173
Views
0
CrossRef citations to date
0
Altmetric
Novel Applications

An anti-counterfeit technique using elastic and optical properties of liquid crystals

, &
Pages 1617-1623 | Received 30 Nov 2022, Accepted 16 Feb 2023, Published online: 01 Mar 2023

References

  • Dunbar B. A detailed look at steganographic techniques and their use in an open-systems environment. SANS Inst; 2002. (Report number 1).
  • Babu KR, Kumar SU, Babu AV. A survey on cryptography and steganography methods for information security. Int J Comput Appl. 2010;12(3):13–17.
  • Tripathi A, Chakraborty J, Anzum S, et al. A new modified method of cryptography using Caesar cipher. Am J Electron Commun. 2021;1(4):13–15. DOI:10.15864/ajec.1402
  • Arppe-Tabbara R, Tabbara M, Sørensen TJ. Versatile and validated optical authentication system based on physical unclonable functions. ACS Appl Mater Interfaces. 2019;11(6):6475–6482.
  • Kotas WA. A brief history of cryptography. Chancellor’s Honors Program Projects; 2000. Available from: https://trace.tennessee.edu/utk_chanhonoproj/398
  • Gisin N, Thew R. Quantum communication. Nat Photonics. 2007;1(3):165–171.
  • Pirandola S, Andersen UL, Banchi L, et al. Advances in quantum cryptography. Adv Opt Photonics. 2020;12(4):1012–1236.
  • Zhang J, Chen H, Gong L, et al. The current research of IoT security. In IEEE Fourth International Conference on Data Science in Cyberspace (DSC). Hangzhou, China. 2019. p. 346–353.
  • Schiller E, Aidoo A, Fuhrer J, et al. Landscape of IoT security. Comput Sci Rev. 2022;44:100467.
  • Chacko A, Hayajneh T. Security and privacy issues with IoT in healthcare. EAI Endorsed Trans Pervasive Health Technol. 2018;4:e2.
  • Muthamma K, Sunil D, Shetty P. Carbon dots as emerging luminophores in security inks for anti-counterfeit applications-an up-to-date review. Appl Mater Today. 2021;23:101050.
  • Deng Z, Li L, Tang P, et al. Controllable surface-grafted MXene inks for electromagnetic wave modulation and infrared anti-counterfeiting applications. ACS Nano. 2022;16(10):16976–16986. DOI:10.1021/acsnano.2c07084
  • Jiang K, Zhang L, Lu J, et al. Triple-mode emission of carbon dots: applications for advanced anti-counterfeiting. Angew Chem. 2016;128(25):7347–7351. DOI:10.1002/ange.201602445
  • Liu X, Wang Y, Li X, et al. Binary temporal upconversion codes of Mn2+-activated nanoparticles for multilevel anti-counterfeiting. Nat Commun. 2017;8(1):899. DOI:10.1038/s41467-017-00916-7
  • Kumar P, Singh S, Gupta BK. Future prospects of luminescent nanomaterial based security inks: from synthesis to anti-counterfeiting applications. Nanoscale. 2016;8(30):14297–14340.
  • Yu X, Zhang H, Yu J. Luminescence anti-counterfeiting: from elementary to advanced. Aggregate. 2021;2(1):20–34.
  • Ding M, Dong B, Lu Y, et al. Energy manipulation in lanthanide-doped core–shell nanoparticles for tunable dual-mode luminescence toward advanced anti-counterfeiting. Adv Mater. 2020;32(45):2002121. DOI:10.1002/adma.202002121
  • Irie M, Fukaminato T, Sasaki T, et al. A digital fluorescent molecular photoswitch. Nature. 2002;420(6917):759–760. DOI:10.1038/420759a
  • Zhang C, Wang B, Li W, et al. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption. Nat Commun. 2017;8(1):1138. DOI:10.1038/s41467-017-01248-2
  • Tu HY, Cheng CJ, Chen ML. Optical image encryption based on polarization encoding by liquid crystal spatial light modulators. J Opt A: Pure Appl Opt. 2004;6(6):524–528.
  • Li K, Wang J, Cai W, et al. Electrically switchable, polarization-sensitive encryption based on aluminum nanoaperture arrays integrated with polymer-dispersed liquid crystals. Nano Lett. 2021;21(17):7183–7190. DOI:10.1021/acs.nanolett.1c01947
  • Barrera JF, Henao R, Tebaldi M, et al. Multiplexing encrypted data by using polarized light. Opt Commun. 2006;260(1):109–112. DOI:10.1016/j.optcom.2005.10.053
  • Schwartz M, Lenzini G, Geng Y, et al. Cholesteric liquid crystal shells as enabling material for information-rich design and architecture. Adv Mater. 2018;30(30):1707382.
  • Lenzini G, Ouchani S, Roenne P, et al. Security in the shell: an optical physical unclonable function made of shells of cholesteric liquid crystals. 2017 IEEE Workshop on Information Forensics and Security (WIFS). Rennes, France; 2017. p.1–6.
  • Xu FF, Gong ZL, Zhong YW, et al. Wavelength-tunable single-mode microlasers based on photoresponsive pitch modulation of liquid crystals for information encryption. AAAS Res. 2020;2020:6539431.
  • Gollapelli B, Pathinti RS, Vallamkondu J. Carbon quantum dots doped cholesteric liquid crystal films and microdroplets for anti-counterfeiting. ACS Appl Nano Mater. 2022;5(8):11912–11922.
  • Park G, Yoon DK. Security use of bilayer dichroic films made of liquid crystal polymer networks. J Inf Disp. 2021;22(3):173–178.
  • Shi Y, Han J, Jin X, et al. Chiral luminescent liquid crystal with multi-state-reversibility: breakthrough in advanced anti-counterfeiting materials. Adv Sci. 2022;9(20):2201565.
  • Yu JS, Kim JH. Hacking detection based on the elastic properties of liquid crystals in different phases. Opt Express. 2021;29(24):39352–39361.
  • Park B, Jung Y, Choi HH, et al. Thermal and optical stabilities of photoisomerizable polyimide layers for nematic liquid crystal alignments. Jpn J Appl Phys. Part 1, 1998;37(10R):5663.
  • Yariv A, Yeh P. Optical waves in crystals. New York: Wiley; 1984.
  • Horn RG. Refractive indices and order parameters of two liquid crystals. J Phys. 1978;39(1):105–109.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.