Abstract
The progress of metaoptics relies on identifying photonic materials and geometries, the combination of which represents a promising approach to complex and desired optical functionalities. Material candidate options are primarily limited by natural availability. Thus, the search for meta-atom geometries, by either forward or inverse means, plays a pivotal role in achieving more sophisticated phenomena. Past efforts mainly focused on building the geometric library of individual meta-atoms and synthesizing various ones into a design. However, those efforts neglected the powerfulness of perturbative metaoptics due to the perception that perturbations are usually regarded as adverse and in need of being suppressed. Here, we report a perturbation-induced countersurveillance strategy using compound nanosieves mediated by structural and thermal perturbations. Private information can be almost perfectly concealed and camouflaged by the induced thermal-spectral drifts, enabling information storage and exchange in a covert way. This perturbative metaoptics can self-indicate whether the hidden information has been attacked during delivery. Our results establish a perturbative paradigm of securing a safer world of information and internet of things.
Subject terms: Optical materials and structures, Nanophotonics and plasmonics, Applied optics
Perturbative metasurface for safe hiding of secret messages
An optical perturbative metasurface incorporating differently shaped nano-sized holes can conceal information and alert the receiver if an unwelcome attempt has been made to uncover it. The perturbative metasurface was proposed and demonstrated by researchers from China and Singapore. The team took advantage of tiny ‘perturbations’ that happen within the metasurface, and thus to its optical properties for nano-steganography, turning perturbations from being useless in normal perceptions to be of significant importance. Based on judicious perturbations, a secret message can be almost perfectly concealed within a visible camouflage image produced by the metasurface and only revealed when the right amount of heat is applied, followed by a matched light filter. The receiver is alerted to an attempted hack, as heat application causes irreversible changes of the camouflage image without revealing the hidden message.
Introduction
Metaoptics has enabled tremendous fundamental discoveries and novel applications1–5, which not only further our understanding of the world but also enrich our daily life with wonders. For example, with the development of metamaterials and metasurfaces, fascinating effects and profound applications are constantly revealed6–11, such as electromagnetically induced transparency6, a negative refractive index7, an ultrathin metalens9,10, and a functional thermal meta-device12.
These progresses in the field of metaoptics result from designing functional geometries and developing new material components or combining them together13–17 to realize complex optical functionalities. Since the photonic material library is primarily limited by natural availability, searching for meta-atom geometries plays a crucial role in realizing more sophisticated functionalities in metaoptics. A general way in this research is to build a library of individual geometric meta-atoms and then to integrate a variety of them into a design to achieve the desired phenomena. In this strategy, perturbations (i.e., the small deviation of structural parameters) are usually regarded as adverse to the designed functionalities and in need of being suppressed, especially in systems with high quality factors18–20 and structures with sizes down to the nanoscale21–26. However, this factor results in neglecting the powerfulness of perturbations as a positive component in metaoptics, removing the possibility to open up the research world of perturbative metaoptics, which may be rich in interesting phenomena and promising applications. In fact, perturbations have recently been used to theoretically solve the problem of reverse design in elastic metamaterials27, which indicates the potential of supportive perturbations in material engineering under the appropriate design.
Here, we explore the use of perturbations in expanding the functions of metaoptics by proposing a perturbation-induced countersurveillance strategy with compound nanosieves. While considerable structural changes in the compound nanosieves are used for camouflage information expression, controllable structural perturbations without a visible influence on the expressed information are used for information hiding. Then, with the designed structural and thermal perturbations, the function of countersurveillance supporting the self-indication of eavesdropping is developed, which is of great importance for information science but has not yet been achieved in metaoptics-based and most other information security techniques. In addition, private information can be almost perfectly concealed and camouflaged by this perturbative countersurveillance strategy, giving rise to almost perfect information hiding for covert information storage and exchange. Our findings not only demonstrate perturbation as a functional dimension in the design of metaoptical systems but also propose a perturbative security strategy for information and the internet of things.
Results
The origin of perturbative metaoptics
Metamaterials and metasurfaces have recently enabled a number of novel advanced information security approaches with advantages of high capacity and security28–34, opening up a new avenue for applications of metaoptics. However, a common problem in these implementations is that the carriers of the contained information are suspicious and thus easy to draw the attention of others, which may attract eavesdroppers and lead to the failure of information security. To address this problem, in the following, we explore perturbations in metaoptics, which help in realizing additional new functions in an original system. Specifically, they can be used to implement covert information storage and transmission without the awareness of unauthorized third parties by concealing private information under innocuous cover information.
Figure 1a shows the compound nanosieves, constructed by unit cells consisting of a plasmonic cap, a dielectric spacer, a nanohole inside them and a reflector at the bottom (Fig. 1a). The plasmonic cap is a rough metallic layer, working as a broadband absorber that helps to generate vivid reflective colors in a wide color range (detailed discussions of these compound nanosieves, as well as the rough plasmonic cap can be found in Figs. S1, S2). In the compound nanosieves, the key parameters are the height (h) of the dielectric spacer and the diameter (D) of the nanoholes, which directly modulate the reflective peak wavelengths (Fig. S2). When D or h changes by a large amount (large ΔD and large Δh shown in Fig. 1b), the reflective peak wavelengths of the compound nanosieves will undergo a large shift (the regions far away from the yellow regions in Fig. 1b). In contrast, small perturbations of D or h caused only slight wavelength offsets (regions in the dashed blue squares around the lines of ΔD = 0 nm in Fig. 1b, i and Δh = 0 nm in Fig. 1b, ii). Therefore, the large change regions can be used for information expression, while the small perturbation regions may work for information hiding.
To be specific, for D = 60 nm and ΔD = 0, 30, 120 nm (the black, blue and yellow spots marked in Fig. 1c, i, respectively), small ΔD (30 nm, blue curve) resulted in only a slight spectral shift and little change in the reflective color, while a distinct spectral shift and obvious color change appeared in the case of large ΔD (120 nm, yellow curve). According to these facts, a sufficiently modest perturbation of the structure parameter may produce a very small offset in the reflection spectra, resulting in a color difference so tiny that it cannot be discriminated by human eyes, which could be used to hide information.
On the other hand, the reflectivity at the reflective valley could have a large relative increase because of the small valley reflection. To investigate this property more clearly, we focused on the reflection contrast (RC) at the original valley wavelength, which was calculated by RCvalley = |(RD+ΔD−RD)/RD+ΔD|, where RD and RD+ΔD are the reflectivity at the valley wavelengths corresponding to ΔD = 0 nm and ΔD ≠ 0, respectively. As shown in Fig. 1c, ii, RCvalley increased rapidly as ΔD increased in the structural perturbation region (marked by the blue square), while the corresponding peak shifts increased only slightly and remained small. This outcome means that the slight spectral offset caused by a structural perturbation may create sufficient RCvalley, giving rise to visible contrast under the illumination of monochromatic light with the valley wavelength corresponding to ΔD = 0 nm. In contrast, in the large structural change region (marked by the yellow square), the reflective peak shifts were quite large and increased rapidly as ΔD increased, which is beneficial for constructing cover information in the form of colorful images. The case of Δh is similar to that of ΔD and was discussed in Fig. S3. A detailed theoretical discussion on information hiding based on this perturbation-based metaoptics can be found in Fig. S4.
As an experimental demonstration of camouflaged information hiding based on this perturbative metaoptics, a private message (a quick response, QR, code) was transferred into a spatial distribution of structural perturbations in the cover information (a badge of Sun Yat-sen University), making the embedded information invisible under ambient circumstances (Fig. 1d). A modest structural perturbation (ΔD = 10 nm) between the QR code pattern (D = 65 nm) and neighboring areas (D = 75 nm) produced only a small offset in the reflection spectra (see Fig. S5) and resulted in invisibility of the QR code (upper-right image in Fig. 1d), concealing the existence of private information. In the revealing process, the hidden QR code could be revealed clearly (the lower-right images in Fig. 1d) by applying a near-monochromatic light filtered from the microscope-inserted lamp using a narrowband filter centered at the designed wavelength, λd = 480 nm (near the reflective valley wavelength shown in Fig. S5). On the other hand, if the wavelength of the light source moves away from the reflective valley wavelength, it will lose the ability to reveal information (see Fig. S6). The D adopted in the compound nanosieves is an important parameter in our strategy, and we found that a smaller hole results in better performance. The reason is that the optical properties of the compound nanosieves with smaller diameters are less sensitive to the displacement of diameters (Fig. S7). As a consequence, the concealed information with a fixed ∆D and a smaller D is more difficult to detect by optical methods when compared with the cases of larger D, which is more desirable in information hiding. However, from the experimental perspective, smaller nanoholes correspond to a larger fabrication challenge, and the minimal diameter of the nanohole is also dependent on the equipment limitation. Taking these facts into account, we found D = 65 nm to be a suitable value as one practical option.
Scheme of perturbative countersurveillance strategy
The perturbations in metaoptics permit two advantages for their application in information hiding. One advantage is that the private information embedded in the perturbative compound nanosieves can be transferred by tremendous channels with high secrecy. Since color patterns (the form of camouflage) are ubiquitous in daily life and information can be concealed within a tiny size, such as the QR code in Fig. 1, with a total size (only 34.8 μm) smaller than a pixel on a smart phone screen, the hidden information can be embedded into daily objects or attached to arbitrary items without causing suspicion. The other advantage is that we can obtain resolutions reaching the optical limit, leading to an ultrahigh information capacity of 100,000 d.p.i. (see Fig. S8 for a more detailed discussion). Despite these advantages, an important problem in the elementary form of camouflaged information hiding demonstrated above is that the receiver cannot ensure whether the private information is leaked or not because the hidden information can be read numerous times in the right manner but without a trace. In short, the function of countersurveillance cannot be achieved by this elementary form of perturbative metaoptics (note that this function is still unable to occur in the majority of the existing information security methods).
Quantum key distribution35–37 has gained a remarkable reputation due to unparalleled performances on countersurveillance and its absolute security. In the process of quantum key distribution, the keys can be obtained only by measuring them in a certain way. If a third party (Eve) tries to eavesdrop on the keys, his or her measurements will introduce detectable anomalies, which would be noticed by the receiver (Fig. 2a). Inspired by the quantum key distribution, the function of countersurveillance can be achieved if an irreversible change can occur during the information revealing. Based on this idea, a scheme of perturbative countersurveillance metaoptics was constructed, as shown in Fig. 2b. In the concealing process, an optically invisible perturbation (perturbation 1) is used to conceal private messages in cover camouflage by Alice, the message sender. After the cover carrier is received, a detectable feature of the hidden information does not emerge until perturbation 2 is added by Bob, the message receiver. In this case, the filter with the designed wavelengths can be used only to reveal the concealed message after perturbation 2 is implemented, and the employment of perturbation 2 can lead to irreversible change to the cover image without damaging the hidden information. Therefore, the receiver can judge whether the hidden information has been attacked or not by the appearance of the cover camouflage (Fig. 2b). In the following, we demonstrate the implementation of this scheme in an experiment.
Perturbation-induced countersurveillance with compound nanosieves
To construct an optically invisible perturbation working as perturbation 1 in the concealing process, we delicately designed the shapes of the holes in the compound nanosieves and applied circular holes and rounded square holes to form a cover image and embed a hidden message, respectively, as shown in Fig. 3a, i. In the compound nanosieves, the reflection spectra can be tuned to overlap well with each other by achieving the same porosity, even though the shapes of the holes may differ (Fig. S9). Accordingly, by adjusting the sizes of the used circular holes and rounded square holes, the reflection spectra of these two compound nanosieves were tuned to be nearly the same as each other (Fig. 3a, ii, iii). Therefore, the small structural perturbation was spectrally invisible, providing the perturbative compound nanosieves with the ability to make the embedded message optically disappear into the background of the cover camouflage. In addition, since the sizes of the holes were selected to be quite small (~60 nm) and the perturbations were slight, the concealed message was also difficult to distinguish even though the morphology of the compound nanosieves was mapped at the nanoscale, making it morphologically invisible (Fig. 3a, iv and Fig. S10). As a consequence, the perturbative compound nanosieves were provided with the capability of near-perfect information hiding to keep the embedded message invisible both in optical response and in morphology. It is worth noting that this capability has long been highly desired in information security but has yet to be realized in previous works based on photonic methods.
To introduce the function of countersurveillance and to generate detectable features of the concealed information in the revealing process, perturbation 2 based on the thermal effect of the compound nanosieves was then developed to realize perturbation-induced countersurveillance of the camouflaged information hiding (Fig. 3b). Specifically, the resist working as the spacer in the compound nanosieves shrank when baked because of the evaporation of the residue of the solvent, and the compound nanosieves with rounded square holes shrank more than those with circular holes during this thermal process since they had relatively larger exposed surface-to-volume (SV) ratios (Fig. 3b, i). A more detailed discussion of this thermal effect can be found in Fig. S11. This small h perturbation induced by the thermal process consequently caused detectable features and a slight spectral offset in the reflection spectra (Fig. 3b, ii).
As an experimental demonstration of the function of perturbation-induced countersurveillance, we utilized perturbation 1 to conceal private information, with rounded square holes for an embedded message of ‘SYSU’ and circular holes for a cover camouflage (Fig. 3b, iii). As shown in Fig. 3b, iii, the embedded ‘SYSU’ was well hidden in the cover badge under normal light illumination and remained invisible when filters were applied because of its good overlapping of the reflection spectra with the camouflage background (Fig. 3b, iv and Fig. S12).
To detect the concealed information, a thermal process should be applied first to introduce perturbation 2. After the implementation of the thermal process, baking at 180 °C for 1 min in this case, the concealed message was still out of sight, although the cover camouflage had a distinct transition of its appearance (Fig. 3b, v and Fig. S13). In addition, the irreversible evaporation of the solvent residue made these structural changes irreversible, bringing about visible indicators including color transitions of the cover camouflage and vague boundaries between different colors. These indicators can work as an inbuilt security alarm for countersurveillance, and serving as a warning for the receiver that alerts the receiver of an attack if these indicators show up when the sample is received. With the added perturbation 2, the embedded ‘SYSU’ was clearly revealed by the application of filtered light with designed wavelengths (Fig. 3b, vi), completing the information revealing process. In addition, the hidden information was also morphologically invisible after the emergence of perturbation 2 (Fig. S14), stemming from the fact that the rounded square holes with a shape similar to that of the circular holes was deliberately chosen (the inserted SEM images in Fig. 3a, i).
Robust perturbative information hiding
In a material system with a designed feature size down to the nanoscale, its optical response often depends on the incident angle1–5. Therefore, to test the robustness of the camouflaged information hiding with the perturbative countersurveillance metaoptics, we examined the optical angle dependency and found that the angle-dependent responses of the compound nanosieves have little influence on the invisibility of the concealed information, as described in the following. Theoretically, the compound nanosieves with and without perturbations, which can correspond to the concealed message and the cover camouflage, have similar angle dependence in the spectral response, meaning that their reflective spectra will blueshift simultaneously and that the difference between them will not increase with increasing observation angles (a detailed discussion can be found in Fig. S15). As shown in Fig. 4a, b, although the reflection spectra of the compound nanosieves drifted according to the transitions of the observation angles, the spectral differences caused by perturbations in D (Fig. 4a) or h (Fig. 4b) had no visible increase.
To experimentally demonstrate the robustness of information hiding, we observed the sample in Fig. 3b, iii (with perturbation 2) under objectives with different numerical apertures (NAs), which provided different maximum illuminating angles (Fig. 4c-f). Consequently, under the objectives of ×50 (NA = 0.8, with a maximum incidence angle of 53.1°) and ×100 (NA = 0.9, with a maximum incidence angle of 64.2°), the background color transformed into green from the original yellow (Fig. 4e, f). Remarkably, even if placed under a ×100 objective (NA = 0.9), the concealed “SYSU” stayed invisible (Fig. 4f), verifying the angle-independent information hiding ability of the perturbative countersurveillance strategy and its stability while working under ambient conditions.
Compared with previous information encryption methods based on photonic structures, our perturbative strategy exhibits three unique functions, which have seldom been considered before. First, an on-demand cover image can be designed to conceal the real classified information. With the help of the cover camouflage information, the hidden message can be stored without being noticed and transmitted without arousing suspicion even when there is a supervising third party. Second, our method possesses the property of countersurveillance, which means it can self-alarm upon leaking of the concealed information. Third, after a dedicated design of the perturbations used for the information encryption, near-perfect information hiding can be achieved. Since the embedded information can be seen neither from optical spectra nor from SEM images without the correct decryption treatments, it can be concluded that what is concealed in our perturbative strategy is not only the hidden private information but also the existence of the hidden information. To the best of our knowledge, most previous photonic information encryption methods can hardly provide cover information to misguide potential enemies28–31. Although several reported approaches involved the idea of cover information32–34, they did not possess the capabilities of countersurveillance and near-perfect information hiding, as demonstrated by our perturbative strategy. Therefore, it is believed that this perturbation-induced countersurveillance strategy can not only keep private information out of unauthorized scrutiny even if the cover information is transmitted in public channels but also inherently monitor possible attacks, enabling a highly secure paradigm for covert information storage and exchange.
Discussion
In summary, we presented a perturbation-induced countersurveillance strategy by manipulating the structural and thermal perturbations in compound nanosieves. The perturbations in the compound nanosieves helped to conceal private information, while large structural changes were used to construct innocuous cover camouflage to erase the existence of hidden information. With the delicately selected perturbations, near-perfect information hiding was achieved in the perturbative metaoptics system. Through the design of the perturbations, the function of countersurveillance was then induced, enabling self-indicators of possible information attacks.
Beyond these highly desired functions for information encryption, to meet all possible complex demands in real-world scenarios, it is also possible to develop other functions based on our approach. For example, one can implement a multiple information hiding scheme using our perturbative method by introducing fake private information to misguide enemies, since the real information and fake information can be concealed by different perturbations. Moreover, the whole set of this information can be embedded in commercial products, maximally reducing the risk of information leakage during transportation (see Fig. S16 for a detailed discussion). In addition, more functionalities based on perturbative metadevices may be developed when involving metamaterials or metasurfaces with multi-dimensional modulation regarding optical properties38, material phases39 or thermal effects12. Our findings not only demonstrate the promising potential for using perturbations as a powerful dimension in the construction of functional materials but also provide a perturbative strategy for securing a safer world of information and internet of things.
Materials and methods
Numerical simulation
The simulation results were calculated with the finite-difference time-domain (FDTD) method40 using a commercially available FDTD simulation software package from Lumerical Solutions. The average value and root-mean-square (r.m.s.) of the aluminum island film thickness were set as 4 nm and 8 nm, respectively. The corr lengths (average correlation lengths of roughness) were set as 10 × 10 nm2. The size of the unit cell was set as 300 × 300 nm2. The permittivity of aluminum was taken from Palik41. The refractive index of the ZEP resist was measured by a SENTECH Spectroscopic Ellipsometer SE 800 PV (Fig. S17).
Optical characterization
The optical images of the samples were captured using an upright reflective microscope (Olympus BX51M, Olympus Inc.) equipped with a digital camera (DCC1645C, Thorlabs). The narrowband light sources used in this work were obtained by inserting narrowband filters with corresponding wavelengths into the microscope, and all of their bandwidths were 10 nm. The experimental reflection spectra were measured by a spectrograph (SP2500, Princeton Instruments) connected to the microscope, and an objective of ×10 (NA = 0.3) was adopted in the measurements.
Morphology characterization
The SEM images were taken by a Zeiss Auriga-39–34 (Oberkchen, Germany) microscope operating at 5.0 kV. The relative heights of the samples were measured by a profilometer (Alpha-Step D-600, KLA Tencor).
Fabrication
The 100-nm aluminum reflecting layer was deposited onto a silicon substrate by an electron beam evaporation system (DE400, DE Technology) with a speed of 2 Å/s, and a layer of electron resist (ZEP) was spin-coated onto the aluminum reflector, followed by a baking process at 180 °C for 10 min. The designed patterns of holes were written in the ZEP resist with a current of 2 nA, a dose of 210, a resolution of 1 nm and a beam step size of 5 nm using an electron beam lithography system (EBPG5000+, Riath). The sample was subsequently developed in dimethyl benzene for 70 s and then immersed in isopropyl alcohol for 30 s to form the designed distribution of unit holes in the ZEP resist. Then, an aluminum plasmonic cap was coated onto the as-fabricated structures under a sputter current of 100 mA with a duration of 20 s in a Quorum Q150T ES sputtering system to form nanohole-based metasurfaces. The thicknesses of the ZEP resist in the demonstrated badge samples were approximately 390 nm. The thermal processes for perturbation 2 were performed at 180 °C for 1 min using a hotplate (KW-4AH-350, Chemat Scientific).
Supplementary information
Acknowledgements
This work was supported in part by the National Key R&D Program of China (2016YFA0301300), the Key R&D Program of Guangdong Province (Grant No. 2018B030329001), the National Natural Science Foundation of China (61675237, 11761141015, 91750207), the Guangdong Natural Science Funds for Distinguished Young Scholars (2017B030306007), the Guangdong Special Support Program (2017TQ04C487), the Guangdong Natural Science Foundation (2016A030312012), the Pearl River S&T Nova Program of Guangzhou (201806010033), the Guangzhou Science and Technology Project (201805010004), and the National Research Foundation Singapore, and the National Natural Science Foundation of China (NSFC) Joint Grant NRF2017NRF-NSFC002–015. This research was also partially supported by the National Research Foundation, Prime Minister’s Office, Singapore, under its Competitive Research Programme (CRP award no. NRF-CRP15–2015–03). We sincerely thank Prof. Na Liu (University of Heidelberg) for her helpful discussions and useful advice.
Author's contributions
Z.K.Z., C.W.Q., and X.H.W. conceived the idea and supervised the project. J.C.X. and Z.K.Z. performed the sample fabrications and numerical simulations. J.C.X, L.L., and C.G. conducted the sample characterizations. Z.K.Z., J.C.X, C.W.Q., S.S., and D.L. analyzed the experimental and theoretical results. Z.K.Z., J.C.X, C.W.Q., and X.H.W. co-wrote the paper. J.C.X. and Z.K.Z. contributed equally to this work. All the authors discussed the results.
Conflict of interest
The authors declare that they have no conflict of interest.
Contributor Information
Zhang-Kai Zhou, Email: zhouzhk@mail.sysu.edu.cn.
Cheng-Wei Qiu, Email: chengwei.qiu@nus.edu.sg.
Xue-Hua Wang, Email: wangxueh@mail.sysu.edu.cn.
Supplementary information
Supplementary information is available for this paper at 10.1038/s41377-019-0212-4.
References
- 1.Poddubny A, et al. Hyperbolic metamaterials. Nat. Photonics. 2013;7:948–957. doi: 10.1038/nphoton.2013.243. [DOI] [Google Scholar]
- 2.Schuller JA, et al. Plasmonics for extreme light concentration and manipulation. Nat. Mater. 2010;9:193–204. doi: 10.1038/nmat2630. [DOI] [PubMed] [Google Scholar]
- 3.Khanikaev AB, Shvets G. Two-dimensional topological photonics. Nat. Photonics. 2017;11:763–773. doi: 10.1038/s41566-017-0048-5. [DOI] [Google Scholar]
- 4.Xu MS, et al. Graphene-like two-dimensional materials. Chem. Rev. 2013;113:3766–3798. doi: 10.1021/cr300263a. [DOI] [PubMed] [Google Scholar]
- 5.Kildishev AV, Boltasseva A, Shalaev VM. Planar photonics with metasurfaces. Science. 2013;339:1232009. doi: 10.1126/science.1232009. [DOI] [PubMed] [Google Scholar]
- 6.Zhang S, et al. Plasmon-induced transparency in metamaterials. Phys. Rev. Lett. 2008;101:047401. doi: 10.1103/PhysRevLett.101.047401. [DOI] [PubMed] [Google Scholar]
- 7.Valentine J, et al. Three-dimensional optical metamaterial with a negative refractive index. Nature. 2008;455:376–379. doi: 10.1038/nature07247. [DOI] [PubMed] [Google Scholar]
- 8.Zhang X, Liu ZW. Superlenses to overcome the diffraction limit. Nat. Mater. 2008;7:435–441. doi: 10.1038/nmat2141. [DOI] [PubMed] [Google Scholar]
- 9.Khorasaninejad M, Capasso F. Metalenses: versatile multifunctional photonic components. Science. 2017;358:eaam8100. doi: 10.1126/science.aam8100. [DOI] [PubMed] [Google Scholar]
- 10.Wang SM, et al. A broadband achromatic metalens in the visible. Nat. Nanotechnol. 2018;13:227–232. doi: 10.1038/s41565-017-0052-4. [DOI] [PubMed] [Google Scholar]
- 11.Ni XJ, et al. An ultrathin invisibility skin cloak for visible light. Science. 2015;349:1310–1314. doi: 10.1126/science.aac9411. [DOI] [PubMed] [Google Scholar]
- 12.Li Y, et al. Thermal meta-device in analogue of zero-index photonics. Nat. Mater. 2019;18:48–54. doi: 10.1038/s41563-018-0239-6. [DOI] [PubMed] [Google Scholar]
- 13.Yu NF, Capasso F. Flat optics with designer metasurfaces. Nat. Mater. 2014;13:139–150. doi: 10.1038/nmat3839. [DOI] [PubMed] [Google Scholar]
- 14.Minovich AE, et al. Functional and nonlinear optical metasurfaces. Laser Photonics Rev. 2015;9:195–213. doi: 10.1002/lpor.201400402. [DOI] [Google Scholar]
- 15.Lin D, et al. Dielectric gradient metasurface optical elements. Science. 2014;345:298–302. doi: 10.1126/science.1253213. [DOI] [PubMed] [Google Scholar]
- 16.Miao ZQ, et al. Widely tunable terahertz phase modulation with gate-controlled graphene metasurfaces. Phys. Rev. X. 2015;5:041027. [Google Scholar]
- 17.Stockman MI, et al. Roadmap on plasmonics. J. Opt. 2018;20:043001. doi: 10.1088/2040-8986/aaa114. [DOI] [Google Scholar]
- 18.Vahala KJ. Optical microcavities. Nature. 2003;424:839–846. doi: 10.1038/nature01939. [DOI] [PubMed] [Google Scholar]
- 19.Baba T. Slow light in photonic crystals. Nat. Photonics. 2008;2:465–473. doi: 10.1038/nphoton.2008.146. [DOI] [Google Scholar]
- 20.Bittner S, et al. Suppressing spatiotemporal lasing instabilities with wave-chaotic microcavities. Science. 2018;361:1225–1231. doi: 10.1126/science.aas9437. [DOI] [PubMed] [Google Scholar]
- 21.Ozbay E. Plasmonics: merging photonics and electronics at nanoscale dimensions. Science. 2006;311:189–193. doi: 10.1126/science.1114849. [DOI] [PubMed] [Google Scholar]
- 22.Wei H, et al. Plasmon waveguiding in nanowires. Chem. Rev. 2018;118:2882–2926. doi: 10.1021/acs.chemrev.7b00441. [DOI] [PubMed] [Google Scholar]
- 23.Kuznetsov AI, et al. Optically resonant dielectric nanostructures. Science. 2016;354:aag2472. doi: 10.1126/science.aag2472. [DOI] [PubMed] [Google Scholar]
- 24.Benz F, et al. Single-molecule optomechanics in “picocavities”. Science. 2016;354:726–729. doi: 10.1126/science.aah5243. [DOI] [PubMed] [Google Scholar]
- 25.Zhou ZK, et al. Quantum plasmonics get applied. Prog. Quantum Electron. 2019;65:1–20. doi: 10.1016/j.pquantelec.2019.04.002. [DOI] [Google Scholar]
- 26.Hu CQ, et al. New design for highly durable infrared-reflective coatings. Light. Sci. Appl. 2018;7:17175. doi: 10.1038/lsa.2017.175. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 27.Matlack KH, et al. Designing perturbative metamaterials from discrete models. Nat. Mater. 2018;17:323–328. doi: 10.1038/s41563-017-0003-3. [DOI] [PubMed] [Google Scholar]
- 28.Li JX, et al. Addressable metasurfaces for dynamic holography and optical information encryption. Sci. Adv. 2018;4:eaar6768. doi: 10.1126/sciadv.aar6768. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 29.Dong FL, Chu WG. Multichannel-independent information encoding with optical metasurfaces. Adv. Mater. 2019;31:1804921. doi: 10.1002/adma.201804921. [DOI] [PubMed] [Google Scholar]
- 30.Zhao RZ, et al. Multichannel vectorial holographic display and encryption. Light. Sci. Appl. 2018;7:95. doi: 10.1038/s41377-018-0091-0. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 31.Yoon G, et al. “Crypto-display” in dual-mode metasurfaces by simultaneous control of phase and spectral responses. ACS Nano. 2018;12:6421–6428. doi: 10.1021/acsnano.8b01344. [DOI] [PubMed] [Google Scholar]
- 32.Hu DJ, et al. Laser-splashed three-dimensional plasmonic nanovolcanoes for steganography in angular anisotropy. ACS Nano. 2018;12:9233–9239. doi: 10.1021/acsnano.8b03964. [DOI] [PubMed] [Google Scholar]
- 33.Liu HL, et al. Tunable resonator-upconverted emission (TRUE) color printing and applications in optical security. Adv. Mater. 2019;31:1807900. doi: 10.1002/adma.201807900. [DOI] [PubMed] [Google Scholar]
- 34.Xue JC, et al. Scalable, full-colour and controllable chromotropic plasmonic printing. Nat. Commun. 2015;6:8906. doi: 10.1038/ncomms9906. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 35.Lo HK, Curty M, Tamaki K. Secure quantum key distribution. Nat. Photonics. 2014;8:595–604. doi: 10.1038/nphoton.2014.149. [DOI] [Google Scholar]
- 36.Scarani V, et al. The security of practical quantum key distribution. Rev. Mod. Phys. 2009;81:1301–1350. doi: 10.1103/RevModPhys.81.1301. [DOI] [Google Scholar]
- 37.Shor PW, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000;85:441–444. doi: 10.1103/PhysRevLett.85.441. [DOI] [PubMed] [Google Scholar]
- 38.Zhang L, et al. Advances in full control of electromagnetic waves with metasurfaces. Adv. Optical Mater. 2016;4:818–833. doi: 10.1002/adom.201500690. [DOI] [Google Scholar]
- 39.Folland TG, et al. Reconfigurable infrared hyperbolic metasurfaces using phase change materials. Nat. Commun. 2018;9:4371. doi: 10.1038/s41467-018-06858-y. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 40.Farjadpour A, et al. Improving accuracy by subpixel smoothing in the finite-difference time domain. Opt. Lett. 2006;31:2972–2974. doi: 10.1364/OL.31.002972. [DOI] [PubMed] [Google Scholar]
- 41.Palik, E. D. Handbook of Optical Constants of Solids (Academic Press, San Diego, 1998).
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.