{"title":"欺骗攻击下量子安全单像素成像的真实图像构建","authors":"Jaesung Heo, Taek Jeong, Nam Hun Park, Yonggi Jo","doi":"10.1063/5.0209041","DOIUrl":null,"url":null,"abstract":"In this paper, we introduce a quantum-secured single-pixel imaging technique designed to withstand spoofing attacks, wherein adversaries attempt to deceive imaging systems with fake signals. Unlike previous quantum-secured protocols that impose a threshold error rate limiting their operation, even with the existence of true signals, our approach not only identifies spoofing attacks but also facilitates the reconstruction of a true image. Our method involves the analysis of a specific mode correlation of a photon-pair, which is independent of the mode used for image construction, to check security. Through this analysis, we can identify both the targeted image region of the attack and the type of spoofing attack, enabling reconstruction of the true image. A proof-of-principle demonstration employing the polarization-correlation of a photon-pair is provided, showcasing successful image reconstruction even under the condition of spoofing signals that are 2000 times stronger than true signals. We expect our approach to be applied to quantum-secured signal processing, such as quantum target detection or ranging.","PeriodicalId":8198,"journal":{"name":"APL Photonics","volume":"21 1","pages":""},"PeriodicalIF":5.4000,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"True image construction in quantum-secured single-pixel imaging under spoofing attack\",\"authors\":\"Jaesung Heo, Taek Jeong, Nam Hun Park, Yonggi Jo\",\"doi\":\"10.1063/5.0209041\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we introduce a quantum-secured single-pixel imaging technique designed to withstand spoofing attacks, wherein adversaries attempt to deceive imaging systems with fake signals. Unlike previous quantum-secured protocols that impose a threshold error rate limiting their operation, even with the existence of true signals, our approach not only identifies spoofing attacks but also facilitates the reconstruction of a true image. Our method involves the analysis of a specific mode correlation of a photon-pair, which is independent of the mode used for image construction, to check security. Through this analysis, we can identify both the targeted image region of the attack and the type of spoofing attack, enabling reconstruction of the true image. A proof-of-principle demonstration employing the polarization-correlation of a photon-pair is provided, showcasing successful image reconstruction even under the condition of spoofing signals that are 2000 times stronger than true signals. We expect our approach to be applied to quantum-secured signal processing, such as quantum target detection or ranging.\",\"PeriodicalId\":8198,\"journal\":{\"name\":\"APL Photonics\",\"volume\":\"21 1\",\"pages\":\"\"},\"PeriodicalIF\":5.4000,\"publicationDate\":\"2024-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"APL Photonics\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://doi.org/10.1063/5.0209041\",\"RegionNum\":1,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"OPTICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"APL Photonics","FirstCategoryId":"101","ListUrlMain":"https://doi.org/10.1063/5.0209041","RegionNum":1,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"OPTICS","Score":null,"Total":0}
True image construction in quantum-secured single-pixel imaging under spoofing attack
In this paper, we introduce a quantum-secured single-pixel imaging technique designed to withstand spoofing attacks, wherein adversaries attempt to deceive imaging systems with fake signals. Unlike previous quantum-secured protocols that impose a threshold error rate limiting their operation, even with the existence of true signals, our approach not only identifies spoofing attacks but also facilitates the reconstruction of a true image. Our method involves the analysis of a specific mode correlation of a photon-pair, which is independent of the mode used for image construction, to check security. Through this analysis, we can identify both the targeted image region of the attack and the type of spoofing attack, enabling reconstruction of the true image. A proof-of-principle demonstration employing the polarization-correlation of a photon-pair is provided, showcasing successful image reconstruction even under the condition of spoofing signals that are 2000 times stronger than true signals. We expect our approach to be applied to quantum-secured signal processing, such as quantum target detection or ranging.
APL PhotonicsPhysics and Astronomy-Atomic and Molecular Physics, and Optics
CiteScore
10.30
自引率
3.60%
发文量
107
审稿时长
19 weeks
期刊介绍:
APL Photonics is the new dedicated home for open access multidisciplinary research from and for the photonics community. The journal publishes fundamental and applied results that significantly advance the knowledge in photonics across physics, chemistry, biology and materials science.