].
In recent years, metasurfaces have also been widely used to explore novel optical encryption by manipulating different DoFs of optical fields [30], [31], [32], [33], [34], [35], [36]. Apart from the utilization of a single DoF of light, metasurfaces have also been designed to achieve advanced optical encryption by manipulating combinations of two or more DoFs of light, aiming to increase the difficulty of information being accessed and stolen [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50]. Nevertheless, the information security cannot be guaranteed as the encrypted information can be directly observed once the optical key of the metasurface is stolen or subjected to brute force attacks by specific key exhaustive algorithms. Recent studies have shown that by integrating cryptographic encryption algorithms into the field of metasurface optical encryption [51], [52], [53], plaintext that is easy to be directly seen can be further transformed into incomprehensible pseudo-random ciphertext that can only be indirectly observed in specific ways. For example, common technologies such as visual secret sharing [54], computational ghost imaging [55], and one-time-pad [56] have been applied in optical encryption by taking advantage of the multidimensional manipulation of light DoFs of a metasurface. Even though these encryption schemes have improved the security level, the presence of pseudo-random ciphertext may arouse suspicion from eavesdroppers, leading to further scrutiny and attempts of decryption. Steganography, as a complementary information hiding technology with cryptography, shows prominent advantages in terms of optical encryption. Different from cryptography which mainly focuses on encryption and decryption, steganography emphasizes embedding secret information into seemingly harmless carriers through various media such as images, texts, and videos, thereby achieving the secure data transmission without arousing public suspicion [57], [58], [59], [60]. It is conceivable that applying steganography to metasurface optical encryption may open a new information protection strategy with significantly enhanced security performance. In this strategy, the carrier information will become pseudo-information with certain deceptive effect, making it difficult for unanticipated recipients to notice and extract the real information from it and effectively avoiding the risk of information leakage caused by scrutiny. Unfortunately, the importance of steganography has been underestimated and overlooked, and so far, this strategy that can both confuse eavesdroppers and ensure the secure transmission of information has not yet been reported in metasurface-based optical encryption.
In this work, we propose a metasurface-enabled optical encryption steganography design scheme by combining steganography and optical encryption, aiming to achieve twofold protection of information security. As the first security barrier, a steganography algorithm based on run-length encoding (RLE) is utilized to dispersedly embed the secret information into multiple carrier images. This results in observers only being able to visually perceive the surface information presented in the carrier images, thereby protecting the secret information from direct observation. The multiple carrier images after steganography are further encoded into the multiplexed metasurface for encryption. The final transmitted information can only be extracted by decrypting the optical images hidden in all the channels. As the second security barrier, different keys are deliberately induced for decrypting the optical images hidden in the metasurface. To maximize the differentiation of keys for each encrypted image, various optical parameters are introduced, ensuring that the keys for different images have significant differences in levels. The scheme is specifically validated by a wavelength and polarization multiplexing metasurface, and the process of decrypting and extracting the real information from multiple images is schematically shown in Figure 1, where three binary images can be decrypted from the metasurface by adjusting different key combinations of light wavelength and polarization. Specific algorithms are further used to extract and recover the secret information hidden in multiple images. The proposed scheme is successfully validated through a dual-wavelength and three-channel silicon metasurface, both numerically and experimentally. Our work realizes the integration of steganography with optical encryption on a physical hardware level, which provides an interesting approach for information encryption or hiding and will be of interest in fields of information security and optical anticounterfeiting.

A schematic of the proposed concept of metasurface-enabled optical encryption steganography for information security enhancement. Three binary images are encoded in a single-layer metasurface in different light wavelength and polarization channels. By jointly processing the three images with a certain algorithm, the secret information can be extracted.
2 Results and discussion
2.1 Optical encryption metasurface with wavelength and polarization multiplexing
As the first step, to achieve independent encoding of three images at different security levels on a single platform, a metasurface with wavelength- and polarization-selective amplitude manipulation ability is proposed. The metasurface unit cell is composed of a nanopillar placed on top of a SiO2 substrate. The nanopillar is made of hydrogenated amorphous silicon (a-Si:H) considering its high refractive index and low absorption at the selected two operating wavelengths, λ 1 = 633 nm and λ 2 = 750 nm. Specifically, two nanopillars with distinct geometric sizes are incorporated for subsequent implementation of the optical encryption and steganography. The two nanopillars are anticipated to concurrently function as the linear polarizer at wavelength λ 1, while they respectively exhibit polarization-independent high transmission and reflection at wavelength λ 2 [48]. For convenience, hereafter the two nanopillars are named as PT and PR, respectively, where the first letter “P” indicates the polarizer function at λ 1, while the second letter “T” and “R” represent the high transmission and high reflection at λ 2, respectively, guaranteeing polarization-independent high transmission difference at λ 2. Numerical simulations based on the finite-difference time-domain method are conducted to find the proper nanopillars that meet our requirements and detailed simulation results can be found in Section S1 in Supplementary Material. As shown in Figure 2a, the specific periodicity of the metasurface unit cell (C) is 320 nm. Both PT and PR are designed to be 220 nm in thickness, while their geometric sizes (L 1, W 1) and (L 2, W 2) are (60 nm, 130 nm) and (140 nm, 225 nm), respectively. For realizing the three-channel binary images, the rotation angle (α) of PT and PR become critical. Since PT and PR both exhibit different geometric sizes along their own two axes, they will exhibit diverse polarization-dependent transmission spectra in principle. Figure 2b and c respectively display the simulated transmission spectra (400–800 nm) of the non-rotated PT and PR under incidence of x-polarization (XLP) and y-polarization (YLP). At the wavelength of 633 nm, the maximum transmission efficiencies of the PT and PR are 95 % and 83 %, respectively, with the transmission differences between XLP and YLP for PT and PR being approximately 87 % and 75 %. At the wavelength of 750 nm, the transmission efficiencies under XLP and YLP incidences are both above 94 % for PT, while they are below 2 % for the PR. Note that the transmission efficiencies shown in Figure S1 in Supplementary Material, in the regions surrounding the selected PT and PR, are similar, indicating that slight variations in structural dimensions will not significantly impact the desired metasurface functionalities and the quality of the meta-images, thereby ensuring that the proposed scheme remains robust against structural inaccuracies. Given a fixed incidence polarization, the output light intensity from a nano-polarizer can be modulated by altering its orientation angle, which is mathematically described below. It is known that the Jones matrix Mα of a nanopillar with an in-plane orientation angle of α can be expressed as:
where R(α) is the rotation matrix, M0 denotes the Jones matrix of an ideal nanopillar without cross-polarization components, and A and B are the complex transmission (or reflection) coefficients of light polarized along the x- and y-axis, respectively. In addition to the nanopillar, a polarizer and an analyzer are also employed to select the polarization component of the incident and transmitted light in our design. Upon incidence of a linearly polarized light (Jones vector J0) with polarization angle θ1, the light transmitting through the metasurface (Mα) and passing through the analyzer (Mθ) can be finally expressed as:
where Mθ is the Jones matrix of the analyzer, θ1 and θ2 are the transmission axis directions of the polarizer and analyzer, respectively. Given that the intensity of the linearly polarized light after the polarizer is I0, the output light passing through the final analyzer is (see more details in Section S2 in Supplementary Material):

Numerical simulation results of the selected nanostructures featuring three-channel binary encoding capability. (a) Schematic diagram of the metasurface unit cells of PT and PR. Simulated polarized transmission spectra of the non-rotated (b) PT and (c) PR. Simulated transmission as a function of the orientation angles of (d) PT and (e) PR in Channel 1 and Channel 2 at the wavelength of 633 nm. (f) Theoretical transmission as a function of the ideal polarizer orientation angle in Channel 1 and Channel 2, with dashed lines indicating the four selected orientation angles for realizing 2-bit binary intensity encoding. (g) Simulated total transmission of the TP and TR with different nanopillar orientation angles at wavelength of 750 nm. (h) Illustration of recording three-channel binary intensity encoding states into two types of nanopillars with different orientation angles.
For an ideal polarizer (i.e., A = 1, B = 0), Equation (3) can be simplified to:
The above equation clearly shows that the output light intensity can be customized by α, θ1 and θ2. Furthermore, a 2-bit or dual-channel binary intensity design can be readily achieved by elaborately selecting two non-orthogonal polarized light paths. As an example, channel 1 is set to θ1 = 30° and θ2 = 75°, and θ1 = −15° and θ2 = 30° for channel 2. The transmission of PT and PR under the above two channels are respectively simulated as a function of their orientation angles for wavelength of 633 nm, as depicted in Figure 2d and e. Figure 2f further presents the theoretical dual-channel transmission intensity distributions to intuitively compare the intensity tuning performance of the designed nano-polarizers and the ideal polarizers, where a good agreement can be found between them. Subsequently, four orientation angles (30°, 75°, 120° and 165°) with high and/or low transmission at the two channels, corresponding to four different binary coding states of “11”, “10”, “00”, and “01”, are selected for later use of encoding two binary images. For wavelength of 750 nm, the total transmission of PT (PR) maintains stably at a high (low) level with respect to different orientation angles as witnessed in Figure 2g. This feature (transmission intensities invariant to orientation angle and incidence polarization) further enables another 1-bit encoding of the light intensity (PT as “1” and PR as “0”). Accordingly, a third binary image that is only related to the nanopillar size can be designed at this wavelength (defined as channel 3). In short, the binary image in channel 3 determines which type of nanopillar is needed, while the other two binary images in channel 1 and channel 2 govern the orientation angle of the nanopillar. Figure 2h shows a schematic of how the three-channel light intensity distributions are affected by the arrangement of the nanopillars. It should be noted that such three-channel binary intensity encoding method is only valid in a relatively narrower wavelength range. A discussion on the operation wavelength range of the proposed metasurface can be found in Section S3 in Supplementary Material.
2.2 Secret information embedding process based on multi-carrier steganography algorithm
Based on the selected PT and PR and the abovementioned design principles, it is feasible to encode three images into a single-layer metasurface, providing an optical encryption barrier for the carrier image after steganography. Moreover, as a proof of concept for multi-carrier steganography, the steganography algorithm of RLE which resorts to the parity of optical image pixels to embed more confidential secret information on top of the optical encryption level, is further introduced and the process is illustrated in Figure 3. The RLE is considered a popular compression technique [61], [62]. In RLE, when characters in a string appear consecutively, they are replaced by the number of times they occur, which is referred to as the run-length value. Since binary images contain numerous consecutive identical blocks of black and white pixels, they can also be processed by RLE. We select two carrier images (image 1: cartoon animal; image 2: cartoon girl) with 50 × 50 pixels each, and encode their pixels using RLE, as shown by the dashed blue box in Figure 3. For carrier image 1, it can be considered as a 50 × 50 matrix, where white pixels are represented as 1 and black pixels 0. Then, it can be scanned column-by-column to transform the dimensions into a consecutive 01 sequence. Subsequently, the 01 sequence is processed through RLE, whereby consecutive black and white pixels are replaced with their respective counts of occurrences. All the run-length values after encoding form a run-length sequence (named as L1), whose length is denoted as Length (L1). Based on our selected carrier image 1, the first run-length value in the sequence is 215, indicating 215 consecutive occurrences of 1, corresponding to 215 consecutive white pixels. Similarly, the sequence formed by encoding carrier image 2 using RLE is named as L2, and its length is Length (L2).

Process of embedding a secret information in multiple carrier images. The dashed blue box indicates the RLE process for encoding the carrier images. The orange box represents the pre-processing the secret information. The red box illustrates the process of embedding the information into multiple carrier images according to algorithm.
As the carrier images are binary images, any information to be embedded within them needs to be converted into a binary sequence. In our design, a 14 × 14 pixels binary image displaying the content “META” is our final transmitted secret information for hiding. Due to the presence of consecutive identical pixels in the secret information, a logistic map is used to generate a chaotic iterative sequence with non-periodic and non-convergence properties for scrambling preprocessing to avoid regularity and further enhance the security of the information, with the expression as follows:
where xn represents the state value at the n-th iteration (xn ∈ (0,1)), xn+1 is the next state value of xn, and μ is the control parameter (μ ∈ (0,4)) [51], [61], [63]. When μ is closer to 4, the generated iterative sequence has the chaotic properties described above and can be used to realize information encryption. Since the domain of the resulting iterative sequence lies within [0, 1], the threshold is defined as the initial value x0 of the logistic map to construct a 14 × 14 binary matrix for an exclusive OR (XOR) operation with the secret information. Then, the 01 sequence (Pixel) to be embedded can be obtained by scanning the scrambled secret information column by column, as depicted by the orange box in Figure 3. Next, according to certain algorithmic rules, the information from the sequence is dispersedly embedded bitwise into L1 and L2, as shown by the red box in Figure 3 (D represents the position of each binary number in the sequence Pixel). During embedding, the run-length values in L1 and L2 corresponding to the same even position (run-length values of black pixel) are first detected. When the embedding information bit is 0, the larger value of the two values is modified (minus 1) to ensure they have the same parity. Conversely, when the information bit is 1, similar modifications are made to make them have different parity (if the two run-length values have the same size at this point, the modification is made to one of the two sequences). When the embedding position in the run-length sequence exceeds the length of L1 (L2), the remaining information is embedded solely in L2 (L1). In this case, if the information bit is 0, run-length value at the corresponding position in L2 (L1) is modified to ensure it becomes even; conversely, it is modified to become odd. When the parity matches the value to be embedded, no modification is made. It is worth noting that when a run-length value is modified, the modification is made to the last bit of the consecutive identical binary number in its unencoded state, changing it from 0 to 1, corresponding to changing the pixel from black to white in the carrier image. Following the above rules, the secret information can be successfully embedded into two run-length sequences, and the sequences after embedding the information are named as L# 1 and L# 2, respectively. Then, the inverse process of RLE is performed on each sequence, decoding the run-length values to recover consecutive black and white pixels, thereby reconstructing two carrier images with hidden information, each of which is 50 × 50 pixels. Meanwhile, a string of “0.4214” is encoded into a QR code (wherein, 4 represents the value of μ in the mapping formula; 2 the prompt information of the embedding location; 14 the pixel size of the secret image information; the entire “0.4214” the initial value x0 of the logistic map) for transmitting parameter information related to the extraction and recovery of the secret information. The three images (the QR code, the reconstructed cartoon animal, and the reconstructed cartoon girl) are designated as meta-image 1, 2, and 3, respectively. It is worth noting that the changes of some pixels are visible to the naked eye on the meta-image 2 and 3 after embedding the information. This is due to the small size of the pixels in the chosen carrier images, which is also an indicator of the difference between the carrier images before and after information embedding.
2.3 The simulation and experiment results of optical encryption metasurface
To experimentally verify the proposed idea, three a-Si:H metasurface samples are simultaneously fabricated on the same silica substrate using the standard electron beam lithography technique, and their scanning electron microscope (SEM) images are shown in Figure 4a. Detailed fabrication procedure can be found in the Experimental Section. Two metasurface samples (denoted as PT and PR in Figure 4(a)), with each occupying an area of 32 × 32 μm2 containing only non-rotated PT and PR, are used to find the two practical operating wavelengths. The fabricated PT and PR samples are characterized by a spectrometer that is fiber-coupled to a microscope (details are in the Experimental Section) and the measured polarized transmission spectra are presented in Section S4 in Supplementary Material, which clearly show the polarization-dependent properties. Despite the slight shift of the resonant wavelengths, the transmission spectra in measurement comply well with those in simulation. Based on the measured spectra, we designate 610 nm as the wavelength where the fabricated PT and PR both function as the nano-polarizer, and 700 nm is selected as the wavelength where polarization-independent high transmission difference between the PT and PR is realized. Next, the feasibility of the proposed metasurface-enabled optical encryption steganography for information security enhancement strategy is verified by the three-channel sample which is designed through carefully selecting the nanopillars and setting their spatial orientation angle based on the previously discussed metasurface design rule and the aforementioned three meta-images. To be specific, the three-channel sample contains 50 × 50 pixels, with each pixel containing 8 × 8 nanopillars, leading to a total metasurface area of 128 × 128 μm2. The concept of integrated optical encryption and steganography is first validated by conducing numerical simulations to extract the three binary images hidden in the metasurface. Considering the limited computing resources, the size of the metasurface in simulation is reduced to 64 × 64 μm2, with each pixel including 4 × 4 nanopillars, and more simulation details are provided in Section S5 in Supplementary Material. Figures 4b through 4d provide the simulated results under the designed three channels. At the wavelength of 633 nm, an optical polarizer and an analyzer are needed and set to the correct polarization angle for decoding the embedded meta-images, corresponding to a high encryption security level. Two meta-images displaying a QR code and a cartoon animal (Figure 4b and c) are successfully obtained with low crosstalk under the designed two non-orthogonal polarized light paths (i.e., meta-image 1: θ1 = 30° and θ2 = 75°, and meta-image 2: θ1 = −15° and θ2 = 30°). Conversely, for the low encryption security level at wavelength of 750 nm, the meta-image 3 of the cartoon girl can be revealed under arbitrarily polarized light incidences. Here, we present the results under the incidence of XLP (Figure 4d), while the results under other polarization incidences can be seen Section S6 in Supplementary Material. Additionally, since PT and PR exhibit different transmission spectra, they are likely to appear in different colors under white light illumination, which can be roughly estimated by averaging the polarized transmission spectra. Figure 4e displays the calculated light intensity distribution for incidence of unpolarized white light, where a colored cartoon girl can also be revealed. Corresponding to the simulation results, Figure 4f through 4h show the transmission intensity profiles that are experimentally obtained at the wavelengths of 610 nm and 700 nm by placing the corresponding optical narrowband filters in the optical path. All expected three-channel meta-images of QR code, cartoon animal, and cartoon girl are vividly observed with high fidelity and negligible crosstalk. A quantitative analysis of the crosstalk level can be found in Section S7 in Supplementary Material. Figure 4i shows the experimentally obtained transmission intensity distribution under white light incidence, consistent with the simulation result. It should be noted that although the meta-image 3 can also be distinguished by color under white light, this does not pose a risk of leakage to the hidden information, as all the meta-images themselves are pseudo-information with certain confusing effect, and observation of only the meta-image 3 cannot reveal the secret information. On the other hand, to prevent the meta-image in Channel 3 from being observable to the naked eye, one may consider to redesign and optimize the two nanostructures to have identical transmission spectra in the visible range [64], by shifting the working wavelengths – where the metasurface acts as a linear polarizer and polarization-independent transmitter and reflector – into the near- or mid-infrared wavelengths.

Simulation and experimental results of the metasurface. (a) SEM image of the fabricated metasurface samples. Simulated light intensity distributions in (b) Channel 1 and (c) Channel 2 at wavelength of 633 nm, and (d) Channel 3 at wavelength of 750 nm under XLP, as well as (e) under unpolarized white light incidence. Corresponding experimental results for (f) Channel 1 and (g) Channel 2 at wavelength of 610 nm, and (h) Channel 3 at wavelength of 700 nm, as well as (i) unpolarized white light incidence.
2.4 Secret information extraction and recovery process
The final transmitted secret information hidden in the single-layer metasurface can be decrypted through two steps. Firstly, the different optical keys are used to extract all nano-scale meta-images (as have been done in Figure 4), which is the basis for accurate information extraction. Secondly, the correct decryption algorithm is utilized to extract and recover the secret information. The process of information extraction and recovery is shown in Figure 5. A decryptor initially obtains a parameter (the string “0.4214”) for information extraction and recovery by scanning meta-image 1 (QR code), which is crucial for accurately retrieving the secret information. Here, the parameter information is directly obtained by scanning the QR code, but the obtained parameter will not easily suggest its significance to observers other than the intended recipient, reminding them of the information hidden in the grayscale images, thereby arousing suspicion, and prompting further scrutiny from eavesdroppers. It is worth mentioning that, for enhanced security, QR codes can be a way for the link sender to receiver, enabling the decryptor to obtain parameters after authentication. However, as part of the secret information extraction process, the decryptor needs to perform binarization and nearest interpolation on the obtained meta-images 2 and 3 respectively, and then the run-length sequences L# 1 and L# 2 of the two images are obtained by RLE. Next, the parity of the run-length values at corresponding even position in the two sequences is compared simultaneously. When the parity is the same, the extracted binary bit at that position is 0; otherwise, it is 1. If the extraction position exceeds the length of L# 1 (L# 2), the information will only be extracted from sequence L# 2 (L# 1). The specific rule is that when the run-length value at the extraction position in L# 2 (L# 1) is even, the extracted binary bit at that position is 0; otherwise, it is 1. The information extraction process is shown in the red box in Figure 5. The hidden scrambled secret image is reconstructed after extracting all embedded information, and the secret image information can be recovered by performing XOR logic operation with the iterative sequence generated from the parameter 0.4214, as shown in the blue box in Figure 5. To facilitate the visualization of the above information extraction and recovery process, a graphic user interface is developed in MATLAB. By setting the parameter obtained from channel 1 and importing the experimentally obtained meta-images information of channel 2 and channel 3, the concealed secret information (META) is accurately extracted through three steps of control. Details can be found in Video S1 in the Supplementary Material.

Process of extracting and recovering secret information. The red box shows the process of extracting information from meta-images obtained from the metasurface. The blue box demonstrates the recovery process of information.
The three meta-images play equally important roles in the final information extraction and recovery process. If any one of these images is not correctly obtained during the metasurface decryption stage, it will be impossible to extract the secret information ultimately. As the proof that the secret information can be correctly extracted only by using the designed meta-images, the erroneous result by attempting to extract the information with other undesigned images is also presented. In addition, even with the correct meta-images, the embedded secret information still cannot be extracted with an incorrect input parameter in Channel 1. Video S2 in the Supplementary Material clearly shows that no meaningful information can be extracted under the abovementioned conditions. Interestingly, as the steganography algorithm operates on the binary data, our design can not only hide image information but also hide textual information. To demonstrate the versatility of the carrier images and steganography algorithm, the carrier images used in the above design are still being used to design two metasurfaces (metasurface B and metasurface C), in which the hidden information is two textual information expressed in Chinese and English respectively (see Section S8 in Supplementary Material). Additionally, we conduct an analysis of errors that may occur during the information extraction and recovery process (Section S9 in Supplementary Material). As RLE is a lossless encoding method, this pixel-sensitive method of information hiding can effectively prevent brute force attacks and facilitate the destruction of secret information in secure transmission applications.
Despite our scheme highlight the potential of metasurface-based encryption for secure information hiding, it is important to acknowledge that, at the current stage, the practical application of the proposed metasurface-based encryption schemes may face challenges in terms of scalability and replicability. For instance, the high cost and complexity of nanofabrication techniques could limit their widespread adoption, while the deterministic nature of metasurface designs may render them susceptible to replication by sophisticated counterfeiters. As a result, the approach may be effective in niche applications with moderate counterfeiting risks. However, these challenges could be addressed in the future through advancements in cost-effective nanomanufacturing (e.g., nanoimprint lithography) and the integration of multi-layer security features (e.g., dynamic optical properties, quantum dots, or biometric markers). A detailed discussion on further increasing the information channels and enhancing the security can be found in Section S10 in Supplementary Material, and a qualitative analysis of the encryption complexity is provided in Section S11 in Supplementary Material. Lastly, although our method uniquely treats optically encrypted images as pseudo-information, concealing real information within pixels via an algorithmic process and thereby enhancing security and deception, it may face pixel sensitivity issues due to its reliance on the integrity of the carrier images.
3 Conclusions
In summary, we have proposed and experimentally demonstrated a metasurface-enabled optical encryption steganography design scheme for information security enhancement. In the scheme, the multiple images to be embedded in the metasurface partly serve as the pseudo-information, while a steganography algorithm based on RLE was specially introduced when designing the meta-images. As a result, an extra secret information can be safely written into the metasurface. For practical validation of the scheme, silicon meta-atoms were systematically investigated in terms of its amplitude responses at two different visible wavelengths. With the help of the two appropriate a-Si:H nanopillars, along with the engineering of their orientation angles, wavelength- and polarization-selective amplitude manipulations were achieved and made possible the encryption of three binary images on a single metasurface platform. Three metasurface samples were fabricated to experimentally validate the proposed idea. With proper setting of the correct optical keys, the designed three nanoscale binary images were successfully captured, and consequently the hidden secret information of steganography was accurately retrieved. As such, our work offers an intriguing approach for optical information hiding or anti-counterfeiting, making information more secure and less susceptible to be leaked.
4 Experimental section
4.1 Sample fabrication
The samples were fabricated using a series of standard processes including electron beam lithography (EBL), Al etch mask liftoff, and silicon plasma etching. Firstly, hydrogenated amorphous silicon (a-Si:H) film was deposited using plasma-enhanced chemical vapor deposition (Plasmalab 100 from Oxford) on fused silica (SiO2) substrate. Next, a positive electron resist (ZEP520A from Zeon Chemicals) was spin-coated onto the film. The designed metasurface pattern was then written on the resist using an electron beam writer (EBL, Elionix Boden 125), and accompanied by the development in ZED-N50. Subsequently, an aluminum film was deposited via electron-beam evaporation (Temescal BJD-2000) on the substrate, and it was patterned by lifting off the resist using a solvent (ZDMAC from Zeon Co.). The patterned aluminum was utilized as a hard mask during dry etching, thereby transferring the designed pattern to the underlying a-Si:H layer through fluorine-based inductively-coupled-plasma reactive ion etching (Oxford Plasmalab System 100). The residual aluminum from the patterned nanopillars was etched in phosphoric/nitric/acetic acids mixed solution.
4.2 Optical characterization
An integrated optical microscope (“BX53M”, Olympus) is used for characterizing the fabricated metasurface samples. For the transmission spectra measurement, the light emitting from the white light source was first passed through a polarizer and slightly focused on the metasurface sample using a lens. The light was then transmitted through an objective lens (MPlanFL N 20X/0.45, Olympus), followed by an in-built beam splitter, which directed the light to a fiber (“QP600-2-SR, Ocean Insight”) coupled spectrometer (“Maya2000 Pro”, Ocean Insight) for measuring the transmission spectrum and to a CCD camera (“SC180”, Olympus) for recording the transmission intensity pattern at the sample surface. Particularly for the intensity pattern measurement, an optical filter (BPH610-10 nm, BPH700-10 nm, Rayan Optics) was selectively inserted before the metasurface sample, while an analyzer was placed between the objective lens and the beam splitter for selecting the polarization component of the output light. The experimental setup can be seen in Section S12 in Supplementary Material.
Funding source: National Natural Science Foundation of China
Award Identifier / Grant number: 62005095
-
Research funding: This work was supported by the National Natural Science Foundation of China under Grant (62005095). This research was performed in part at the ACT node of the Australian National Fabrication Facility.
-
Author contribution: WX performed the metasurface design, data analysis, and prepared the original draft. WX, CB and XZ contributed to the metasurface simulation and information embedding algorithm development. DC carried out the sample fabrication and characterization. YL assisted with numerical data analysis. JC and ZL assisted in optical measurements and data analysis. SC supervised the research. SG and WY conceived the original idea, oversaw data analysis and supervised the project. All authors have accepted responsibility for the entire content of the manuscript and approved its submission.
-
Conflict of interest: Authors state no conflicts of interest.
-
Data availability: Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
References
[1] O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE, vol. 97, no. 6, pp. 1128–1148, 2009, https://doi.org/10.1109/jproc.2009.2018367.Suche in Google Scholar
[2] W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photonics, vol. 6, no. 2, pp. 120–155, 2014, https://doi.org/10.1364/aop.6.000120.Suche in Google Scholar
[3] S. Liu, C. Guo, and J. T. Sheridan, “A review of optical image encryption techniques,” Opt. Laser Technol., vol. 57, no. 2014, pp. 327–342, 2014. https://doi.org/10.1016/j.optlastec.2013.05.023.Suche in Google Scholar
[4] Y. Intaravanne, et al.., “Color-selective three-dimensional polarization structures,” Light Sci. Appl., vol. 11, no. 1, p. 302, 2022, https://doi.org/10.1038/s41377-022-00961-y.Suche in Google Scholar PubMed PubMed Central
[5] Z. Li, W. Liu, H. Cheng, D.-Y. Choi, S. Chen, and J. Tian, “Arbitrary manipulation of light intensity by bilayer aluminum metasurfaces,” Adv. Opt. Mater., vol. 7, no. 13, p. 1900260, 2019, https://doi.org/10.1002/adom.201900260.Suche in Google Scholar
[6] W. T. Chen, A. Y. Zhu, J. Sisler, Z. Bharwani, and F. Capasso, “A broadband achromatic polarization-insensitive metalens consisting of anisotropic nanostructures,” Nat. Commun., vol. 10, no. 1, p. 355, 2019, https://doi.org/10.1038/s41467-019-08305-y.Suche in Google Scholar PubMed PubMed Central
[7] N. Yu, et al.., “Light propagation with phase discontinuities: generalized laws of reflection and refraction,” Science, vol. 334, no. 6054, pp. 333–337, 2011, https://doi.org/10.1126/science.1210713.Suche in Google Scholar PubMed
[8] R. Jin, et al.., “Experimental demonstration of multidimensional and multifunctional metalenses based on photonic spin hall effect,” ACS Photonics, vol. 7, no. 2, pp. 512–518, 2020, https://doi.org/10.1021/acsphotonics.9b01608.Suche in Google Scholar
[9] H. Chung, D. Kim, E. Choi, and J. Lee, “E-band metasurface-based orbital angular momentum multiplexing and demultiplexing,” Laser Photonics Rev., vol. 16, no. 6, p. 2100456, 2022, https://doi.org/10.1002/lpor.202100456.Suche in Google Scholar
[10] H. Ren, X. Fang, J. Jang, J. Bürger, J. Rho, and S. A. Maier, “Complex-amplitude metasurface-based orbital angular momentum holography in momentum space,” Nat. Nanotechnol., vol. 15, no. 11, pp. 948–955, 2020, https://doi.org/10.1038/s41565-020-0768-4.Suche in Google Scholar PubMed
[11] X. Ni, A. V. Kildishev, and V. M. Shalaev, “Metasurface holograms for visible light,” Nat. Commun., vol. 4, no. 1, p. 2807, 2013, https://doi.org/10.1038/ncomms3807.Suche in Google Scholar
[12] G. Zheng, H. Mühlenbernd, M. Kenney, G. Li, T. Zentgraf, and S. Zhang, “Metasurface holograms reaching 80% efficiency,” Nat. Nanotechnol., vol. 10, no. 4, pp. 308–312, 2015, https://doi.org/10.1038/nnano.2015.2.Suche in Google Scholar PubMed
[13] J. Kim, et al.., “Photonic encryption platform via dual-band vectorial metaholograms in the ultraviolet and visible,” ACS Nano, vol. 16, no. 3, pp. 3546–3553, 2022, https://doi.org/10.1021/acsnano.1c10100.Suche in Google Scholar PubMed
[14] S. Gao, C.-S. Park, S.-S. Lee, and D.-Y. Choi, “All-dielectric metasurfaces for simultaneously realizing polarization rotation and wavefront shaping of visible light,” Nanoscale, vol. 11, no. 9, pp. 4083–4090, 2019, https://doi.org/10.1039/c9nr00187e.Suche in Google Scholar PubMed
[15] S. Wang, et al.., “Arbitrary polarization conversion dichroism metasurfaces for all-in-one full poincaré sphere polarizers,” Light Sci. Appl., vol. 10, no. 1, p. 24, 2021, https://doi.org/10.1038/s41377-021-00468-y.Suche in Google Scholar PubMed PubMed Central
[16] Y. Wang, W. Yue, and S. Gao, “Dielectric diatomic metasurface-assisted versatile bifunctional polarization conversions and incidence-polarization-secured meta-image,” Opt. Express, vol. 31, no. 18, p. 29900, 2023, https://doi.org/10.1364/oe.498108.Suche in Google Scholar PubMed
[17] H. Li, et al.., “All-silicon diatomic terahertz metasurface with tailorable linear polarization states,” Adv. Opt. Mater., vol. 11, no. 2, p. 2201960, 2022, https://doi.org/10.1002/adom.202201960.Suche in Google Scholar
[18] Y. Yang, et al.., “Full-polarization 3D metasurface cloak with preserved amplitude and phase,” Adv. Mater., vol. 28, no. 32, pp. 6866–6871, 2016, https://doi.org/10.1002/adma.201600625.Suche in Google Scholar PubMed
[19] X. G. Zhang, et al.., “An optically driven digital metasurface for programming electromagnetic functions,” Nat. Electron., vol. 3, no. 3, pp. 165–171, 2020, https://doi.org/10.1038/s41928-020-0380-5.Suche in Google Scholar
[20] K. Ou, et al.., “Broadband achromatic metalens in midwavelength infrared,” Laser Photonics Rev., vol. 15, no. 9, p. 2100020, 2021, https://doi.org/10.1002/lpor.202100020.Suche in Google Scholar
[21] S. Gao, C.-S. Park, C. Zhou, S.-S. Lee, and D.-Y. Choi, “Twofold polarization-selective all-dielectric trifoci metalens for linearly polarized visible light,” Adv. Opt. Mater., vol. 7, no. 21, p. 1900883, 2019, https://doi.org/10.1002/adom.201900883.Suche in Google Scholar
[22] S. Zhang, et al.., “Broadband detection of multiple spin and orbital angular momenta via dielectric metasurface,” Laser Photonics Rev., vol. 14, no. 9, p. 2000062, 2020, https://doi.org/10.1002/lpor.202000062.Suche in Google Scholar PubMed PubMed Central
[23] F. Ding, C. Meng, and S. I. Bozhevolnyi, “Electrically tunable optical metasurfaces,” Photonics Insights, vol. 3, no. 3, p. R07, 2024, https://doi.org/10.3788/pi.2024.r07.Suche in Google Scholar
[24] Y. Deng, C. Meng, P. C. V. Thrane, S. im Sande, S. I. Bozhevolnyi, and F. Ding, “MEMS-integrated metasurfaces for dynamic linear polarizers,” Optica, vol. 11, no. 3, pp. 326–332, 2024, https://doi.org/10.1364/optica.515524.Suche in Google Scholar
[25] Z. Wang, et al.., “Single-layer spatial analog meta-processor for imaging processing,” Nat. Commun., vol. 13, no. 1, p. 2188, 2022, https://doi.org/10.1038/s41467-022-29732-4.Suche in Google Scholar PubMed PubMed Central
[26] Z. Zhao, et al.., “Deep learning-enabled compact optical trigonometric operator with metasurface,” PhotoniX, vol. 3, no. 1, p. 15, 2022, https://doi.org/10.1186/s43074-022-00062-4.Suche in Google Scholar
[27] X. Ding, et al.., “Metasurface-based optical logic operators driven by diffractive neural networks,” Adv. Mater., vol. 36, no. 9, p. 2308993, 2024, https://doi.org/10.1002/adma.202308993.Suche in Google Scholar PubMed
[28] X. Wang, et al.., “Single-shot isotropic differential interference contrast microscopy,” Nat. Commun., vol. 14, no. 1, p. 2063, 2023, https://doi.org/10.1038/s41467-023-37606-6.Suche in Google Scholar PubMed PubMed Central
[29] X. Wang, et al.., “Advances in information processing and biological imaging using flat optics,” Nat. Rev. Electr. Eng., vol. 1, no. 6, pp. 391–411, 2024, https://doi.org/10.1038/s44287-024-00057-2.Suche in Google Scholar
[30] Y. Cao, L. Tang, J. Li, C. Lee, and Z.-G. Dong, “Multiplexing optical images for steganography by single metasurfaces,” Small, vol. 19, no. 19, p. 2206319, 2023, https://doi.org/10.1002/smll.202206319.Suche in Google Scholar PubMed
[31] Y. Hu, et al.., “Trichromatic and tripolarization-channel holography with noninterleaved dielectric metasurface,” Nano Lett., vol. 20, no. 2, pp. 994–1002, 2020, https://doi.org/10.1021/acs.nanolett.9b04107.Suche in Google Scholar PubMed
[32] H. Yang, et al.., “Angular momentum holography via a minimalist metasurface for optical nested encryption,” Light Sci. Appl., vol. 12, no. 1, p. 79, 2023, https://doi.org/10.1038/s41377-023-01125-2.Suche in Google Scholar PubMed PubMed Central
[33] J. Deng, et al.., “Metasurface-assisted optical encryption carrying camouflaged information,” Adv. Opt. Mater., vol. 10, no. 16, p. 2200949, 2022, https://doi.org/10.1002/adom.202200949.Suche in Google Scholar
[34] Y. Hu, et al.., “3D-integrated metasurfaces for full-colour holography,” Light Sci. Appl., vol. 8, no. 1, p. 86, 2019, https://doi.org/10.1038/s41377-019-0198-y.Suche in Google Scholar PubMed PubMed Central
[35] J. Deng, et al.., “Multiplexed anticounterfeiting meta-image displays with single-sized nanostructures,” Nano Lett., vol. 20, no. 3, pp. 1830–1838, 2020, https://doi.org/10.1021/acs.nanolett.9b05053.Suche in Google Scholar PubMed
[36] P. Zheng, et al.., “Metasurface-based key for computational imaging encryption,” Sci. Adv., vol. 7, no. 21, p. eabg0363, 2021, https://doi.org/10.1126/sciadv.abg0363.Suche in Google Scholar PubMed PubMed Central
[37] L. Deng, et al.., “Malus-metasurface-assisted polarization multiplexing,” Light Sci. Appl., vol. 9, no. 1, p. 101, 2020, https://doi.org/10.1038/s41377-020-0327-7.Suche in Google Scholar PubMed PubMed Central
[38] Z. Li, et al.., “Three-channel metasurfaces for simultaneous meta-holography and meta-nanoprinting: a single-cell design approach,” Laser Photonics Rev., vol. 14, no. 6, p. 2000032, 2020, https://doi.org/10.1002/lpor.202000032.Suche in Google Scholar
[39] M. Q. Mehmood, et al.., “Single-cell-driven tri-channel encryption meta-displays,” Adv. Sci., vol. 9, no. 35, p. 2203962, 2022, https://doi.org/10.1002/advs.202203962.Suche in Google Scholar PubMed PubMed Central
[40] S. Zhang, Q. Wang, X. Gao, D. Zhang, and S. Zhuang, “Two-level optical encryption platform via an electrically driven liquid-crystal-integrated tri-channel metasurface,” Opt. Lett., vol. 48, no. 15, p. 4125, 2023, https://doi.org/10.1364/ol.498558.Suche in Google Scholar PubMed
[41] R. Ren, et al.., “Non-orthogonal polarization multiplexed metasurfaces for tri-channel polychromatic image displays and information encryption,” Nanophotonics, vol. 10, no. 11, pp. 2903–2914, 2021, https://doi.org/10.1515/nanoph-2021-0259.Suche in Google Scholar
[42] X. Ouyang, et al.., “Synthetic helical dichroism for six-dimensional optical orbital angular momentum multiplexing,” Nat. Photon., vol. 15, no. 12, pp. 901–907, 2021, https://doi.org/10.1038/s41566-021-00880-1.Suche in Google Scholar
[43] Z. Deng, et al.., “Full-color complex-amplitude vectorial holograms based on multi-freedom metasurfaces,” Adv. Funct. Mater., vol. 30, no. 21, p. 1910610, 2020, https://doi.org/10.1002/adfm.201910610.Suche in Google Scholar
[44] F. Dong and W. Chu, “Multichannel-independent information encoding with optical metasurfaces,” Adv. Mater., vol. 31, no. 45, p. 1804921, 2019, https://doi.org/10.1002/adma.201804921.Suche in Google Scholar PubMed
[45] H. Zhou, et al.., “Polarization-encrypted orbital angular momentum multiplexed metasurface holography,” ACS Nano, vol. 14, no. 5, pp. 5553–5559, 2020, https://doi.org/10.1021/acsnano.9b09814.Suche in Google Scholar PubMed PubMed Central
[46] I. Kim, et al.., “Dual-band operating metaholograms with heterogeneous meta-atoms in the visible and near-infrared,” Adv. Opt. Mater., vol. 9, no. 19, p. 2100609, 2021, https://doi.org/10.1002/adom.202100609.Suche in Google Scholar
[47] Y. Cao, L. Tang, J. Li, C. Lee, and Z.-G. Dong, “Four-channel display and encryption by near-field reflection on nanoprinting metasurface,” Nanophotonics, vol. 11, no. 14, pp. 3365–3374, 2022, https://doi.org/10.1515/nanoph-2022-0216.Suche in Google Scholar PubMed PubMed Central
[48] X. Zhang, et al.., “Twofold optical display and encryption of binary and grayscale images with a wavelength-multiplexed metasurface,” Nanophotonics, vol. 12, no. 19, pp. 3747–3756, 2023, https://doi.org/10.1515/nanoph-2023-0324.Suche in Google Scholar PubMed PubMed Central
[49] R. Fu, W. Wang, and X. Liu, “Bi-functional and tri-channel image displays based on a single-size nanostructured metasurface enabled by dual-orientation-degeneracy,” Opt. Express, vol. 32, no. 24, pp. 42336–42346, 2024, https://doi.org/10.1364/oe.543148.Suche in Google Scholar
[50] J. Deng, C. Qiu, K. Wu, F. Gao, and B. Yan, “Metasurface-assisted optical encryption combining direct-observation with indirect-observation channels,” Opt. Laser Eng., vol. 179, no. 2024, p. 108249, 2024. https://doi.org/10.1016/j.optlaseng.2024.108249.Suche in Google Scholar
[51] J. Li, et al.., “Metasurface-assisted indirect-observation cryptographic system,” Laser Photonics Rev., vol. 17, no. 1, p. 2200342, 2023, https://doi.org/10.1002/lpor.202200342.Suche in Google Scholar
[52] J. Yan, et al.., “Single pixel imaging key for holographic encryption based on spatial multiplexing metasurface,” Small, vol. 18, no. 35, p. 2203197, 2022, https://doi.org/10.1002/smll.202203197.Suche in Google Scholar PubMed
[53] R. Audhkhasi, M. R. Lien, and M. L. Povinelli, “Experimental implementation of metasurfaces for secure multi-channel image encryption in the infrared,” Adv. Opt. Mater., vol. 11, no. 12, p. 2203155, 2023, https://doi.org/10.1002/adom.202203155.Suche in Google Scholar
[54] Z. Li, M. Premaratne, and W. Zhu, “Advanced encryption method realized by secret shared phase encoding scheme using a multi-wavelength metasurface,” Nanophotonics, vol. 9, no. 11, pp. 3687–3696, 2020, https://doi.org/10.1515/nanoph-2020-0298.Suche in Google Scholar
[55] P. Zheng, et al.., “Compressive imaging encryption with secret sharing metasurfaces,” Adv. Opt. Mater., vol. 10, no. 15, p. 2200257, 2022, https://doi.org/10.1002/adom.202200257.Suche in Google Scholar
[56] Z. Li, et al.., “Cryptography metasurface for one-time-pad encryption and massive data storage,” Laser Photonics Rev., vol. 16, no. 8, p. 2200113, 2022, https://doi.org/10.1002/lpor.202200113.Suche in Google Scholar
[57] P. C. Mandal, I. Mukherjee, G. Paul, and B. N. Chatterji, “Digital image steganography: a literature survey,” Inf. Sci., vol. 609, no. 2022, pp. 1451–1488, 2022. https://doi.org/10.1016/j.ins.2022.07.120.Suche in Google Scholar
[58] Y. Zhang, C. Qin, W. Zhang, F. Liu, and X. Luo, “On the fault-tolerant performance for a class of robust image steganography,” Signal Process, vol. 146, no. 2018, pp. 99–111, 2018. https://doi.org/10.1016/j.sigpro.2018.01.011.Suche in Google Scholar
[59] M. Song, et al.., “Enabling optical steganography, data storage, and encryption with plasmonic colors,” Laser Photonics Rev., vol. 15, no. 3, p. 2000343, 2021, https://doi.org/10.1002/lpor.202000343.Suche in Google Scholar
[60] Z.-L. Deng, et al.., “Vectorial compound metapixels for arbitrary nonorthogonal polarization steganography,” Adv. Mater., vol. 33, no. 43, p. 2103472, 2021, https://doi.org/10.1002/adma.202103472.Suche in Google Scholar PubMed
[61] Y. Qin, Z. Wang, H. Wang, and Q. Gong, “Binary image encryption in a joint transform correlator scheme by aid of run-length encoding and QR code,” Opt. Laser Technol., vol. 103, no. 2018, pp. 93–98, 2018. https://doi.org/10.1016/j.optlastec.2018.01.018.Suche in Google Scholar
[62] Z. Wang, et al.., “Compression-encrypted meta-optics for storage efficiency and security enhancement,” ACS Photonics, vol. 11, no. 2, pp. 688–695, 2024, https://doi.org/10.1021/acsphotonics.3c01519.Suche in Google Scholar
[63] R. M. May, “Simple mathematical models with very complicated dynamics,” Nature, vol. 261, no. 5560, pp. 459–467, 1976, https://doi.org/10.1038/261459a0.Suche in Google Scholar PubMed
[64] J. Cheng, et al.., “Counterintuitive reversal of circular dichroism via controllable plasmonic guided mode resonance in diatomic metasurfaces,” Laser Photonics Rev, p. 2401184, 2025. https://doi.org/10.1002/lpor.202401184.Suche in Google Scholar
Supplementary Material
This article contains supplementary material (https://doi.org/10.1515/nanoph-2025-0015).
© 2025 the author(s), published by De Gruyter, Berlin/Boston
This work is licensed under the Creative Commons Attribution 4.0 International License.
Artikel in diesem Heft
- Frontmatter
- Review
- Anisotropic metamaterials for scalable photonic integrated circuits: a review on subwavelength gratings for high-density integration
- Research Articles
- Disorder robust, ultra-low power, continuous-wave four-wave mixing in a topological waveguide
- Continuously adjustable hollow beam for ultrafast laser fabrication of size-controllable nanoparticles
- Generation of fast photoelectrons in strong-field emission from metal nanoparticles
- Interband plasmonic nanoresonators for enhanced thermoelectric photodetection
- Low-cost large-area 100 GHz intelligent reflective surface: electrically column control of screen-printable high phase changing ratio vanadium dioxides
- Metasurface-enabled optical encryption and steganography with enhanced information security
- Radial rotation of cell-pair under beam mode coupling effect of microcavity cascaded single fiber optical tweezers
- Inverse design of 3D nanophotonic devices with structural integrity using auxiliary thermal solvers
Artikel in diesem Heft
- Frontmatter
- Review
- Anisotropic metamaterials for scalable photonic integrated circuits: a review on subwavelength gratings for high-density integration
- Research Articles
- Disorder robust, ultra-low power, continuous-wave four-wave mixing in a topological waveguide
- Continuously adjustable hollow beam for ultrafast laser fabrication of size-controllable nanoparticles
- Generation of fast photoelectrons in strong-field emission from metal nanoparticles
- Interband plasmonic nanoresonators for enhanced thermoelectric photodetection
- Low-cost large-area 100 GHz intelligent reflective surface: electrically column control of screen-printable high phase changing ratio vanadium dioxides
- Metasurface-enabled optical encryption and steganography with enhanced information security
- Radial rotation of cell-pair under beam mode coupling effect of microcavity cascaded single fiber optical tweezers
- Inverse design of 3D nanophotonic devices with structural integrity using auxiliary thermal solvers