{"id":40039,"date":"2025-08-01T12:15:00","date_gmt":"2025-08-01T12:15:00","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=40039"},"modified":"2025-08-02T06:24:35","modified_gmt":"2025-08-02T06:24:35","slug":"quantum-scheme-protects-videos-from-prying-eyes-and-tampering","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/quantum-scheme-protects-videos-from-prying-eyes-and-tampering\/","title":{"rendered":"Quantum scheme protects videos from prying eyes and&nbsp;tampering"},"content":{"rendered":"\n<p><a href=\"https:\/\/theconversation.com\/profiles\/yashas-hariprasad-2379017\">Yashas Hariprasad<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/california-state-university-east-bay-4464\">California State University, East Bay<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/s-s-iyengar-2437391\">S. S. Iyengar<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/florida-international-university-729\">Florida International University<\/a><\/em><\/p>\n\n\n\n<p>We have developed a new way to secure video transmissions so even quantum computers in the future won\u2019t be able to break into private video livestreams or recordings. We are computer scientists <a href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=wO2BShkAAAAJ&amp;view_op=list_works&amp;sortby=pubdate\">who study<\/a> <a href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=eNONM8AAAAAJ&amp;view_op=list_works&amp;sortby=pubdate\">computer security<\/a>. Our research introduces quantum-safe video encryption, which combines two complementary techniques: quantum encryption and secure internet transmission.<\/p>\n\n\n\n<p>With <a href=\"https:\/\/doi.org\/10.1109\/TCE.2024.3473542\">our encryption system<\/a>, a hacker wouldn\u2019t be able to access or understand the video data because it\u2019s scrambled using a quantum key that changes unpredictably. Cryptographic keys scramble data so that only someone with the correct key can unscramble it. If the hacker even tries to peek, the system detects it and raises an alarm. The video also travels in the digital equivalent of a locked box over the internet, so nobody can swap or tamper with it in transit.<\/p>\n\n\n\n<p>Quantum encryption scrambles video data using truly random <a href=\"https:\/\/www.thesslstore.com\/blog\/cryptographic-keys-101-what-they-are-how-they-secure-data\/\">cryptographic keys<\/a> based on quantum physics. Unlike traditional encryption that relies on mathematical complexity, quantum encryption uses the fundamental <a href=\"https:\/\/www.quantumgrad.com\/article\/836\">unpredictability of quantum states<\/a> to generate unbreakable keys.<\/p>\n\n\n\n<p>Quantum refers to the scale of atoms and molecules, which behave in counterintuitive ways. Quantum computers take advantage of these strange behaviors to solve problems that are difficult or impossible for ordinary computers.<\/p>\n\n\n\n<p>We combine this quantum encryption scheme with secure transmission over the internet using <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Glossary\/TLS\">transport layer security<\/a>. This is the encryption scheme used to keep connections between web browsers and web pages private.<\/p>\n\n\n\n<p>Our approach works by <a href=\"https:\/\/doi.org\/10.1109\/TCE.2024.3473542\">converting each video frame<\/a> into a <a href=\"https:\/\/doi.org\/10.1002\/9781394265183.ch7\">quantum image representation<\/a>, essentially a mathematical framework that captures visual information in quantum states. We then <a href=\"https:\/\/doi.org\/10.1109\/TCE.2024.3473542\">scramble the data<\/a> by combining it with quantum-generated random keys, making the encrypted video statistically indistinguishable from pure noise. <\/p>\n\n\n\n<p>And because quantum encryption is resistant to future technology such as quantum computers, that video is safe for years to come.<\/p>\n\n\n\n<h2>Why it matters<\/h2>\n\n\n\n<p>Today\u2019s encryption works well, until tomorrow\u2019s quantum computers arrive. These super-powerful machines will be <a href=\"https:\/\/theconversation.com\/what-is-quantum-advantage-a-quantum-computing-scientist-explains-an-approaching-milestone-marking-the-arrival-of-extremely-powerful-computers-213306\">able to crack most current encryption<\/a> methods in seconds. That means today\u2019s private videos, stored on cloud platforms or transmitted over the internet, could be decrypted years from now.<\/p>\n\n\n\n<p>More dangerously, these stolen videos can be manipulated into deepfakes: AI-generated videos that can make anyone appear to say or do anything. A forged video can ruin reputations, sway decisions and even incite violence. A secure encryption system not only protects privacy, it helps protect truth.<\/p>\n\n\n\n<h2>What other research is being done<\/h2>\n\n\n\n<p>Researchers around the world are exploring <a href=\"https:\/\/quantumzeitgeist.com\/what-is-qkd-quantum-key-distribution\/\">quantum key distribution<\/a> to securely share encryption keys. Others use <a href=\"https:\/\/doi.org\/10.3390\/e23030341\">chaos theory<\/a>, <a href=\"https:\/\/doi.org\/10.1016\/j.procs.2023.01.046\">deep learning<\/a> or <a href=\"https:\/\/doi.org\/10.1016\/j.sigpro.2019.02.016\">hybrid algorithms<\/a> to secure video and image content.<\/p>\n\n\n\n<p>But most existing work focuses on images, or only on key exchange, without fully securing live or stored video data.<\/p>\n\n\n\n<h2>What\u2019s next<\/h2>\n\n\n\n<p>We\u2019re working toward scaling this system to encrypt full video files and real-time video streams, such as those used in video conferencing and surveillance systems.<\/p>\n\n\n\n<p>Next steps include reducing the performance overhead for smoother playback and testing the system in real-world environments. We\u2019re also exploring how it can work alongside deepfake detection tools, so we not only stop hackers from accessing videos but also prove the videos haven\u2019t been altered.<\/p>\n\n\n\n<p>While our framework shows strong early results, practical use will depend on phased adoption as quantum systems become more accessible over the years.<\/p>\n\n\n\n<p><em>The <a href=\"https:\/\/theconversation.com\/us\/topics\/research-brief-83231\">Research Brief<\/a> is a short take on interesting academic work.<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/theconversation.com\/profiles\/yashas-hariprasad-2379017\">Yashas Hariprasad<\/a>, Assistant Professor of Computer Science, <em><a href=\"https:\/\/theconversation.com\/institutions\/california-state-university-east-bay-4464\">California State University, East Bay<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/s-s-iyengar-2437391\">S. S. Iyengar<\/a>, Distinguished University Professor of Computer Science, <em><a href=\"https:\/\/theconversation.com\/institutions\/florida-international-university-729\">Florida International University<\/a><\/em><\/p>\n\n\n\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/quantum-scheme-protects-videos-from-prying-eyes-and-tampering-261049\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yashas Hariprasad, California State University, East Bay and S. S. Iyengar, Florida International University We have developed a new way to secure video transmissions so even quantum computers in the future won\u2019t be able to break into private video livestreams or recordings. We are computer scientists who study computer security. Our research introduces quantum-safe video [&hellip;]<\/p>\n","protected":false},"author":56,"featured_media":40040,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,30,276,291,25,28,3410,15533,8],"tags":[10656,612,5403,2555,885,891,886,860,14856,16710,2197,7727,255],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/40039"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=40039"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/40039\/revisions"}],"predecessor-version":[{"id":40041,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/40039\/revisions\/40041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/40040"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=40039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=40039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=40039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}