Quantum Enhanced Hazardous Substances Surveillance System

. Unauthorized access to hazardous substances poses a serious threat to public health. Typically, these substances, such as chemicals, are housed within warehouses or laboratory facilities, making strict control over any unauthorized entry. Te control can be achieved through various measures, including access control systems, registration systems, remote inspection and surveillance, and personnel checks. Given its essential signifcance, the security of surveillance system data transmission plays a critical role. On the one hand, authorized entities must be capable of detecting any malicious data interception, and on the other hand, confdential information must remain safeguarded when an eavesdropper is identifed. To address transmission security, we have developed a quantum-communication-based system for transmitting surveillance imagery of the hazardous chemical storage area entrance. Tis system efectively thwarts eavesdropping and data tampering during transmission, thereby enhancing the security of conventional monitoring systems.


Introduction
Scientifc research and manufacturing processes frequently involve the utilization of diverse chemical agents, including explosives, infammable substances, oxidizing agents, corrosive materials, and toxic compounds.Tese substances inherently pose signifcant hazards, necessitating stringent oversight.Typically, hazardous chemicals are securely stored in dedicated chambers, access to which is rigorously controlled.
One efective method to ensure such control is by deploying a surveillance system employing cameras and monitors to continuously oversee the entrance and exit of the chemical storage facility.Nevertheless, it is imperative to acknowledge the potential vulnerability of this system.An unauthorized individual may manipulate the transmission data between the camera and the monitoring screen, employing methodologies such as a man-in-the-middle attack, thereby falsifying the surveillance system's monitoring imagery [1].Cryptography can potentially resolve this concern by employing data encryption to prevent tampering.However, classical cryptography relies on computational complexity.With the development of quantum computing, including the Shor algorithm and the hybrid-quantum-classical factoring algorithm [2,3], asymmetric cryptography is under existential threat.One efective approach to address this threat is to adopt quantum communication [4][5][6], whose security derives from quantum principles.
Quantum secure direct communication (QSDC) is a kind of quantum communication that can transmit confdential information through the quantum channel directly.Utilizing this characteristic, employing a QSDC protocol for secure transmission of monitoring data appears to be a favorable choice.
Te frst QSDC protocol was proposed in 2000 [6,7], and it has been developing fast in both theory [8][9][10][11] and experiments [12][13][14].Te frst proof-of-principle prototype QSDC system experiment was achieved in 2019 [15], and then, a QSDC experiment over 100 km with time-bin and phase coding was achieved in 2022 [16].Besides the fber channel, QSDC based on free space was also completed in 2020 [17].With the development of QSDC, many technologies are proposed to improve performance, such as quantum-memory-free (QMF) [18][19][20], high-loss channel coding [15,18,19], and INCUM coding [21].In addition to the above achievements, safety issues stemming from device defects have also been studied, such as measurement-deviceindependent (MDI) QSDC [22][23][24] and device-independent (DI) QSDC [25].In order to address the long-range communication needs of QSDC under current technologies, a secure repeater scheme, which can provide end-to-end secure communication based on computational security, was proposed and has been demonstrated in a principle experiment [26].To meet the demands of QSDC networks, a QSDC networking scheme based on mesh topology has also been proposed [27].
Traditional encrypted communication requires a twotiered structure: one layer is dedicated to transmitting keys, ensuring security, while the other handles the transmission of code words, ensuring reliability.In contrast, QSDC aims to convey information through a single quantum channel, thus concurrently achieving security and reliability.Employing QSDC for data transmission within the monitoring system ofers the potential of quantum-based physical security, thereby preventing link eavesdropping and safeguarding against tampering with monitoring data, all while ensuring reliable data transmission.

Surveillance System with QSDC
A surveillance system typically comprises a camera device that captures images of the subject under surveillance, an image data transmission system, and a display monitor.To take advantage of quantum technology and integrate it into the surveillance system, we substitute the traditional data transfer system with a quantum terminal system utilizing the QSDC protocol, which ensures enhanced security and privacy throughout the process.Te composition of the QSDC surveillance system is depicted in Figure 1.Tx and Rx are the QSDC terminals used to transmit the surveillance data.Tx represents the transmitter, and Rx represents the receiver.Te camera is coupled to the transmitter by a USB-FC converter, and the screen is connected to the receiver to display the situation of the monitoring location.
Te transmitter and receiver primarily comprise modules such as optical modules (OM), electrical modules (EM), and central control computers (CC).Modules communicate with each other internally via the PCIe interface, and the transmitter interconnects with the receiver through three cables.Te frst one is a single-mode fber that serves as the quantum channel, linking the transmitter's optical module to the receiver's optical module.Quantum states, serving as the communication medium, are conveyed from the transmitter to the receiver, facilitating one-way communication.Te second cable, also a single-mode fber, is responsible for clock synchronization, connecting the electrical modules of the two terminals.Te third one is an Ethernet cable employed to exchange essential classic interaction information, establishing connectivity between the central control computers.Upon receiving the monitoring data, the QSDC receiver will convert it into image data, subsequently transmitting it to the display screen.
Te QSDC transmitter uses phases of photons to modulate the data captured by the camera, and the receiver demodulates the data utilizing the interference of photons, which is achieved by a Faraday-Michelson interferometer (FMI) [28] as shown in Figure 2. A laser diode emits weak coherent pulses, while the intensity modulator (IM) generates the three intensity decoy states [29][30][31].After the beam splitter (BS), the optical circuit forms an asymmetric FMI.Phase modulation and demodulation are performed through a phase modulator (PM), and the variable optical attenuator (VOA) reduces photon pulse intensity to a single photon level.Combined with the optical circulator (CIR), the single-photon detectors (SPD) can detect the photons after interference.
Te OM combined with the EM can achieve the quantum state transmission.Furthermore, software for preprocessing, encoding, and decoding monitoring data is operational on the CC.
Te security of the system is ensured by the QSDC protocol.Te QSDC protocol's security has been analyzed using Wyner's wiretap channel theory, and quantitative secure capacity has also been given [10,11,15].Figure 3 illustrates the approximate process of an image captured by the camera being transmitted to the receiving-end screen.Initially, the image captured by the camera undergoes compression to reduce its size to a suitable level for transmission.To achieve image compression, we utilized the encoder class within Microsoft's .NET framework.Specifcally, we used the quality parameter, setting it to 20.Subsequently, the image data are passed through an encoder, and the encoded codewords are modulated onto quantum states by the optical system.Tese modulated quantum states are then transmitted through a quantum channel and demodulated within the optical system at the receiver.Te demodulated data are subsequently fed into a decoder, where it is restored to the image fle and displayed on the screen.Te encoder and decoder utilize a forward error correction (FEC) code based on lowdensity parity-check (LDPC) code and repetition code [19].Regarding the QSDC protocol, we have devised a novel protocol inspired by the concepts introduced in [32,33].In brief, the existing QSDC protocols employ a bidirectional framework wherein the qubits carry the information necessitating a round trip between the sender and the receiver to transmit information.Conversely, the innovative QSDC protocol employed in this surveillance system used a unidirectional architecture, requiring merely a one-way transfer of the qubits to transmit information from the sender to the receiver.Tis results in a substantial reduction of the infuence of transmission loss on the communication rate.Te details of the novel QSDC protocol will be disclosed in a forthcoming paper, currently in the process of composition.Te details of the novel QSDC protocol will be disclosed in a separate paper, currently in the process of composition.

Results and Discussion
Te QSDC surveillance system is deployed in the corridor adjacent to the hazardous chemical storage room.A camera is oriented to face the entrance and captures an image every 10 seconds.Each photograph averages about 406.39 KB in size, which is subsequently compressed to an average of 11.78 KB.Ten, the compressed monitoring images are encoded using an FEC code, and the resulting codewords are modulated into quantum states.Te transmission distance is 50 km in a single-mode fber.After the transmission following the QSDC protocol, the quantum states are restored   Quantum Engineering to their compressed image format and displayed on the receiver's screen.
Te system operates continuously for 11.394 hours, equivalent to 11 hours, 23 minutes, and 40 seconds.Te average transmission rate throughout this period is 30.38 kbps, as shown in Figure 4.
Te horizontal coordinate represents the number of each transmission in chronological order, and the vertical coordinate denotes the transmission rate.Te black line shows the rate for each transmission, and we can see signifcant fuctuations in rates per transmission.Tese variations can be attributed to phase drift caused by environmental factors evolving, impacting the transmission rate when the system performs the phase compensation.Te dashed lines indicate the maximum and minimum transmission values, respectively, and the solid line indicates the average transmission rate.
Te images captured by the camera, compressed by the transmitter, and transmitted through the quantum channel are shown in Figure 5, while some content that is not publicly available has been redacted.
It can be seen that after the compression and transmission, although a certain degree of clarity is sacrifced, the condition of the monitored object can still be recognized.
We also measured the time consumption of each transmission, a factor that afects the timeliness of detecting changes in the monitored objects.As shown in Figure 6, the time consumption of the initial 500 transmissions is presented.Te time consumption refers to the duration from the moment of the camera capturing until the decoder at the receiver completes all decoding for the current transmission.Te maximum recorded time consumption stands at 4.21 seconds, while the average time consumption amounts to 3.17 seconds, which implies that duty personnel can detect changes in the monitored object in approximately 4 seconds.
In a more complex complicated scenario, such as a surveillance network comprising multiple cameras, the above surveillance system can still be applied to enhance the security of the surveillance network infrastructure.As shown in Figure 7, cameras positioned at multiple locations transmit images via link 1 to the router, which has the capability to relay the monitoring data to the server through link 2, or directly to the screen for real-time viewing via link 3.With the characteristics of our system, the QSDC surveillance system can be mounted using existing links for integration, endowing links 1, 2, or 3 with the operational capacity to switch to quantum transmission, thereby enhancing the security of the surveillance network.

Conclusions
We have implemented a surveillance system based on quantum communication in this article.Te system employs QSDC to transmit images captured by cameras, providing secure transmission for monitoring data.We performed tests to assess the system's performance, revealing that with a 50 km fber connection between the transmitter and receiver, the system achieved an average transmission rate of 30.38 kbps, with an average transmission time of 3.17 seconds.Based on these results, we conclude that this system is appropriate for monitoring hazardous substances storage facilities.
In complex monitoring scenarios, reducing transmission time will be an area for improvement in the future.Te current factors that afect transmission time in the system are mainly image compression, information encoding, and decoding processes.Tese issues can be resolved by replacing compression algorithms, using more efcient channel coding, and optimizing encoders.As the QSDC system continues to evolve, higher secure transmission rates are expected to be achieved in the future, which may support real-time video monitoring applications.
It is worth pointing out that the QSDC protocol provides a quantum physics-based secure transmission channel between two legitimate users.It can transmit ciphertext data encrypted by the users and allows them to recover plaintext data using their preferred encryption system.Tis feature provides fexibility for integrating our scheme into practical systems, expanding its potential application scenarios.

Figure 5 :
Figure 5: Te images from camera to receiver.(a) Te original image from the camera.(b) Te compressed image.(c) Te received image.

Figure 6 :
Figure 6: Time consumption of transmissions.Te horizontal axis represents the sequential order of transmissions, while the vertical axis represents the time consumption for each transmission.Te red dashed line indicates the maximum time consumption, and the orange solid line indicates the average time consumption.