Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Quantum-secured single-pixel imaging with enhanced security

Open Access Open Access

Abstract

In this paper, we propose a quantum-secured single-pixel imaging method that utilizes non-classical correlations of a photon pair. Our method can detect any attempts to deceive it by exploiting a non-classical correlation of photon pairs while rejecting strong chaotic light illumination through photon heralding. A security analysis based on polarization-correlation has been conducted, demonstrating that our method has improved security compared to existing quantum-secured imaging. More specifically, a partial deceiving attack, which sends a mixture of a true and a false signal, can be detected with our proposed analysis, while currently employed methods cannot. We also provide proof-of-principle demonstrations of our method and trustworthy images reconstructed using our security analysis. Our method can be developed using matured techniques used in quantum secure communication, thus offering a promising direction for practical applications in secure imaging.

© 2023 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. INTRODUCTION

Non-classical correlations in quantum systems are fundamental sources of quantum advantage in various quantum information protocols. Entanglement-based quantum key distribution (QKD) [1,2] and quantum-secured imaging [3,4] utilize quantum correlations to provide security against potential eavesdropping attacks in quantum channels, while quantum ghost imaging (QGI) [5] employs the correlations to enhance the signal-to-noise ratio (SNR) of an image beyond the classical limit.

Active imaging systems can be threatened by a deceiving attack, i.e., the imaging system constructs a false image based on fake signals sent from an adversary. For example, there can be an adversary who tries to fool an imaging system into showing a bird instead of an aircraft to avoid detection. For detecting these attempts to deceive the system, quantum-secured imaging (QSI) has been proposed [3], which was based on a prepare-and-measure approach. In this method, an attack can be detected by analyzing an error of polarization information between a photon sent and a photon received. If there is an adversary, then the error exceeds a security threshold, and the obtained image from the system is totally untrustworthy.

A prepare-and-measure approach needs a perfect single photon generator for realization of theoretical security. However, since there is no such device under current technologies, a weak coherent pulse has been used for QKD. A weak coherent pulse can carry two or more photons since it follows the Poisson distribution. This multi-photon pulse can degrade security. In QKD, a decoy state method is employed to solve this security issue [6]. Conversely, for prepare-and-measure QSI, applying a decoy state method is not trivial; thus, its security can be threatened under current technologies. Instead of prepare-and-measure approaches, we can use a correlation-based protocol. In correlation-based QSI [4], non-classical correlations can be analyzed to detect any attempts to deceive the imaging system, and the SNR of an image can be enhanced similarly to QGI. Moreover, a correlation-based protocol can provide better loss tolerance in a free-space channel compared to a prepare-and-measure approach due to the suppression of dark count effects in a single-photon detector [7]. Recently, an experimental demonstration of quantum-secured ghost imaging in the time–frequency domain has been reported [8].

In a prepare-and-measure QSI, the same photon is used for both imaging and security checking. However, in existing correlation-based QSI [4,8], the imaging and security checking are carried out sequentially using different photon pairs. Furthermore, while the security analysis of the existing proposal focuses on the most rudimentary scenario, another potential attack against the system would remain.

In this paper, we propose a novel quantum-secured single-pixel imaging (QS-SPI) method that exploits non-classical correlations of a photon pair for imaging and security checking simultaneously. Our imaging method is based on single-pixel imaging (SPI), also known as computational ghost imaging (CGI). Compared to existing QSI methods, our proposed method offers enhanced security against potential attacks. Specifically, we consider a deceiving attack that constructs a fake target image by intercepting genuine signals and illuminating false signals. By analyzing non-classical correlations of photon pairs, the attack can be exposed by an error rate. However, existing methods are unable to detect a partial deceiving attack, which creates a deceiving image with an error rate below the detection threshold by mixing true and false signals. QS-SPI can detect this attack by analyzing not only the non-classical correlations of photon pairs, but also the spatial profiles of the obtained images. Furthermore, our method can extract trustworthy information while discarding delusive information under a partial deceiving attack. As QS-SPI conducts imaging and security checking simultaneously, the obtained images are closely related to the security of the protocol, thereby enhancing the security. We demonstrate our theory through proof-of-principle experiments based on polarization-correlation. We expect that advanced techniques used in quantum secure communication can further improve the security of QS-SPI.

This paper is organized as follows. In Section 2, we propose the QS-SPI setup and describe its security. The experimental realization of our method is shown in Section 3, and we conclude our study in Section 4.

2. QUANTUM-SECURED SINGLE-PIXEL IMAGING

In SPI, an image is constructed using the correlation between the spatial information of a beam, given by a spatial light modulator (SLM), and the intensity of that beam after interacting with a target. Single-pixel detectors, such as photodiodes, are used to measure the intensity. Let us denote the $k$-th spatial pattern on the SLM as ${P^{(k)}}$ and its corresponding intensity measured as ${I^{(k)}}$. Varying the spatial patterns, the corresponding intensities are recorded, and the correlation of the two yields a target image $G$:

$$G(i,j) = \langle {P^{(k)}}(i,j){I^{(k)}}\rangle - \langle {P^{(k)}}(i,j)\rangle \langle {I^{(k)}}\rangle ,$$
where $i$ and $j$ represent the pixel position of the 2D image, and $\langle \cdot \rangle$ denotes the average of all of the $N$ patterns [9,10].

Various imaging patterns can be used for ${P^{(k)}}$, but to enhance the image quality while reducing the number of patterns required for imaging, an orthogonal pattern set is selected. One type of orthogonal pattern set used for SPI is Hadamard patterns [1114], which are constructed based on the Hadamard matrix. A ${2^{n + 1}} \times {2^{n + 1}}$ Hadamard matrix is calculated by the following:

$${H_{{2^{n + 1}}}} = {H_{{2^n}}} \otimes {H_2},$$
where
$${H_2} = \left({\begin{array}{*{20}{c}}1&1\\1&{- 1}\end{array}} \right),$$
and $\otimes$ denotes the tensor product. Hadamard patterns are generated by reshaping each row of the Hadamard matrix ${H_{{2^{2n}}}}$ into a ${2^n} \times {2^n}$ square matrix. Since the negative pixel value cannot be displayed in a digital-micromirror device (DMD), we exploit two shots to represent a Hadamard pattern in our demonstration [10]. However, we expect this to be reduced to one-shot detection with various techniques for practical implementation [15]. Transitioning matrix elements of $+1$ as white and $-1$ as black, one imaging pattern is made, and the other one is the inverse. For a ${2^n} \times {2^n}$ resolution image, the total number of shots required for imaging is ${2^{2n + 1}}$.

Figure 1 shows a schematic diagram of QS-SPI. Polarization-entangled photon pairs generated via spontaneous parametric down-conversion (SPDC) are exploited for the security check. The Bell state used is $|{\Phi ^ +}\rangle = \frac{1}{{\sqrt 2}}({|H,H{\rangle _{\text{SI}}} + |V,V{\rangle _{\text{SI}}}})$, where $| \cdot \rangle$ represents the polarization state of a single photon, $H$ ($V$) denotes horizontal (vertical) polarization, and the subscripts $S$ and $I$ denote signal and idler modes, respectively. The security of QS-SPI is based on the time- and polarization-correlation of photon pairs.

 figure: Fig. 1.

Fig. 1. Schematic diagram of QS-SPI. Alice, who operates the imaging system, generates pairs of polarization-entangled photons. The signal photon is sent to an SLM to be filtered according to a desired imaging pattern. This filtered photon illuminates the target and is reflected to be measured by SPCMs. The idler photon, the other photon in the entangled pair, is measured directly by the other set of SPCMs. The time-correlation and polarization-correlation of the two modes are analyzed from the measured data of the SPCMs.

Download Full Size | PDF

The signal photon is then sent to an SLM. Based on an imaging pattern, the SLM filters the signal spatially, and the selected photon illuminates a target. The idler photon is ideally retained and measured to analyze correlations with the signal photon.

In the QS-SPI setup, four single-photon-counting modules (SPCMs) are exploited as single-pixel detectors, which have a sub-ns timing resolution [1618]. They provide a simpler measurement setup compared to a QGI setup exploiting an electron multiplying charge-coupled device (EMCCD) [19,20]. As SPCM has a higher acceptable noise level than EMCCD, QS-SPI can reconstruct a trustworthy image even if an intensity of false signal reaches the EMCCD saturation level. Moreover, given the timing resolution of SPCMs, we can exploit a time-correlation of photon pairs to reject a strong background noise [2123], while a strong chaotic light can severely disturb a conventional CGI system [17,24,25]. QS-SPI uses coincidence counts of the signal and idler modes as the imaging intensity $I$ to exploit time-correlation. Thus, it is naturally immune to an imaging disrupting attack: an attack where strong chaotic light illuminates an imaging system to saturate the sensor.

Note that it is suitable to use a DMD as an SLM of QS-SPI rather than liquid-crystal-based SLM. To control and measure the correlations of signals at the single-photon level, an SLM with high reflectivity and polarization independence is required. Compared to a liquid-crystal-based SLM, a DMD is suitable for such purposes.

A. Method of Image Deceiving Attack

The security analysis method of quantum key distribution (QKD) has been well established for protecting photon-carried information against eavesdropping, which is directly related to the generation of secret keys. For example, in polarization-based QKD, the polarization-encoded information of a photon is critical to the secret key. There are many advanced attacks for extracting polarization-encoded information of successively transmitted photons, such as collective attacks that exploit demanding technologies including quantum cloning machines [26,27], quantum memories [28], and collective measurements [29,30]. However, in SPI, the main purpose of an attack is to deceive an imaging system to construct a fake image rather than to eavesdrop on secret keys. For this purpose, a meaningful attack is to modulate the intensity (photon rate) of the light for the formulation of a fake image. Under this circumstance, an intercept-and-resend attack is expected as the optimal attack strategy for image-deceiving attacks [3].

Figure 2 shows a schematic diagram of QS-SPI under a possible attack of an enemy called Eve. It is assumed that Eve can exploit all implementations allowed by the laws of physics and all processes of QS-SPI are known to Eve. For the deceiving attack, Eve possesses time-resolved single-photon detectors with polarization discrimination and an on-demand single-photon source with polarization control. Eve intercepts Alice’s signal photon and discriminates its polarization. Since it is not possible to simultaneously measure a quantum state in the conjugate bases, disturbance of the original photon state is inevitable. After the polarization measurement, the on-demand single-photon source generates a photon in the measured polarization, and the photon is sent to Alice. SPI constructs an image by spatial pattern information and received photon rate; therefore, Eve should control ${n_g}/{n_m}$ according to the DMD pattern to make QS-SPI construct a fraud image, where ${n_g}$ (${n_m}$) is a generated (measured) photon rate of Eve.

 figure: Fig. 2.

Fig. 2. Schematic diagram of QS-SPI under a potential attack by an adversary, referred to as Eve. In this attack, Eve manipulates the photon rate of a fake signal for the purpose of generating a fraudulent image, which is then sent to Alice. To evade detection, Eve must ensure that the polarization of the fake signal is similar to Alice’s signal, which can be achieved by using an intercept-and-resend attack.

Download Full Size | PDF

As the signal and the idler are a polarization-entangled photon pair, polarization of the signal is heralded when polarization of the idler is measured. However, an intercept-and-resend attack leads to detection of the signal photons in an unheralded polarization. Such errors are key resources for security analysis of QS-SPI. Details of the security check are described in the following section.

B. Security Analysis in QS-SPI

The presence of Eve is tested by Alice via measuring photons in mutually unbiased bases (MUBs). One basis, named rectilinear basis, consists of horizontal and vertical polarization, and the other basis, diagonal basis, does diagonal ($D$) and anti-diagonal ($A$) polarization. For the two bases, the following relations are satisfied: $|D\rangle = \frac{1}{{\sqrt 2}}({|H\rangle + |V\rangle})$ and $|A\rangle = \frac{1}{{\sqrt 2}}({|H\rangle - |V\rangle})$; thus, the two bases are MUBs. Alice, who has a QS-SPI system, randomly chooses the measurement basis for the security check. Unlike QKD, it is not necessary for the basis choice of the signal and idler modes to be independently random since the measurement setups of both modes belong to Alice.

Let us define ${r_1}: = H$, ${r_2}: = V$, ${d_1}: = D$, and ${d_2}: = A$. Then, $P({X_i},{X_j}) = C({X_i},{X_j})/\sum\nolimits_{k,l = 1}^2 C({X_k},{X_l})$ is satisfied, where $C(x,y)$ is the coincidence counts of $x$- and $y$-polarized photons in the signal and idler modes, respectively. $P(x,y)$ is the probability of a coincidence count $C(x,y)$ to happen, $X \in \{r,d\}$, and $i,j \in \{1,2\}$. From $|{\Phi ^ +}\rangle$, $P({X_i},{X_i}) = 1/2$ and $P({X_i},{X_j}) = 0$ for $i \ne j$, indicating that the latter coincidence count is erroneous. The error rate can be defined as the ratio of erroneous coincidence counts to all coincidence counts. Since the idler photon is unhindered by Eve’s attack, an error rate is defined with respect to polarization of the idler. Thus, a polarization error rate of an ${X_i}$-polarized idler is calculated as

$${e_{{X_i}}} = \frac{{C({X_j},{X_i})}}{{\sum\nolimits_{k = 1}^2 {C({X_k},{X_i})}}},$$
where $i \ne j$. Under no attack, the error rates are always zero. However, if there is an enemy who tries to disturb the imaging system, erroneous coincidence counts increase; therefore, Alice can notice the presence of an attack by analyzing the error rates.

Eve possesses its own MUBs for polarization measurement. Let us denote its constitutive polarization in the primed notation, i.e., ${H^\prime}$, ${V^\prime}$, ${D^\prime}$, and ${A^\prime}$. For their respective identical basis choice, let the angle difference between the two be $\theta$, measured counterclockwise from one polarization of Alice to that of Eve, i.e., the angle measured from the $H$-polarization to ${H^\prime}$-polarization, counterclockwise. Then, the angle difference between their respective different bases is $\theta \pm \frac{\pi}{4}$.

Suppose Alice chooses a rectilinear basis and measures the idler in $H$-polarization. For Eve’s own rectilinear basis, Eve measures Alice’s signal in ${H^\prime}$ (${V^\prime}$)-polarization with probability $\mathop {\cos}\nolimits^2 \theta$ ($\mathop {\sin}\nolimits^2 \theta$). Regardless of Eve’s result, Alice’s error rate, i.e., the probability of detecting a $V$-polarized signal, is $\mathop {\cos}\nolimits^2 \theta \mathop {\sin}\nolimits^2 \theta$. Thus, the error rate observed by Alice is $2\mathop {\cos}\nolimits^2 \theta \mathop {\sin}\nolimits^2 \theta =\def\LDeqbreak{} (1 - \mathop {\cos}\nolimits^2 2\theta)/2$. If Eve chooses the other measurement basis, the error rate is calculated by replacing $\theta$ with $\theta \pm \frac{\pi}{4}$: $(1 - \mathop {\sin}\nolimits^2 2\theta)/2$. Since Eve’s basis choice is random, the error rate in the $H$-polarized idler is calculated as follows: ${e_H} = [(1 - \mathop {\cos}\nolimits^2 2\theta)/2 \,+\def\LDeqbreak{} (1 - \mathop {\sin}\nolimits^2 2\theta)/2]/2 = 1/4$. The result indicates that the threshold error rate for determining the presence of an attack is 25% regardless of the angle difference $\theta$. If an error rate in either the rectilinear or diagonal basis is greater than or equal to 25%, the protocol is compromised.

Rather than a full deceiving attack, Eve can perform a partial attack, i.e., Eve performs the attack against some photons, while the other photons are passed through. With this attack, Eve cannot manipulate a full image, but can add some pixels in an original image. For example, when an original image is “1,” Eve can make the image “4” by adding one horizontal and one diagonal line. Even when the attack is performed, the error rate can remain less than 25%, since only a part of photons influenced by Eve contributes to the error rate. Thus, the existing security analysis of QSI methods cannot detect the presence of Eve, even if the image is modified from the original image. To detect this partial deceiving attack, we should analyze the intensity of Eve’s light and the pixel area that Eve attempts to modify. Here, we provide a security analysis to show how the parameters can be used to detect the attack and how we can reconstruct a trustworthy image.

Let the coincidence rate originated from the signal of Alice (Eve) without target information be ${n_{A(E)}}$. By a target profile ${\chi _{A(E)}}$ and channel efficiency ${\eta _{A(E)}}$, detected coincidence counts ${I_D}$ at the $n$-th imaging pattern are

$$I_D^{(n)}\def\LDeqtab{} = \sum\limits_{k \in \{A,E\}} \frac{1}{M}\sum\limits_{i,j} {P^{(n)}}(i,j)\left({{\eta _k}(i,j){\chi _k}(i,j){n_k}} \right)$$
$$\def\LDeqtab{}: = \sum\limits_{k \in \{A,E\}} I_k^{(n)},$$
where $M$ is the total number of pixels, and ${I_{A(E)}}$ is detected coincidence counts originating only from Alice’s (Eve’s) signal. As the sum of any Hadamard pattern to its corresponding inverse pattern is the pattern where all components are one, the total coincidence counts for the whole $N$ imaging patterns are
$$\sum\limits_n I_D^{(n)} = \sum\limits_{k \in \{A,E\}} \frac{N}{{2M}}{S_k}{n_k},$$
where ${S_{A(E)}}$ is the sum of components of Alice’s (Eve’s) target image, i.e., ${S_{A(E)}}: = \sum\nolimits_{i,j} {\eta _{A(E)}}(i,j){\chi _{A(E)}}(i,j)$. Previous analysis shows that the minimum erroneous coincidence counts are a quarter of ${I_E}$. Thus, the threshold error rate ${e_T}$ becomes
$${e_T} = \frac{1}{4}\frac{{{S_E}{n_E}}}{{{S_A}{n_A} + {S_E}{n_E}}}.$$

It is explicitly shown that the error rate under a partial deceiving attack can be smaller than 25%. Also, the error rate is closely related not only to the beam intensity but also to the target profile. However, one cannot get target information before imaging. Thus, to notice Eve’s partial deceiving attack, a threshold error rate based on the analysis on a constructed image is required.

From Eq. (1), an image formed by ${I_k}$, where $k \in \{A,E\}$, is

$${G_k}(i,j) \def\LDeqtab{}= \frac{1}{N}\sum\limits_n {P^{(n)}}(i,j)I_k^{(n)} - \frac{1}{{2N}}\sum\limits_n I_k^{(n)}$$
$$\def\LDeqtab{}= \frac{1}{{4M}}{\eta _k}(i,j){\chi _k}(i,j){n_k}.$$

Then, an image formed by ${I_D}$ is ${G_{{\rm{all}}}} = {G_A} + {G_E}$. Note that neither ${G_A}$ nor ${G_E}$ is directly obtainable. An image formed by correct (erroneous) coincidence counts is obtainable, denoted as ${G_{{\rm{cor(mask)}}}}$. Under an intercept-and-resend attack, ${G_{{\rm{mask}}}} = \frac{1}{4}{G_E}$, which makes ${G_{{\rm{cor}}}} = {G_A} + \frac{3}{4}{G_E}$.

As ${S_{A(E)}}{n_{A(E)}} \propto \sum\nolimits_{i,j} {G_{A(E)}}(i,j)$, the proportion that affects the 25% error rate is related to the sum of all the pixel values of the images. For a full deceiving attack, ${G_{{\rm{all}}}} = {G_E}$; thus, only Eve’s counts contribute to the 25% error rate. However, for a partial deceiving attack, Eve’s contribution is $4\sum\nolimits_{i,j} {G_{{\rm{mask}}}}(i,j)$, where the 4 comes from an intercept-and-resend attack. The threshold error rate becomes

$${e_T} = \frac{1}{4} \cdot \frac{{4\sum\nolimits_{i,j} {{G_{{\rm{mask}}}}(i,j)}}}{{\sum\nolimits_{i,j} {{G_{{\rm{all}}}}(i,j)}}} = \frac{{\sum\nolimits_{i,j} {{G_{{\rm{mask}}}}(i,j)}}}{{\sum\nolimits_{i,j} {{G_{{\rm{all}}}}(i,j)}}}.$$

Thus, we can obtain the error threshold from experimental results since Eqs. (8) and (11) are equivalent. Note that this error threshold is calculated under the assumption of an intercept-and-resend attack, which is expected to be the optimal attack strategy, while the error rate in Eq. (4) is directly obtained from the coincidence counts.

Let us consider the error values under an ideal intercept-and-resend attack. Since the measurement basis choice is random and the state is maximally entangled, ${n_{A,{X_i}}} = p({n_{A,{X_i}}}|{n_A}){n_A} = \def\LDeqbreak{}{n_A}/4$, where ${n_{A,{X_i}}}$ denotes an ${X_i}$-polarized coincidence rate of Alice’s photon without a target. A coincidence rate of Eve’s photon in ${X_i}$-polarization is ${n_{E,{X_i}}} = p({n_{A,{X_i}}}|{n_A}){n_E}(1/2 + 1/4) = 3{n_E}/16$. The first term, $1/2$, comes from the case where Eve chooses the same basis as Alice’s, and the second, $1/4$, is the case where Eve chooses the wrong basis but the state is projected onto the correct state. Error coincidence coming from Eve is ${n_{E,e}} = p({n_{A,{X_i}}}|{n_A}){n_E}/4 = {n_E}/16$, where the 4 in the denominator comes from the probability that the state is projected onto the error state, which can happen only when Eve chooses the wrong basis. From Eq. (4), the error rate with target information becomes

$$\begin{array}{*{20}{l}}{{e_{{X_i}}}}&=\displaystyle{ \frac{{{S_E}{n_{E,e}}}}{{{S_A}{n_{A,{X_i}}} + {S_E}({n_{E,{X_i}}} + {n_{E,e}})}}}\\[10pt]{}&={ \displaystyle\frac{1}{4}\frac{{{S_E}{n_E}}}{{{S_A}{n_A} + {S_E}{n_E}}},}\end{array}$$
which is equivalent to Eq. (8). Thus, in the context of an intercept-and-resend attack, ideally, the two values are the same. On the other hand, if Eve performs a different attack that is not optimal, the difference between the error threshold and the error rate would become apparent. For example, if Eve randomly chooses one polarization among the four, the coincidence rate of Eve’s photons becomes ${n_{E,{X_i}}} = {n_{E,e}} = {n_E}/8$. Thus, the error rate becomes
$${e_{{X_i}}} = \frac{1}{2}\frac{{{S_E}{n_E}}}{{{S_A}{n_A} + {S_E}{n_E}}},$$
which is always greater than the error threshold if ${S_E}{n_E} \ne 0$.

When the error rate is greater than or equal to the partial deceiving attack threshold calculated by Eq. (11), Eve’s partial deceiving attack can be noticed. Extraction of trustworthy information from the obtained images can be performed based on image relations as

$${G_A}(i,j) = {G_{{\rm{cor}}}}(i,j) - 3{G_{{\rm{mask}}}}(i,j).$$

Note that enhanced security of QS-SPI is based on the simultaneous procedure of imaging and security analysis. If the two were done sequentially, coincidence counts for imaging are irrelevant to security checking; thus, neither detection of a partial deceiving attack nor trustworthy image reconstruction is possible.

 figure: Fig. 3.

Fig. 3. Experimental setup of our QS-SPI. A polarization-entangled photon pair is generated by the Sagnac interferometer with a ppKTP crystal. Polarization of the idler photon is directly detected by SPCMs. The signal photon is reflected by the DMD with a post-selection of its position and sent to a true target. After interaction with the target, the photon is counted by SPCMs in selected polarization. A full deceiving attack is demonstrated by blocking Alice’s signal with a flip mirror and sending Eve’s laser beam in a polarization-controlled and intensity-modulated manner. Accidental coincidence counts occur by Eve’s light, which lead to the formation of a false image. A partial deceiving attack is realized by acquiring photon counts twice: one from a true signal and the other from a false signal. PBS, polarizing beam splitter; QWP (HWP), quarter (half) wave plate; ND filter, neutral density filter.

Download Full Size | PDF

In summary, the security analysis procedure of QS-SPI is conducted as follows.

  • 1. If the error rate is greater than or equal to 25%, the imaging system is under a full deceiving attack. All images should be discarded.
  • 2. If the error rate is smaller than 25%, Alice calculates ${e_T}$ based on Eq. (11) to check for a possible partial deceiving attack.
  • 3. If the error rate is smaller than ${e_T}$, the obtained images are trustworthy. Otherwise, only the trustworthy image reconstructed by Eq. (14) is credible.

3. PROOF-OF-PRINCIPLE DEMONSTRATION

A. QS-SPI Setup

Figure 3 shows the setup for a proof-of-principle demonstration of QS-SPI. A polarization-entangled state is generated from a Sagnac interferometer with a periodically poled potassium titanyl phosphate (ppKTP) crystal [31]. The crystal is pumped by a 405 nm continuous wave (CW) laser, generating 810 nm polarization-entangled photon pairs via the type-II SPDC process. The initial state generated from the Sagnac interferometer is $|{\Psi ^ +}\rangle = \frac{1}{{\sqrt 2}}({|H,V{\rangle _{\text{SI}}} + |V,H{\rangle _{\text{SI}}}})$. Therefore, to make the state be $|{\Phi ^ +}\rangle$, additional phase shifts on the idler mode are given. The state is prepared with 98.6% fidelity, verified via quantum state tomography [32].

After generation, the idler mode is detected by SPCMs (Excelitas Technologies, SPCM-780-13-FC) in selected polarization. SPCMs are connected to a time-correlated single-photon-counting (TCSPC) module to record detection time and polarization. The signal photon is sent to the DMD (Vialux GmbH, DLP650LNIR) and post-selected according to a displayed pattern. In our setup, we used Hadamard patterns with a $32 \times 32$ resolution; thus, the total number of shots required for one image is 2048.

The spatially post-selected signal photons interact with the target, alphabet letter “A” or “F,” and are detected by SPCMs. “A” is used for demonstrating all attack methods while “F” is used for a partial deceiving attack only. TCSPC analyzes detection from the four SPCMs to give the coincidence counts of one signal and one idler.

In the setup, the power of the pump laser for generation of the entangled photon pairs was 5 mW. Single count rates of the signal and idler without a target were $6 \times {10^3}$ cps and $8 \times {10^4}$ cps, respectively. We set the coincidence window as 650 ps, and the coincidence count rate of a signal and an idler in the same polarization was 300 cps. In imaging, the photon acquisition time for one Hadamard pattern was 3.5 s.

B. Demonstration of Eve’s Attack

As previously described, Eve’s intercept-and-resend attack exploits an on-demand single-photon source to make a generated photon enter within the coincidence window. However, since the implementation is not feasible with current technologies, we simulated an intercept-and-resend attack with implementable devices, and in the post-process.

 figure: Fig. 4.

Fig. 4. Images obtained by QS-SPI without any attack (left) or under a full deceiving attack (right). Imaging is performed five times, and the average error rate in each basis with a standard deviation in parenthesis is shown below the corresponding images, where ${e_r}$ (${e_d}$) denotes the error rate in the rectilinear (diagonal) basis. (a) When there is no attack, all error rates are suppressed below a partial deceiving attack threshold of 4.5%. (b) Under the attack, error rates close to 25% are obtained, which is the expected error rate under an ideal intercept-and-resend attack. As the error rates are over 25%, a full deceiving attack exists, and thus, all images should be discarded.

Download Full Size | PDF

In QS-SPI, image reconstruction relies on coincidence counts, and Eve can manipulate the system by controlling these counts. In our proposed deceiving attack, Eve illuminates Alice’s receiver with an 810 nm CW laser, inducing accidental coincidence counts. To simplify the attack, we fix the polarization of the illumination laser to ${H^\prime} = H$ or ${D^\prime} = D$, instead of controlling the polarization based on the measured information. Ideally, no erroneous coincidence counts occur when Eve chooses the same polarization basis as Alice. For instance, if Alice’s signal is in $H$-polarization and Eve chooses the rectilinear basis, Eve sends a false signal in $H$-polarization. However, if Eve selects the diagonal basis, 50% of the counts are recorded as erroneous coincidence counts. To accurately demonstrate the intercept-and-resend attack, we selected coincidence counts for imaging and error rate calculation according to the following criteria.

  • 1. If Alice and Eve select identical bases, coincidence counts where the polarization of the idler is matched with the false signal are selected, and the others are discarded.
  • 2. If different bases are chosen, all polarization combinations of coincidence counts are selected.

However, for case 1, we ignore Eve’s attack in a different polarization. For example, we ignore $V$-polarization errors in the rectilinear basis while considering errors in the diagonal basis. To account for this, we consider the possibility of a random basis choice for $V$- and $A$-polarized idlers.

In a full deceiving attack, Alice’s signal is blocked, and only accidental coincidence counts are detected. To deceive Alice’s setup, the accidental coincidence count rate must be similar to the coincidence count rate of the entangled photon pairs. To achieve this condition, the power of Eve’s laser is determined as follows. The detection probabilities per window on the signal and idler mode SPCMs are ${N_E}\tau$ and ${N_I}\tau$, respectively, where ${N_E}$ is the photon rate of Eve’s laser, and $\tau$ is a coincidence window. In this case, the coincidence probability in the coincidence window is given by the product of the single probabilities, ${N_E}{N_I}{\tau ^2}$. Then, the accidental coincidence count rate ${n_{\text{acc}}}$ can be calculated by the following equation:

$${n_{\text{acc}}} = {N_I}{N_E}\tau .$$

To make ${n_{\text{acc}}} \sim 300$ cps with ${N_I} = 8 \times {10^4}$ cps and $\tau = 650\;{\rm{ps}}$, ${N_E} \sim 5.8 \times {10^6}$ cps is obtained, which is 1000 times greater than the original signal-photon-count rate without a target. This photon rate corresponds to approximately 1.41 pW for an 810 nm CW laser.

Intensity modulation of Eve’s laser, which is necessary to deceive SPI, is performed by using another DMD. Eve’s DMD displays the overlapped patterns of Alice’s Hadamard patterns and a fraud image. After imaging under a full deceiving attack, a fraud image, the alphabet letter “D,” is constructed from the accidental coincidence counts.

In a partial deceiving attack, Alice detects both true and false signals with their intensity ratio being controlled. Photon acquisition is performed twice for each imaging pattern. One acquisition is for the true signal and the other is for the false signal, controlled by the flip mirror. The polarization of the false signal is controlled in the same manner as in the full deceiving attack. In this attack, we first set the true target as the alphabet letter “F.” To disguise the true target profile, the false signal contains target information as the left-and-right inverse of the alphabet letter “L.” Combining the two signals, a deceiving image is formed: the digital number “8.” Additionally, we demonstrate the attack with the targets used in the full deceiving attack, namely, the alphabet letters “A” and “D.” In this case, the two images overlap, and the true target information is covered by the fraudulent image. For the two possible scenarios, we demonstrate trustworthy image reconstruction based on the obtained images.

 figure: Fig. 5.

Fig. 5. Images obtained by QS-SPI under a partial deceiving attack where the true target profile has no overlap with the false target profile. False signals to the true signal intensity ratios of 500, 1000, and 2000 are demonstrated. When the ratio is 1000, a contrast of true and false target images is balanced to form a deceiving image: the digital number “8.” As either ${e_r}$ or ${e_d}$ is beyond ${e_T}$ but below 25%, a partial deceiving attack exists. Reconstructed trustworthy images are similar to the true target image. The stronger the noise intensity, the more background noise exists in the trustworthy image due to suppression of the true signal by a strong false signal.

Download Full Size | PDF

C. Results

Figure 4 shows the images obtained without an attack from Eve and under a full deceiving attack. The error rate in each basis is marked below the corresponding images, where the error rate in the rectilinear (diagonal) basis is ${e_r}$ (${e_d}$). Due to experimental defects, some pixels in the obtained images were negative; thus, we transitioned the negatives to zero. The images shown are normalized, i.e., all pixels are divided by the maximum pixel value and multiplied by 255.

In the proof-of-principle experiments, all data were obtained five times, and the average of the five error rates is marked with the standard deviation in parenthesis. When there is no attack, error rates lower than 25% were obtained. To test the possibility of a partial deceiving attack, the threshold error rate was calculated to be 4.54%. As the error rates are lower than the threshold, the security of the obtained images is guaranteed. Under Eve’s full deceiving attack, error rates close to 25% were obtained as expected from the error analysis under the intercept-and-resend attack. As the error rates are greater than 25%, Eve’s full deceiving attack exists, indicating that the images are fake and should be discarded.

The results of the QS-SPI under a partial deceiving attack are presented in Figs. 5 and 6. We varied the false signal intensity to the true signal intensity ratio and demonstrated cases where the ratio is 500, 1000, and 2000. The former is the case where a true target profile has no overlap with a false target profile, but the two are combined to produce a deceiving image. When the ratio is 1000, the contrast of true and false target images is balanced to form a deceiving image: the digital number “8.” The latter is the case where true and false images have overlapped. True and false targets are the alphabet letters “A” and “D,” respectively, and the overlap deteriorates the true target information.

 figure: Fig. 6.

Fig. 6. Demonstration of a partial deceiving attack where a true target profile has overlap with a false target profile. As either ${e_r}$ or ${e_d}$ is beyond ${e_T}$ but below 25%, a partial deceiving attack exists. From the obtained images, trustworthy images are reconstructed. The image quality of the overlapped region in the trustworthy images worsens as the intensity of the false signal gets stronger. This is due to suppression of the true signal by a strong false signal, which also causes background fluctuation to be stronger.

Download Full Size | PDF

In both cases, all error rates are below 25%. However, as either ${e_r}$ or ${e_d}$ is greater than the partial deceiving attack threshold ${e_T}$, a partial deceiving attack exists. We reconstructed trustworthy images using Eq. (14) and compared them with the true target image acquired by only the true signals. We observed that ${G_{{\rm{mask}}}}$ has the spatial profile of the false target. By subtracting three times ${G_{{\rm{mask}}}}$ from ${G_{{\rm{cor}}}}$, we obtained the image of the true target profile. When the error rate is much smaller than 25%, which is the threshold of a full deceiving attack, the trustworthy images are well recovered (nearly identical to the true images). However, as the error rate approaches 25%, the background noise increases due to the suppression of the true signal in comparison with the intensity of the false signal. When the two image profiles overlap, the suppression causes pixel values in the overlapped region of $3{G_{{\rm{mask}}}}$ to be similar to those in ${G_{{\rm{cor}}}}$. Therefore, some information of the true target profile in the overlapped region may be erased during the trustworthy image reconstruction process, which is why the image quality in the overlapped region rapidly degrades.

Lastly, we tested the robustness of QS-SPI against strong noise, and the result is shown in Fig. 7. Eve’s jamming laser, which has a power 1000 times greater than Alice’s signal, illuminates the receiver to disturb the imaging process. In the original SPI, only single counts in the signal mode are exploited to construct an image; thus, the obtained image is ruined by the attack. However, by exploiting the time-correlation between the signal and idler photons, QS-SPI can overcome the attack, allowing the target image to be successfully obtained [22].

 figure: Fig. 7.

Fig. 7. Images constructed under an imaging disrupting attack by the original SPI (left) and QS-SPI (right). The attack is realized by illuminating Eve’s laser to Alice’s signal, where the laser power was 1000 times greater than Alice’s signal. The image obtained by SPI is ruined, while the time-correlation of a photon pair allowed QS-SPI to successfully construct the image.

Download Full Size | PDF

4. SUMMARY AND DISCUSSION

In this paper, we proposed QS-SPI, a method that is resilient against possible image deceiving attacks. Our method employs polarization-correlation techniques that enable imaging and security analysis to be performed simultaneously for all detected photon pairs. This results in enhanced security analysis and reconstruction of trustworthy images. We consider two types of deceiving attacks: full deceiving attacks and partial deceiving attacks. A full deceiving attack involves intercepting all true signals and illuminating false signals to construct a fraudulent image. This type of attack can be detected by analyzing statistical errors in polarization-correlation, where the criterion error rate is 25%. However, a partial deceiving attack involves intercepting a portion of the true signals and mixing them with false signals to create a deceiving image with an error rate below 25%. To detect this type of attack, we analyze both the polarization-correlation and the obtained images formed by correct and erroneous coincidence counts. When a partial deceiving attack is confirmed, QS-SPI can reconstruct trustworthy information while rejecting false information. We demonstrated the setup of QS-SPI and showed that it is capable of detecting deceiving attacks. We simulated an intercept-and-resend attack, and obtained a theoretical error rate of 25%. We also showed how QS-SPI can detect partial deceiving attacks and reconstruct trustworthy images from the obtained data, which represents an improvement in security over previously proposed QSI schemes. Finally, we demonstrated the robustness of QS-SPI under strong chaotic noise.

To use QS-SPI as an application, the active basis choice setups and two SPCMs can be replaced with passive ones that consist of a 50:50 beam splitter, phase shifters, and four SPCMs corresponding to the detection of four possible polarization states. In the modified scheme, the photon pairs detected at SPCMs with a mismatched basis should be discarded in the security check. However, a security check based on the Bell inequality [33], particularly the Clauser–Horne–Shimony–Holt (CHSH) inequality [34], can be introduced to exploit all the basis combinations to perform security checks [35]. This approach allows us to construct an image without discarding photon pairs. In the security check, if the polarization statistics violate the Bell inequality, the absence of an attack is guaranteed, and this method provides device-independent security [30,36,37].

With small transitions, QS-SPI can be applied to various protocols such as the ghost imaging scheme. In our proposed setup, this can be achieved by removing the DMD and measuring the spatial profile of the idler photon using CCDs or single-pixel detectors in a raster-scanning manner. The role of the DMD is replaced by the measurement of the idler’s spatial profile, which provides information about the spatial profile of the signal. When an idler photon is detected, its intensity at a specific pixel position, polarization, and detection time are recorded. By analyzing the intensity-correlation and time-correlation of the signal and idler photons pixel by pixel, an image of the target can be reconstructed with resilience against imaging disrupting attacks. Additionally, by analyzing the polarization-correlation pixel by pixel, the security analysis methodology of QS-SPI can be directly applied. Moreover, QS-SPI is applicable to a quantum-secured optical ranging protocol [3]. Since our setup exploits the time-correlation of the signal and idler photons, time-of-flight information of a signal photon should be measured. Thus, QS-SPI provides a method to securely acquire a target distance against jamming attacks.

We expect that QS-SPI can advance with matured techniques utilized in quantum secure communication. For instance, six polarization states in three possible mutually unbiased bases (MUBs) can be employed to enhance security [38], or for reference-frame-independent security analysis [39]. Moreover, various degrees-of-freedom in a single photon can be utilized to exploit high-dimensional quantum states [4043] or hyper-entangled states [44,45]. Furthermore, our method can be developed to quantum-secured LiDAR using quantum-correlation-based free-space experimental techniques [46,47].

Funding

Defense Acquisition Program Administration; Agency for Defense Development.

Acknowledgment

This work was supported by a grant to the Defense-Specialized Project funded by the Defense Acquisition Program Administration and Agency for Defense Development.

Disclosures

The authors declare no conflicts of interest.

Data availability

The datasets generated and/or analyzed during the current study are not publicly available due to the security policy of the Ministry of National Defense of South Korea, but are available from the corresponding author upon reasonable request.

REFERENCES

1. A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 67, 661–663 (1991). [CrossRef]  

2. C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett. 68, 557–559 (1992). [CrossRef]  

3. M. Malik, O. S. Magaña-Loaiza, and R. W. Boyd, “Quantum-secured imaging,” Appl. Phys. Lett. 101, 241103 (2012). [CrossRef]  

4. M. Malik and R. W. Boyd, “Secure quantum imaging,” in Conference on Lasers and Electro-Optics (CLEO) (2012), pp. 1–2.

5. T. B. Pittman, Y. H. Shih, D. V. Strekalov, and A. V. Sergienko, “Optical imaging by means of two-photon quantum entanglement,” Phys. Rev. A 52, R3429–R3432 (1995). [CrossRef]  

6. W.-Y. Hwang, “Quantum key distribution with high loss: toward global secure communication,” Phys. Rev. Lett. 91, 057901 (2003). [CrossRef]  

7. E. Waks, A. Zeevi, and Y. Yamamoto, “Security of quantum key distribution with entangled photons against individual attacks,” Phys. Rev. A 65, 052310 (2002). [CrossRef]  

8. X. Yao, X. Liu, L. You, Z. Wang, X. Feng, F. Liu, K. Cui, Y. Huang, and W. Zhang, “Quantum secure ghost imaging,” Phys. Rev. A 98, 063816 (2018). [CrossRef]  

9. J. H. Shapiro, “Computational ghost imaging,” Phys. Rev. A 78, 061802 (2008). [CrossRef]  

10. G. M. Gibson, S. D. Johnson, and M. J. Padgett, “Single-pixel imaging 12 years on: a review,” Opt. Express 28, 28190–28208 (2020). [CrossRef]  

11. W. Pratt, J. Kane, and H. Andrews, “Hadamard transform image coding,” Proc. IEEE 57, 58–68 (1969). [CrossRef]  

12. S. Souza, J. Szumowski, C. Dumoulin, D. Plewes, and G. Glover, “SIMA: simultaneous multislice acquisition of MR images by Hadamard-encoded excitation,” J. Comput. Assist. Tomogr. 12, 1026–1030 (1988). [CrossRef]  

13. M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,” IEEE Signal Process. Mag. 25, 83–91 (2008). [CrossRef]  

14. M.-J. Sun, L.-T. Meng, M. P. Edgar, M. J. Padgett, and N. Radwell, “A Russian dolls ordering of the Hadamard basis for compressive single-pixel imaging,” Sci. Rep. 7, 3464 (2017). [CrossRef]  

15. Z. Yu, X.-Q. Wang, C. Gao, Z. Li, H. Zhao, and Z. Yao, “Differential Hadamard ghost imaging via single-round detection,” Opt. Express 29, 41457–41466 (2021). [CrossRef]  

16. B. Ndagano, H. Defienne, A. Lyons, I. Starshynov, F. Villa, S. Tisa, and D. Faccio, “Imaging and certifying high-dimensional entanglement with a single-photon avalanche diode camera,” npj Quantum Inf. 6, 94 (2020). [CrossRef]  

17. Z.-M. Li, S.-B. Wu, J. Gao, H. Zhou, Z.-Q. Yan, R.-J. Ren, S.-Y. Yin, and X.-M. Jin, “Fast correlated-photon imaging enhanced by deep learning,” Optica 8, 323–328 (2021). [CrossRef]  

18. H. Defienne, J. Zhao, E. Charbon, and D. Faccio, “Full-field quantum imaging with a single-photon avalanche diode camera,” Phys. Rev. A 103, 042608 (2021). [CrossRef]  

19. T. Gregory, P.-A. Moreau, E. Toninelli, and M. J. Padgett, “Imaging through noise with quantum illumination,” Sci. Adv. 6, eaay2652 (2020). [CrossRef]  

20. T. Gregory, P.-A. Moreau, S. Mekhail, O. Wolley, and M. Padgett, “Noise rejection through an improved quantum illumination protocol,” Sci. Rep. 11, 21841 (2021). [CrossRef]  

21. J.-Z. Yang, M.-F. Li, X.-X. Chen, W.-K. Yu, and A.-N. Zhang, “Single-photon quantum imaging via single-photon illumination,” Appl. Phys. Lett. 117, 214001 (2020). [CrossRef]  

22. J. Kim, T. Jeong, S.-Y. Lee, D. Y. Kim, D. Kim, S. Lee, Y. S. Ihn, Z. Kim, and Y. Jo, “Heralded single-pixel imaging with high loss-resistance and noise-robustness,” Appl. Phys. Lett. 119, 244002 (2021). [CrossRef]  

23. S. Johnson, A. McMillan, C. Torre, S. Frick, J. Rarity, and M. Padgett, “Single-pixel imaging with heralded single photons,” Opt. Contin. 1, 826–833 (2022). [CrossRef]  

24. J. Kim, S. Lee, Y. Jo, S.-Y. Lee, T. Jeong, D. Kim, D. Y. Kim, Z. Kim, and Y. S. Ihn, “Noise-robust single-pixel imaging in the photon counting regime with a pulsed source,” J. Opt. Soc. Am. B 39, 869–875 (2022). [CrossRef]  

25. J. Heo, J. Kim, T. Jeong, S. Lee, Y. S. Ihn, Z. Kim, and Y. Jo, “Lossy and noisy channel simulation in computational ghost imaging by using noise-induced pattern,” Sci. Rep. 12, 11787 (2022). [CrossRef]  

26. V. Buzžek and M. Hillery, “Quantum copying: beyond the no-cloning theorem,” Phys. Rev. A 54, 1844–1852 (1996). [CrossRef]  

27. D. Bruss, A. Ekert, and C. Macchiavello, “Optimal universal quantum cloning and state estimation,” Phys. Rev. Lett. 81, 2598–2601 (1998). [CrossRef]  

28. A. I. Lvovsky, B. C. Sanders, and W. Tittel, “Optical quantum memory,” Nat. Photonics 3, 706–714 (2009). [CrossRef]  

29. E. Biham and T. Mor, “Bounds on information and the security of quantum cryptography,” Phys. Rev. Lett. 79, 4034–4037 (1997). [CrossRef]  

30. A. Acn, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007). [CrossRef]  

31. T. Kim, M. Fiorentino, and F. N. C. Wong, “Phase-stable source of polarization-entangled photons using a polarization Sagnac interferometer,” Phys. Rev. A 73, 012316 (2006). [CrossRef]  

32. D. F. V. James, P. G. Kwiat, W. J. Munro, and A. G. White, “Measurement of qubits,” Phys. Rev. A 64, 052312 (2001). [CrossRef]  

33. J. S. Bell, “On the Einstein Podolsky Rosen paradox,” Phys. Phys. Fiz. 1, 195–200 (1964). [CrossRef]  

34. J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt, “Proposed experiment to test local hidden-variable theories,” Phys. Rev. Lett. 23, 880–884 (1969). [CrossRef]  

35. D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, “Entangled state quantum cryptography: eavesdropping on the Ekert protocol,” Phys. Rev. Lett. 84, 4733–4736 (2000). [CrossRef]  

36. J. Barrett, L. Hardy, and A. Kent, “No signaling and quantum key distribution,” Phys. Rev. Lett. 95, 010503 (2005). [CrossRef]  

37. A. Acn, N. Gisin, and L. Masanes, “From Bell’s theorem to secure quantum key distribution,” Phys. Rev. Lett. 97, 120405 (2006). [CrossRef]  

38. D. Bruß, “Optimal eavesdropping in quantum cryptography with six states,” Phys. Rev. Lett. 81, 3018–3021 (1998). [CrossRef]  

39. A. Laing, V. Scarani, J. G. Rarity, and J. L. O’Brien, “Reference-frame-independent quantum key distribution,” Phys. Rev. A 82, 012304 (2010). [CrossRef]  

40. N. J. Cerf, M. Bourennane, A. Karlsson, and N. Gisin, “Security of quantum key distribution using d-level systems,” Phys. Rev. Lett. 88, 127902 (2002). [CrossRef]  

41. Y. Jo and W. Son, “Key-rate enhancement using qutrit states for quantum key distribution with Askew aligned sources,” Phys. Rev. A 94, 052316 (2016). [CrossRef]  

42. F. Bouchard, K. Heshami, D. England, R. Fickler, R. W. Boyd, B.-G. Englert, L. L. Sánchez-Soto, and E. Karimi, “Experimental investigation of high-dimensional quantum key distribution protocols with twisted photons,” Quantum 2, 111 (2018). [CrossRef]  

43. Y. Jo, H. S. Park, S.-W. Lee, and W. Son, “Efficient high-dimensional quantum key distribution with hybrid encoding,” Entropy 21, 80 (2019). [CrossRef]  

44. X.-L. Wang, X.-D. Cai, Z.-E. Su, M.-C. Chen, D. Wu, L. Li, N.-L. Liu, C.-Y. Lu, and J.-W. Pan, “Quantum teleportation of multiple degrees of freedom of a single photon,” Nature 518, 516–519 (2015). [CrossRef]  

45. J.-H. Kim, Y. Kim, D.-G. Im, C.-H. Lee, J.-W. Chae, G. Scarcelli, and Y.-H. Kim, “Noise-resistant quantum communications using hyperentanglement,” Optica 8, 1524–1531 (2021). [CrossRef]  

46. D. Kim, D. Lim, K. Park, and Y. S. Ihn, “Quantum-correlation-based free-space optical link with an active reflector,” Curr. Appl. Phys. 41, 156–162 (2022). [CrossRef]  

47. W. Zedda, I. Gianani, V. Berardi, and M. Barbieri, “Thresholded quantum LIDAR in turbulent media,” AVS Quantum Sci. 4, 041401 (2022). [CrossRef]  

Data availability

The datasets generated and/or analyzed during the current study are not publicly available due to the security policy of the Ministry of National Defense of South Korea, but are available from the corresponding author upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1.
Fig. 1. Schematic diagram of QS-SPI. Alice, who operates the imaging system, generates pairs of polarization-entangled photons. The signal photon is sent to an SLM to be filtered according to a desired imaging pattern. This filtered photon illuminates the target and is reflected to be measured by SPCMs. The idler photon, the other photon in the entangled pair, is measured directly by the other set of SPCMs. The time-correlation and polarization-correlation of the two modes are analyzed from the measured data of the SPCMs.
Fig. 2.
Fig. 2. Schematic diagram of QS-SPI under a potential attack by an adversary, referred to as Eve. In this attack, Eve manipulates the photon rate of a fake signal for the purpose of generating a fraudulent image, which is then sent to Alice. To evade detection, Eve must ensure that the polarization of the fake signal is similar to Alice’s signal, which can be achieved by using an intercept-and-resend attack.
Fig. 3.
Fig. 3. Experimental setup of our QS-SPI. A polarization-entangled photon pair is generated by the Sagnac interferometer with a ppKTP crystal. Polarization of the idler photon is directly detected by SPCMs. The signal photon is reflected by the DMD with a post-selection of its position and sent to a true target. After interaction with the target, the photon is counted by SPCMs in selected polarization. A full deceiving attack is demonstrated by blocking Alice’s signal with a flip mirror and sending Eve’s laser beam in a polarization-controlled and intensity-modulated manner. Accidental coincidence counts occur by Eve’s light, which lead to the formation of a false image. A partial deceiving attack is realized by acquiring photon counts twice: one from a true signal and the other from a false signal. PBS, polarizing beam splitter; QWP (HWP), quarter (half) wave plate; ND filter, neutral density filter.
Fig. 4.
Fig. 4. Images obtained by QS-SPI without any attack (left) or under a full deceiving attack (right). Imaging is performed five times, and the average error rate in each basis with a standard deviation in parenthesis is shown below the corresponding images, where ${e_r}$ (${e_d}$) denotes the error rate in the rectilinear (diagonal) basis. (a) When there is no attack, all error rates are suppressed below a partial deceiving attack threshold of 4.5%. (b) Under the attack, error rates close to 25% are obtained, which is the expected error rate under an ideal intercept-and-resend attack. As the error rates are over 25%, a full deceiving attack exists, and thus, all images should be discarded.
Fig. 5.
Fig. 5. Images obtained by QS-SPI under a partial deceiving attack where the true target profile has no overlap with the false target profile. False signals to the true signal intensity ratios of 500, 1000, and 2000 are demonstrated. When the ratio is 1000, a contrast of true and false target images is balanced to form a deceiving image: the digital number “8.” As either ${e_r}$ or ${e_d}$ is beyond ${e_T}$ but below 25%, a partial deceiving attack exists. Reconstructed trustworthy images are similar to the true target image. The stronger the noise intensity, the more background noise exists in the trustworthy image due to suppression of the true signal by a strong false signal.
Fig. 6.
Fig. 6. Demonstration of a partial deceiving attack where a true target profile has overlap with a false target profile. As either ${e_r}$ or ${e_d}$ is beyond ${e_T}$ but below 25%, a partial deceiving attack exists. From the obtained images, trustworthy images are reconstructed. The image quality of the overlapped region in the trustworthy images worsens as the intensity of the false signal gets stronger. This is due to suppression of the true signal by a strong false signal, which also causes background fluctuation to be stronger.
Fig. 7.
Fig. 7. Images constructed under an imaging disrupting attack by the original SPI (left) and QS-SPI (right). The attack is realized by illuminating Eve’s laser to Alice’s signal, where the laser power was 1000 times greater than Alice’s signal. The image obtained by SPI is ruined, while the time-correlation of a photon pair allowed QS-SPI to successfully construct the image.

Equations (15)

Equations on this page are rendered with MathJax. Learn more.

G ( i , j ) = P ( k ) ( i , j ) I ( k ) P ( k ) ( i , j ) I ( k ) ,
H 2 n + 1 = H 2 n H 2 ,
H 2 = ( 1 1 1 1 ) ,
e X i = C ( X j , X i ) k = 1 2 C ( X k , X i ) ,
I D ( n ) = k { A , E } 1 M i , j P ( n ) ( i , j ) ( η k ( i , j ) χ k ( i , j ) n k )
:= k { A , E } I k ( n ) ,
n I D ( n ) = k { A , E } N 2 M S k n k ,
e T = 1 4 S E n E S A n A + S E n E .
G k ( i , j ) = 1 N n P ( n ) ( i , j ) I k ( n ) 1 2 N n I k ( n )
= 1 4 M η k ( i , j ) χ k ( i , j ) n k .
e T = 1 4 4 i , j G m a s k ( i , j ) i , j G a l l ( i , j ) = i , j G m a s k ( i , j ) i , j G a l l ( i , j ) .
e X i = S E n E , e S A n A , X i + S E ( n E , X i + n E , e ) = 1 4 S E n E S A n A + S E n E ,
e X i = 1 2 S E n E S A n A + S E n E ,
G A ( i , j ) = G c o r ( i , j ) 3 G m a s k ( i , j ) .
n acc = N I N E τ .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.