Abstract
We introduce a Fourier analysis method to design temporal cloaks for hiding events in time domain. The cloaks are constructed with two linear time-invariant filters with different transfer functions, which can create a temporal gap and then closed it orderly, making any events occurring during the gap not detectable outside. We further reveal that even a no-gap temporal cloak can also hide events. All the analytical results are verified by fast Fourier transformation simulations.
©2013 Optical Society of America
1. Introduction
Since the pioneering work on spatial invisibility cloaks for rendering any object in a specific region of space invisible [1,2], rapid developments in artificial composite materials has allowed different kinds of spatial invisibility cloaks to be designed theoretically and realized experimentally [3–8]. On the other hand, another kind of distant cloaking devices based on complementary media has been proposed and numerically demonstrated to not only hide distant objects [9] but also create illusions [10]. Recently, the concept of cloaking has even been theoretically and experimentally extended to cloaking in time, using a device that hides events occurring during a specific time window [11,12].
No matter whether the cloaks are for cloaking objects or for cloaking events, they are mainly designed based upon the popular transformation optics method [3,11,13]. Here, we introduce Fourier analysis method to constitute temporal cloaks to hide events in time domain, instead of designing spatial invisibility cloaks for concealing objects or creating optical illusions [14–17]. By synthesizing two linear time-invariant filters with different transfer functions, we can orderly create and close a temporal gap, in which any events occurring will not be detectable to the outside observers. Further analyses reveal that, analogue to distant spatial cloaks, hiding event outside the no-gap temporal cloaks is also feasible. In this case, the events can completely be compensated for by a conjugated temporal filter as nothing occurs. Theoretical analytical results are well confirmed by fast Fourier transformation numerical simulations.
2. Theoretical analysis
For an event (wave packet), it can be described as complex amplitude in time domain and frequency spectrum in frequency domain, respectively [18,19]
andrespectively, where is the time, is the normalized frequency with being the angular frequency and the center frequency, is the imaginary unit, and represent the Fourier transform operator and inverse Fourier transform operator, respectively.It is known from phase-shift theorem that a phase shift in frequency domain will lead to delay of an event in time domain [20,21]. For example, to give an incident event a time delay around the center time , one can add a phase shift to its frequency spectrum . Therefore, to create a temporal gap, we can firstly synthesize a temporal filter with transfer function,
in frequency domain. Then the transmission frequency spectrum of the incident event after the filter becomes toTaking inverse Fourier transform on and employing shift theorem, we get the complex amplitude of transmission event in time domain asWe see from Eq. (5) that is not continuous now, and a temporal gap with width is opened around the center time in time domain.To close the opening time gap, we can synthesize another filter with transfer function, where denotes the conjugation operator. In this case, the transfer function of the second filter can be written as
Behind the second filter, transmission frequency spectrum of the incident event becomes towhere is a constant. Taking inverse Fourier transform on , we can get the output signal of event in time domainwhich is the same as that of the incident event .Comparing and , we see that plays the role of closing the temporal gap opened by , making the output signal continuous again and looked as nothing occurs in time domain. Therefore, when an interferential event occurs during the temporal gap, from Eq. (5) we see that , meaning that shows no effect on the output signal after the time window. Thus, the output signal is still observed as . However, when the interferential event occurs outside the temporal gap, the output signal becomes into [see Eq. (5)], indicating that interferential is detectable.
The above temporal filters can be implemented by using a classical pulse shaping configuration consisted of a pair of gratings, lenses, and masks [20,22], which was employed in a recent temporal cloak set-up [12] as shown in Fig. 1 . The role of the masks played is to modify the phase of frequency spectrum of the incident event through precise control over their thickness and/or refractive index . From Eq. (3) we see that when optical phase change is , then and should satisfy , where is the speed of light in vacuum. By modulating and/or of the masks, we can open a time window by the first grating, lens, and mask system and then close the time window by the second grating, lens, and mask system orderly. For instance, choosing vacuum (, constant) as the medium of the masks but changing the thickness of the first mask while the second mask , we can create and then close a temporal gap in time domain in sequence. The thickness change of the masks can be realized by moving the two mirrors attached on the surfaces of the masks [12]: One mirror reflects the frequency spectrum before and the other reflects the frequency spectrum after . In this configuration, the incident event occurs before the first filter and the interferential event occurs between these two filters separately. After the incident event passing through the first filter, it interacts with interferential event. Then the observer can detect output signal behind the second filter. So incident event occurs earlier than interferential event and output signal is detected after interaction of two events.
3. Numerical simulations
To verify the above analytical results, we employ fast Fourier transform method [21,23] to simulate an event occurs in the above filtering system. Since temporal filters act on a finite time slot, incident event is chosen occurring when filters are working. This avoids that staring or stopping filter will cause time gap not open. The incident event is set to be a Gauss beam with [Fig. 2(a) ]. The interferential event, read as [Fig. 2(b)], occurs behind the first temporal filter during the time interval (fromto ), where the two events are mixed together. Behind the second filter, we get the total output signal.
Figure 2(c) shows the output signal as the cloak is off [setting , meaning that two filters are removed and no time window opens]. Obviously, the incident event [Fig. 2(a)] is disturbed by the interferential event. However, when two filters are employed (the time gap is orderly opened and closed), a completely different effect happened. The output signal [Fig. 2(d)] is exactly the same as that of the incident event and no any information of the interferential event involved.
To know the effect of an interferential event occurring at the edge of temporal gap but instead of during the gap, we simulate the output signal [Fig. 2(f)] as the interferential event is assumed to be [see Fig. 2(e)], which indicates that the interferential event occurs during the time interval of from to but instead of from to . Comparing Fig. 2(f) and Fig. 2(a), we see that the output signal is also disturbed by the interferential event. Consequently, we conclude that only those interferential events occurred during the time gap can be canceled completely by such temporal filtering system.
Similar to distant spatial cloaks [9,10], which can cloak objects at a distance outside the cloaks and be regarded as a conjugated spatial filter [14–17], we can also construct a temporal cloak without time window to conceal events. For an interferential eventin frequency domain, if there is a temporal filter with transfer function , then behind the filter, the event will completely be compensated for and not be detectable. Consequently, only incident event is measurable. In addition, to conceal an interferential event with amplitude change, we can employ a temporal filter with transfer function to compensate both phase and amplitude simultaneously.
Such conjugated temporal filter with transfer function can also be constructed with a grating-lens-mask system, where the mask can theoretically be used to tune the transmission coefficient of the interferential event so as to synthesize such [20]. Here we introduce another technique to get a distant temporal cloak. For an interferential event occurs in a positive dispersive medium [right, Fig. 3(a) ], we can design a cloak constructed with a negative dispersive medium [left, Fig. 3(a)] to compensate for the effect of the interferential event. In this case, an interferential event occurs in a positive dispersive medium can be written as with in frequency domain, while the corresponding conjugated temporal cloak should have a transfer function , which can be realized by using a negative dispersive medium with.
In the simulation, supposing that during an incident event as that of Fig. 2(a) occurs, another interferential event with complex amplitude in frequency domain also occurs at [For comparison, we show in Fig. 3 (b) the amplitude of the interferential event in time domain]. Figure 3(c) presents the simulated output signal. We can see that the output signal distinguishes from the incident event [Fig. 2(a)], meaning that the incident event is obviously disturbed by interferential event. However, as a temporal filter with transfer function [Fig. 3(d) shows its complex amplitude in time domain] at is used to compensate for the interferential event, we see that the output signal [Fig. 3(e)] is exactly recovered into the form of the incident event [Fig. 2(a)], indicating that interferential event is concealed completely as nothing occurs.
4. Conclusions and discussions
To conclude, we have introduced a Fourier analysis method for constituting temporal cloaks to hide events in time domain. The cloaks can either be constructed by synthesizing two linear time-invariant filters with different transfer functions to open and close a temporal gap orderly, so that any events occurring during the gap are not detectable outside, or be designed based upon temporal compensation to make event outside the cloaks not detectable. All the analytical results are verified by numerical simulations. Our results may provide another way of constructing time cloaks for interesting applications in such fields as temporal imaging and sensing etc.
Acknowledgments
This work was supported by 973 Program (2011CB933600) and NSFC (Grants 60925020 and 11274247). K. D. W. is also supported by the academic award for excellent Ph.D. Candidates funded by Ministry of Education of China (Grant 5052011202009).
References and links
1. U. Leonhardt, “Optical Conformal Mapping,” Science 312(5781), 1777–1780 (2006). [CrossRef] [PubMed]
2. J. B. Pendry, D. Schurig, and D. R. Smith, “Controlling Electromagnetic Fields,” Science 312(5781), 1780–1782 (2006). [CrossRef] [PubMed]
3. H. Chen, C. T. Chan, and P. Sheng, “Transformation optics and metamaterials,” Nat. Mater. 9(5), 387–396 (2010). [CrossRef] [PubMed]
4. D. Schurig, J. J. Mock, B. J. Justice, S. A. Cummer, J. B. Pendry, A. F. Starr, and D. R. Smith, “Metamaterial Electromagnetic Cloak at Microwave Frequencies,” Science 314(5801), 977–980 (2006). [CrossRef] [PubMed]
5. J. Valentine, J. Li, T. Zentgraf, G. Bartal, and X. Zhang, “An optical cloak made of dielectrics,” Nat. Mater. 8(7), 568–571 (2009). [CrossRef] [PubMed]
6. L. H. Gabrielli, J. Cardenas, C. B. Poitras, and M. Lipson, “Silicon nanostructure cloak operating at optical frequencies,” Nat. Photonics 3(8), 461–463 (2009). [CrossRef]
7. T. Ergin, N. Stenger, P. Brenner, J. B. Pendry, and M. Wegener, “Three-dimensional invisibility cloak at optical wavelengths,” Science 328(5976), 337–339 (2010). [CrossRef] [PubMed]
8. B. Zhang, Y. Luo, X. Liu, and G. Barbastathis, “Macroscopic Invisibility Cloak for Visible Light,” Phys. Rev. Lett. 106(3), 033901 (2011). [CrossRef] [PubMed]
9. Y. Lai, H. Y. Chen, Z.-Q. Zhang, and C. T. Chan, “Complementary Media Invisibility Cloak that Cloaks Objects at a Distance Outside the Cloaking Shell,” Phys. Rev. Lett. 102(9), 093901 (2009). [CrossRef] [PubMed]
10. Y. Lai, J. Ng, H. Y. Chen, D. Z. Han, J. J. Xiao, Z.-Q. Zhang, and C. T. Chan, “Illusion Optics: The Optical Transformation of an Object into Another Object,” Phys. Rev. Lett. 102(25), 253902 (2009). [CrossRef] [PubMed]
11. M. W. McCall, A. Favaro, P. Kinsler, and A. Boardman, “A spacetime cloak, or a history editors,” J. Opt. 13(2), 024003 (2011). [CrossRef]
12. M. Fridman, A. Farsi, Y. Okawachi, and A. L. Gaeta, “Demonstration of temporal cloaking,” Nature 481(7379), 62–65 (2012). [CrossRef] [PubMed]
13. A. J. Ward and J. B. Pendry, “Refraction and geometry in Maxwell’s equations,” J. Mod. Opt. 43(4), 773–793 (1996). [CrossRef]
14. K. Wu and G. P. Wang, “General insight into the complementary medium-based camouflage devices from Fourier optics,” Opt. Lett. 35(13), 2242–2244 (2010). [CrossRef] [PubMed]
15. K. Wu, Q. Cheng, and G. P. Wang, “Fourier optics theory for invisibility cloaks,” J. Opt. Soc. Am. B 28(6), 1467–1474 (2011). [CrossRef]
16. K. Wu and G. P. Wang, “Hiding objects and creating illusions above a carpet filter using a Fourier optics approach,” Opt. Express 18(19), 19894–19901 (2010). [CrossRef] [PubMed]
17. Q. Cheng, K. Wu, and G. P. Wang, “All dielectric macroscopic cloaks for hiding objects and creating illusions at visible frequencies,” Opt. Express 19(23), 23240–23248 (2011). [CrossRef] [PubMed]
18. B. H. Kolner, “Space-Time Duality and the Theory of Temporal Imaging,” IEEE J. Quantum Electron. 30(8), 1951–1963 (1994). [CrossRef]
19. A. W. Lohmann and D. Mendlovic, “Temporal filtering with time lenses,” Appl. Opt. 31(29), 6212–6219 (1992). [CrossRef] [PubMed]
20. J. W. Goodman, Introduction to Fourier Optics, 3rd ed. (McGraw-Hill, 2005).
21. R. Bracewell, The Fourier Transform and Its Applications, (McGraw Hill, 2000).
22. A. M. Weiner, “Femtosecond pulse shaping using spatial light modulators,” Rev. Sci. Instrum. 71(5), 1929–1960 (2000). [CrossRef]
23. J. W. Cooley and J. W. Tukey, “An algorithm for the machine computation of the complex Fourier series,” Math. Comput. 19(90), 297–301 (1965). [CrossRef]