Fighting against the falsification of valuable items remains a crucial social-threatening challenge stimulating a never-ending search for novel anti-counterfeiting strategies. The demanding security labels must simultaneously address multiple requirements (high density of the recorded information, high protection degree, .) and be realized scalable and inexpensive technologies. Here, the direct reproducible femtosecond-laser patterning of thin glass-supported amorphous (α-)Si films is proposed for optical information encryption and the scalable and highly reproducible fabrication of security labels composed of Raman-active hemispherical Si nanoparticles (NPs). Laser printing conditions allow the precise control of the diameter of the formed NPs ensuring translation of their dipolar Mie resonance position within the entire visible spectral range. Two-temperature molecular dynamics simulations clarify the origin of α-Si NP formation by rupture of the molten Si layer driven by a negative GPa-range pressure near the liquid-solid interface. Arrangement of the laser-printed Mie-resonant NP allows the creation of hidden security labels offering several easy-to-realize information encryption strategies (for example, local laser-induced post-crystallization or mixing Mie-resonant and non-resonant NPs), additional protection modalities, facile Raman mapping readout and dense information recording (up to 60 000 dots per inch) close to the optical diffraction limit. The developed fabrication strategy is simple, inexpensive, and scalable and can be realized based on cheap Earth-abundant materials and commercially-available equipment justifying its practical applicability and attractiveness for anti-counterfeit and security applications.

Download full-text PDF

Source
http://dx.doi.org/10.1039/d2nr04179kDOI Listing

Publication Analysis

Top Keywords

security labels
12
optical encryption
8
security
5
security labeling
4
labeling optical
4
encryption enabled
4
enabled laser-printed
4
laser-printed silicon
4
silicon mie
4
mie resonators
4

Similar Publications

Contrastive Graph Representation Learning with Adversarial Cross-View Reconstruction and Information Bottleneck.

Neural Netw

January 2025

School of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, 710049, China; Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, 710049, China. Electronic address:

Graph Neural Networks (GNNs) have received extensive research attention due to their powerful information aggregation capabilities. Despite the success of GNNs, most of them suffer from the popularity bias issue in a graph caused by a small number of popular categories. Additionally, real graph datasets always contain incorrect node labels, which hinders GNNs from learning effective node representations.

View Article and Find Full Text PDF

Procalcitonin-guided duration of antibiotic treatment in children hospitalised with confirmed or suspected bacterial infection in the UK (BATCH): a pragmatic, multicentre, open-label, two-arm, individually randomised, controlled trial.

Lancet Child Adolesc Health

January 2025

Department of Infectious Diseases, Alder Hey Children's NHS Foundation Trust, Liverpool, UK; Department of Clinical Infection, Microbiology, and Immunology, Institute of Infection, Veterinary, and Ecological Sciences, University of Liverpool, Liverpool, UK. Electronic address:

Background: Procalcitonin is a rapid response biomarker specific for bacterial infection, which is not routinely used in the UK National Health Service. We aimed to assess whether using a procalcitonin-guided algorithm would safely reduce the duration of antibiotic therapy compared with usual care, in which C-reactive protein is the commonly used biomarker.

Methods: The BATCH trial was a pragmatic, multicentre, open-label, parallel, two-arm, individually randomised, controlled trial conducted in 15 hospitals in England and Wales.

View Article and Find Full Text PDF

IoT (Internet of Things) networks are vulnerable to network viruses and botnets, while facing serious network security issues. The prediction of payload states in IoT networks can detect network attacks and achieve early warning and rapid response to prevent potential threats. Due to the instability and packet loss of communications between victim network nodes, the constructed protocol state machines of existing state prediction schemes are inaccurate.

View Article and Find Full Text PDF

Texture is a significant component used for several applications in content-based image retrieval. Any texture classification method aims to map an anonymously textured input image to one of the existing texture classes. Extensive ranges of methods for labeling image texture were proposed earlier.

View Article and Find Full Text PDF

Enhancing Time Series Anomaly Detection: A Knowledge Distillation Approach with Image Transformation.

Sensors (Basel)

December 2024

Division of Computer Science & Artificial Intelligence, Dongguk University, Seoul 04620, Republic of Korea.

Anomaly detection is critical in safety-sensitive fields, but faces challenges from scarce abnormal data and costly expert labeling. Time series anomaly detection is relatively challenging due to its reliance on sequential data, which imposes high computational and memory costs. In particular, it is often composed of real-time collected data that tends to be noisy, making preprocessing an essential step.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!