True image construction in quantum-secured single-pixel imaging under spoofing attack
- URL: http://arxiv.org/abs/2312.03465v3
- Date: Thu, 4 Jul 2024 11:19:12 GMT
- Title: True image construction in quantum-secured single-pixel imaging under spoofing attack
- Authors: Jaesung Heo, Taek Jeong, Nam Hun Park, Yonggi Jo,
- Abstract summary: We introduce a quantum-secured single-pixel imaging (QS-SPI) technique designed to withstand spoofing attacks.
Unlike previous quantum-secured protocols that impose a threshold error rate limiting their operation, our approach not only identifies spoofing attacks but also facilitates the reconstruction of a true image.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper, we introduce a quantum-secured single-pixel imaging (QS-SPI) technique designed to withstand spoofing attacks, wherein adversaries attempt to deceive imaging systems with fake signals. Unlike previous quantum-secured protocols that impose a threshold error rate limiting their operation, even with the existence of true signals, our approach not only identifies spoofing attacks but also facilitates the reconstruction of a true image. Our method involves the analysis of a specific mode correlation of a photon-pair, which is independent of the mode used for image construction, to check security. Through this analysis, we can identify both the targeted image region by the attack and the type of spoofing attack, enabling reconstruction of the true image. A proof-of-principle demonstration employing polarization-correlation of a photon-pair is provided, showcasing successful image reconstruction even under the condition of spoofing signals 2000 times stronger than the true signals. We expect our approach to be applied to quantum-secured signal processing such as quantum target detection or ranging.
Related papers
- Proof-of-principle experimental demonstration of quantum secure imaging based on quantum key distribution [6.514809059861059]
We present a quantum secure imaging (QSI) scheme based on the phase encoding and weak + vacuum decoy-state BB84 protocol of quantum key distribution (QKD)
In the experiment, we obtained the image of the object quickly and efficiently by measuring the signal photon counts with single-photon detector (SPD)
Our imaging system uses a laser with invisible wavelength of 1550 nm, whose intensity is low as single-photon, that can realize weak-light imaging and is immune to the stray light or air turbulence, thus it will become a better choice for quantum security radar against intercept-resend jamming attacks
arXiv Detail & Related papers (2024-10-02T01:59:14Z) - Demonstration of Lossy Linear Transformations and Two-Photon Interference on a Photonic Chip [78.1768579844556]
We show that engineered loss, using an auxiliary waveguide, allows one to invert the spatial statistics from bunching to antibunching.
We study the photon statistics within the loss-emulating channel and observe photon coincidences, which may provide insights into the design of quantum photonic integrated chips.
arXiv Detail & Related papers (2024-04-09T06:45:46Z) - Single-photon based Quantum Key Distribution and Random Number
Generation schemes and their device-independent security analysis [0.0]
We present a device-independent quantum key distribution scheme secure even against no-signaling eavesdropping.
The scheme is inspired by the Tan-Walls-Collett (1991) interferometric setup, which used the entangled state of two exit modes of a 50-50 beamsplitter.
arXiv Detail & Related papers (2023-11-13T16:32:02Z) - Quantum-secured single-pixel imaging with enhanced security [0.1641968752143392]
Our method can detect any attempts to deceive it by exploiting a non-classical correlation of photon pairs.
A security analysis based on polarization-correlation has been conducted, demonstrating that our method has improved security compared to existing quantum-secured imaging.
arXiv Detail & Related papers (2022-09-14T01:44:26Z) - Quantum Limits to Classically Spoofing an Electromagnetic Signal [0.0]
Spoofing an electromagnetic signal involves measuring its properties and preparing a spoof signal that is a close enough copy to fool a receiver.
We show that a spoofer optimally employs classical information on the state of the transmitted signal.
We show that the quantum limitations on classical spoofing remain significant even in the large mean-photon-number regime.
arXiv Detail & Related papers (2022-01-24T23:11:33Z) - Asymmetric Modality Translation For Face Presentation Attack Detection [55.09300842243827]
Face presentation attack detection (PAD) is an essential measure to protect face recognition systems from being spoofed by malicious users.
We propose a novel framework based on asymmetric modality translation forPAD in bi-modality scenarios.
Our method achieves state-of-the-art performance under different evaluation protocols.
arXiv Detail & Related papers (2021-10-18T08:59:09Z) - Single-photon nonlocality in quantum networks [55.41644538483948]
We show that the nonlocality of single-photon entangled states can nevertheless be revealed in a quantum network made only of beamsplitters and photodetectors.
Our results show that single-photon entanglement may constitute a promising solution to generate genuine network-nonlocal correlations useful for Bell-based quantum information protocols.
arXiv Detail & Related papers (2021-08-03T20:13:24Z) - Conditional preparation of non-Gaussian quantum optical states by
mesoscopic measurement [62.997667081978825]
Non-Gaussian states of an optical field are important as a proposed resource in quantum information applications.
We propose a novel approach involving displacement of the ancilla field into the regime where mesoscopic detectors can be used.
We conclude that states with strong Wigner negativity can be prepared at high rates by this technique under experimentally attainable conditions.
arXiv Detail & Related papers (2021-03-29T16:59:18Z) - Adversarial Examples Detection beyond Image Space [88.7651422751216]
We find that there exists compliance between perturbations and prediction confidence, which guides us to detect few-perturbation attacks from the aspect of prediction confidence.
We propose a method beyond image space by a two-stream architecture, in which the image stream focuses on the pixel artifacts and the gradient stream copes with the confidence artifacts.
arXiv Detail & Related papers (2021-02-23T09:55:03Z) - Detecting Patch Adversarial Attacks with Image Residuals [9.169947558498535]
A discriminator is trained to distinguish between clean and adversarial samples.
We show that the obtained residuals act as a digital fingerprint for adversarial attacks.
Results show that the proposed detection method generalizes to previously unseen, stronger attacks.
arXiv Detail & Related papers (2020-02-28T01:28:22Z) - Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition [56.844587127848854]
We demonstrate that the state-of-the-art gait recognition model is vulnerable to such attacks.
We employ a generative adversarial network based architecture to semantically generate adversarial high-quality gait silhouettes or video frames.
The experimental results show that if only one-fortieth of the frames are attacked, the accuracy of the target model drops dramatically.
arXiv Detail & Related papers (2020-02-22T10:08:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.