-
Modeling Entanglement-Based Quantum Key Distribution for the NASA Quantum Communications Analysis Suite
Authors:
Michael J. P. Kuban,
Ian R. Nemitz,
Yousef K. Chahine
Abstract:
One of the most practical, and sought after, applications of quantum mechanics in the field of information science is the use of entanglement distribution to communicate quantum information effectively. Similar to the continued improvements of functional quantum computers over the past decade, advances in demonstrations of entanglement distribution over long distances may enable new applications i…
▽ More
One of the most practical, and sought after, applications of quantum mechanics in the field of information science is the use of entanglement distribution to communicate quantum information effectively. Similar to the continued improvements of functional quantum computers over the past decade, advances in demonstrations of entanglement distribution over long distances may enable new applications in aeronautics and space communications. The existing NASA Quantum Communications Analysis Suite (NQCAS) software models such applications, but limited experimental data exists to verify the model's theoretical results. There is, however, a large body of experimental data in the relevant literature for entanglement-based quantum key distribution (QKD). This paper details a Monte Carlo-based QKD model that uses NQCAS input parameters to generate an estimated QKD link budget for verification of NQCAS. The model generates link budget statistics like key rates, error rates, and S values that can then be compared to the experimental values in the literature. Preliminary comparisons show many similarities between the simulated and experimental data, supporting the model's validity. A verified NQCAS model will inform experimental work conducted in Glenn Research Center's (GRC) NASA Quantum Metrology Laboratory (NQML), supporting the United States Quantum Initiative and potential NASA missions.
△ Less
Submitted 14 January, 2025;
originally announced January 2025.
-
Neural Cover Selection for Image Steganography
Authors:
Karl Chahine,
Hyeji Kim
Abstract:
In steganography, selecting an optimal cover image, referred to as cover selection, is pivotal for effective message concealment. Traditional methods have typically employed exhaustive searches to identify images that conform to specific perceptual or complexity metrics. However, the relationship between these metrics and the actual message hiding efficacy of an image is unclear, often yielding le…
▽ More
In steganography, selecting an optimal cover image, referred to as cover selection, is pivotal for effective message concealment. Traditional methods have typically employed exhaustive searches to identify images that conform to specific perceptual or complexity metrics. However, the relationship between these metrics and the actual message hiding efficacy of an image is unclear, often yielding less-than-ideal steganographic outcomes. Inspired by recent advancements in generative models, we introduce a novel cover selection framework, which involves optimizing within the latent space of pretrained generative models to identify the most suitable cover images, distinguishing itself from traditional exhaustive search methods. Our method shows significant advantages in message recovery and image quality. We also conduct an information-theoretic analysis of the generated cover images, revealing that message hiding predominantly occurs in low-variance pixels, reflecting the waterfilling algorithm's principles in parallel Gaussian channels. Our code can be found at: https://github.com/karlchahine/Neural-Cover-Selection-for-Image-Steganography.
△ Less
Submitted 23 October, 2024;
originally announced October 2024.
-
Exploring Explainability in Video Action Recognition
Authors:
Avinab Saha,
Shashank Gupta,
Sravan Kumar Ankireddy,
Karl Chahine,
Joydeep Ghosh
Abstract:
Image Classification and Video Action Recognition are perhaps the two most foundational tasks in computer vision. Consequently, explaining the inner workings of trained deep neural networks is of prime importance. While numerous efforts focus on explaining the decisions of trained deep neural networks in image classification, exploration in the domain of its temporal version, video action recognit…
▽ More
Image Classification and Video Action Recognition are perhaps the two most foundational tasks in computer vision. Consequently, explaining the inner workings of trained deep neural networks is of prime importance. While numerous efforts focus on explaining the decisions of trained deep neural networks in image classification, exploration in the domain of its temporal version, video action recognition, has been scant. In this work, we take a deeper look at this problem. We begin by revisiting Grad-CAM, one of the popular feature attribution methods for Image Classification, and its extension to Video Action Recognition tasks and examine the method's limitations. To address these, we introduce Video-TCAV, by building on TCAV for Image Classification tasks, which aims to quantify the importance of specific concepts in the decision-making process of Video Action Recognition models. As the scalable generation of concepts is still an open problem, we propose a machine-assisted approach to generate spatial and spatiotemporal concepts relevant to Video Action Recognition for testing Video-TCAV. We then establish the importance of temporally-varying concepts by demonstrating the superiority of dynamic spatiotemporal concepts over trivial spatial concepts. In conclusion, we introduce a framework for investigating hypotheses in action recognition and quantitatively testing them, thus advancing research in the explainability of deep neural networks used in video action recognition.
△ Less
Submitted 13 April, 2024;
originally announced April 2024.
-
Entanglement phases, localization and multifractality of monitored free fermions in two dimensions
Authors:
K. Chahine,
M. Buchhold
Abstract:
We investigate the entanglement structure and wave function characteristics of continuously monitored free fermions with U$(1)$-symmetry in two spatial dimensions (2D). By deriving the exact fermion replica-quantum master equation, we line out two approaches: (i) a nonlinear sigma model analogous to disordered free fermions, resulting in an SU$(R)$-symmetric field theory of symmetry class AIII in…
▽ More
We investigate the entanglement structure and wave function characteristics of continuously monitored free fermions with U$(1)$-symmetry in two spatial dimensions (2D). By deriving the exact fermion replica-quantum master equation, we line out two approaches: (i) a nonlinear sigma model analogous to disordered free fermions, resulting in an SU$(R)$-symmetric field theory of symmetry class AIII in (2+1) space-time dimensions, or (ii) for bipartite lattices, third quantization leading to a non-Hermitian SU$(2R)$-symmetric Hubbard model. Using exact numerical simulations, we explore the phenomenology of the entanglement transition in 2D monitored fermions, examining entanglement entropy and wave function inverse participation ratio. At weak monitoring, we observe characteristic $L\log L$ entanglement growth and multifractal dimension $D_q=2$, resembling a metallic Fermi liquid. Under strong monitoring, wave functions localize and the entanglement saturates towards an area law. Between these regimes, we identify a high-symmetry point exhibiting both entanglement growth indicative of emergent conformal invariance and maximal multifractal behavior. While this multifractal behavior aligns with the nonlinear sigma model of the Anderson transition, the emergent conformal invariance is an unexpected feature not typically associated with Anderson localization. These discoveries add a new dimension to the study of 2D monitored fermions and underscore the need to further explore the connection between non-unitary quantum dynamics in $D$ dimensions and quantum statistical mechanics in $D+1$ dimensions.
△ Less
Submitted 12 August, 2024; v1 submitted 21 September, 2023;
originally announced September 2023.
-
Protocol for suppression of noise from stimulated multi-photon emissions in concatenated entanglement swapping links and quantum repeaters
Authors:
Yousef K. Chahine,
Ian R. Nemitz,
John D. Lekki
Abstract:
Multi-photon emissions constitute a fundamental source of noise in quantum repeaters and other quantum communication protocols when probabilistic photon sources are employed. In this paper, it is shown that by alternating the Bell state measurement (BSM) basis in concatenated entanglement swapping links one can automatically identify and discard many errors from stimulated multi-photon emissions.…
▽ More
Multi-photon emissions constitute a fundamental source of noise in quantum repeaters and other quantum communication protocols when probabilistic photon sources are employed. In this paper, it is shown that by alternating the Bell state measurement (BSM) basis in concatenated entanglement swapping links one can automatically identify and discard many errors from stimulated multi-photon emissions. The proposed protocol is shown to completely eliminate the dominant quadratic growth of multi-photon errors with the length of the repeater chain. Furthermore, it is shown that the protocol can be employed in satellite-assisted entanglement distribution links to enable links which are more robust in the presence of imbalanced channel losses. The analysis introduces a convenient calculus based on Clifford algebra for modeling concatenated entanglement swapping links with multi-photon emissions. In particular, we present a compact expression for the fidelity of the Bell state produced by a repeater chain of arbitrary length including noise from double-pair emissions.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Turbo Autoencoder with a Trainable Interleaver
Authors:
Karl Chahine,
Yihan Jiang,
Pooja Nuti,
Hyeji Kim,
Joonyoung Cho
Abstract:
A critical aspect of reliable communication involves the design of codes that allow transmissions to be robustly and computationally efficiently decoded under noisy conditions. Advances in the design of reliable codes have been driven by coding theory and have been sporadic. Recently, it is shown that channel codes that are comparable to modern codes can be learned solely via deep learning. In par…
▽ More
A critical aspect of reliable communication involves the design of codes that allow transmissions to be robustly and computationally efficiently decoded under noisy conditions. Advances in the design of reliable codes have been driven by coding theory and have been sporadic. Recently, it is shown that channel codes that are comparable to modern codes can be learned solely via deep learning. In particular, Turbo Autoencoder (TURBOAE), introduced by Jiang et al., is shown to achieve the reliability of Turbo codes for Additive White Gaussian Noise channels. In this paper, we focus on applying the idea of TURBOAE to various practical channels, such as fading channels and chirp noise channels. We introduce TURBOAE-TI, a novel neural architecture that combines TURBOAE with a trainable interleaver design. We develop a carefully-designed training procedure and a novel interleaver penalty function that are crucial in learning the interleaver and TURBOAE jointly. We demonstrate that TURBOAE-TI outperforms TURBOAE and LTE Turbo codes for several channels of interest. We also provide interpretation analysis to better understand TURBOAE-TI.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
DeepIC: Coding for Interference Channels via Deep Learning
Authors:
Karl Chahine,
Nanyang Ye,
Hyeji Kim
Abstract:
The two-user interference channel is a model for multi one-to-one communications, where two transmitters wish to communicate with their corresponding receivers via a shared wireless medium. Two most common and simple coding schemes are time division (TD) and treating interference as noise (TIN). Interestingly, it is shown that there exists an asymptotic scheme, called Han-Kobayashi scheme, that pe…
▽ More
The two-user interference channel is a model for multi one-to-one communications, where two transmitters wish to communicate with their corresponding receivers via a shared wireless medium. Two most common and simple coding schemes are time division (TD) and treating interference as noise (TIN). Interestingly, it is shown that there exists an asymptotic scheme, called Han-Kobayashi scheme, that performs better than TD and TIN. However, Han-Kobayashi scheme has impractically high complexity and is designed for asymptotic settings, which leads to a gap between information theory and practice.
In this paper, we focus on designing practical codes for interference channels. As it is challenging to analytically design practical codes with feasible complexity, we apply deep learning to learn codes for interference channels. We demonstrate that DeepIC, a convolutional neural network-based code with an iterative decoder, outperforms TD and TIN by a significant margin for two-user additive white Gaussian noise channels with moderate amount of interference.
△ Less
Submitted 12 August, 2021;
originally announced August 2021.
-
Volume estimates for tubes around submanifolds using integral curvature bounds
Authors:
Yousef K. Chahine
Abstract:
We generalize an inequality of E. Heintze and H. Karcher [8] for the volume of tubes around minimal submanifolds to an inequality based on integral bounds for $k$-Ricci curvature. Even in the case of a pointwise bound, this generalizes the classical inequality by replacing a sectional curvature bound with a $k$-Ricci bound. This work is motivated by the estimates of Petersen-Shteingold-Wei for the…
▽ More
We generalize an inequality of E. Heintze and H. Karcher [8] for the volume of tubes around minimal submanifolds to an inequality based on integral bounds for $k$-Ricci curvature. Even in the case of a pointwise bound, this generalizes the classical inequality by replacing a sectional curvature bound with a $k$-Ricci bound. This work is motivated by the estimates of Petersen-Shteingold-Wei for the volume of tubes around a geodesic [12] and generalizes their result. Using similar ideas we also prove a Hessian comparison theorem for $k$-Ricci curvature which generalizes the usual Hessian and Laplacian comparison for distance functions from a point and give several applications.
△ Less
Submitted 3 October, 2018;
originally announced October 2018.