|
1.IntroductionSynthetic aperture radar (SAR) has been widely applied in both civil surveillance and military reconnaissance. It is capable of generating high-resolution images in all weather conditions and, thus, can provide a powerful tool for remote sensing applications, such as target detection, recognition, and classification.1–3 In addition, to protect the information of targets from being observed by the hostile forces, the electronic countermeasures (ECM) techniques against SAR have also been developed rapidly during the past decades.4 Generally, the ECM techniques against SAR include the barrage jamming and the deception jamming. In barrage jamming, the jammer transmits the noise-like jamming signals into SAR echoes with a very high jamming power, which may be easy to be suppressed and not be applicable in practice.5,6 In the direct retransmitting deception jamming,7–9 the jammer generates the coherent jamming signals by a convolution between the unit impulse response of the jammer system and the intercepted radar signals with a much lower transmitting power than the barrage jamming. Zhou et al.7 proposed a large scene deception jamming method and discussed the real-time realization using a two-step realization and subtemplates parallel processing. Liu et al.8 presented an efficient frequency-domain three-stage algorithm for deception jamming against SAR using the fast Fourier transform (FFT) to accelerate the implementation of the method. Sun et al.9 also proposed an efficient deception jamming technique against SAR by separating the modulation process of the jammer into offline stage and real-time stage, which is easy to be implemented in practical real-time application. Pace et al.10 introduced an all-digital image synthesizer capable of generating false target images from a series of intercepted chirp pulses for countering inverse SAR (ISAR), while a deception template of a ship that closely matches an actual ISAR image is also utilized. In summary, the main purpose of these methods is to cover the region of interest using the deception templates, which are usually derived from an existing SAR image. However, the false target generated by these methods is difficult to be able to include the similar structural or scattering information being relative to a hostile SAR system. Therefore, since the false target is limited to the deception templates, the scattering characteristic of the false target is not applicable when the false target should be changed to another look angle without distortion. In this paper, we propose a method to perform target deception jamming against spaceborne SAR in this paper using the electromagnetic (EM) scattering. Compared with the traditional jamming methods using deception templates, the proposed method achieves the deception jamming using the EM scattering from a deceptive target, which is able to generate the deceptive target in various attitude with high fidelity. Based on the geometrical model for target deception jamming, the EM scattering data from the deceptive target are first simulated by applying an EM calculation software, such as the Computer Simulation Technology (CST) Microwave Studio.11 Then, the proposed jamming frequency response (JFR) is calculated offline by further processing. Finally, the deception jamming is achieved in real time by a multiplication between the JFR and the spectrum of intercepted radar signals. The rest of this paper is organized as follows. The principle for target deception jamming is discussed in Sec. 2. The practical implementation is discussed in Sec. 3. Section 4 shows the deception jamming simulation results. Section 5 concludes this paper. 2.Principle for Target Deception Jamming2.1.Basic Principle for Target Deception JammingFigure 1 shows the geometrical model for target deception jamming against spaceborne SAR in the two-dimensional (2-D) slant range plane, including the radar coordinates system and the target deception coordinates system . Suppose that the spacebrone SAR to be interfered works at the broadside and strip-map mode, and moves at a speed of along the -axis. Use to represent the slow time, and the zero moment of is set at the moment when the SAR is located at . As shown in Fig. 1, the jammer and the center of target deception coordinates system are located at and in the radar coordinates system, respectively. The instantaneous position of SAR is or in the radar coordinates system; is the synthetic aperture length. and are the location and complex scattering coefficients of a point scatterer in the deceptive target, respectively. is the instantaneous slant range between the radar and the center of deception coordinates system. is the instantaneous slant range between the radar and the jammer. is the instantaneous slant range between the radar and a point scatterer in the deceptive target. Without loss of generality, we consider that the spaceborne SAR transmits a chirp signal. Then, a jammer can be seen as a special point scatterer in the illuminated scene by the SAR, whose baseband received echoes1 can be expressed as where is the fast time, yields 1 when and is 0 otherwise, is the pulsewidth, is the carrier frequency, is the chirp rate, and is the speed of light.If the deceptive target existed, its echo can be given by where is the backscattering coefficient of a point scatterer in the deceptive target, which is located at in the target deception coordinates system.According to the principle of deception jamming against SAR,8 the retransmitted jamming signal for the deceptive target of a jammer can be considered as a result of a convolution between the intercepted radar signal and the unit impulse response of the jammer system, where satisfies and denotes the convolution operation along the fast time . Because it is more efficient to implement the convolution operation in frequency domain, we perform the FFT to along the fast time yields with where is the alleged JFR.2.2.Proposed MethodGenerally, a jammer aims to plant the jamming signals of deception templates into the raw echoes of a real scene. However, the backscattering coefficients of the deception templates are usually derived from an existing SAR image, which is chosen according to the scattering characteristics of the SAR images to be interfered. On one hand, it can hardly include the similar structural or scattering information being relative to a hostile SAR system. On the other hand, the scattering characteristic of the false target is also limited to the deception templates so that the deceptive target may not be changed to another required attitude angle without distortion. Thus, it is necessary to combine the EM scattering from the target with the deception jamming to generate the verisimilar deceptive target with high fidelity in various attitude. According to Fig. 1, and can be represented as Eqs. (5) and (6), respectively. Meanwhile, can be expressed as withWhen we fabricate the nonexistent small deceptive target against a typical spaceborne SAR platform, it is useful to make the approximation Because the distance between the spaceborne SAR and the deceptive target is much larger than the size of the target. Moreover, can also be seen as the projection of the vector directed from the center of the target deception coordinates system to the scatterer on the vector directed from the radar to the center of the target deception coordinates system. According to Fig. 1, the projected look angle can be denoted as where is the initial attitude angle of the target.Substituting Eq. (10) into Eqs. (4) and (3), one obtains with where is the frequency response of EM scattering from the deceptive target, and in Eq. (12) is the proposed JFR.Because the electronic warfare support measure can well estimate the transmitted signal parameters, such as the bandwidth and carrier frequency, and the spaceborne SAR kinematic parameters can also be predicted by the Kepler’s laws according to the satellite orbit in advance, the proposed JFR can be calculated offline in practical application and stored in the digital radio-frequency memory (DRFM). Compared with the deception jamming method using an existing SAR image as the deception template, the proposed method introduces the EM scattering property of the target into the generation of jamming signals. Therefore, since the calculated EM scattering property is related to the attitude of the target, it is able to generate the deceptive target in various attitude with high fidelity. In this paper, can be simulated using an EM calculation tool, such as the CST Microwave Studio.11 To obtain EM scattering property, the frequency response of scattering from the false target is simulated using a stepped frequency waveform (SFW). The parameters of the SFW, such as range and spacing, are designed considering the bandwidth of the radar signal and the size of the target. Because it has to cover the frequency band and obtain the sufficient unambiguous range. Additionally, the scattering is influenced by the azimuth time. Different azimuth time corresponds to different projected look angles. Thus, it is simulated by setting a set of look angles in the CST. Then, the detailed EM scattering data from the deceptive target are calculated by utilizing the shooting and bouncing rays techniques, which is in the asymptotic solver of CST Microwave Studio. 2.3.Implementation of AlgorithmBased on the above analysis, the block diagram of the proposed method is shown in Fig. 2. Hence, the proposed deception jamming method can be achieved as follows:
3.Practical ImplementationTo capture the signal of interest, a very wide bandwidth of radio frequency (RF) front-end is used, typically 6 to 12 GHz. The received SAR signal is sent to a wideband RF splitter, and the two outputs of the RF splitter are sent to the instantaneous frequency measurement (IFM) receiver and the DRFM, respectively. A 6- to 12-GHz IFM receiver is used to track the center frequency of the SAR signal with very small time delay. The accuracy of the IFM receiver is and is adequate for tracking the center frequency. Then, the frequency measurement results of the IFM receiver are sent to the frequency synthesizer to generate the changeable local oscillator (LO). This LO is common for both the downconversion mixer and the upconversion mixer. Thus, the coherency of the jammer signal is guaranteed. In other words, the carrier frequency of the RF output jammer signal is nearly the same as the SAR signal. The operation of the wideband DRFM in Fig. 3 is as follows. The input SAR signal is downconverted by the common LO and then sampled with a high-speed analog-to-digital converter (ADC). The samples are stored in digital memory through a field programmable gate array (FPGA) for later retrieval. If the sample rate of ADC and the storage resources of FPGA are adequate, the parameters of the captured SAR signal (e.g., bandwidth, pulse width, amplitude, frequency, and phase) will be fully replicated. Moreover, the amplitude, frequency, and phase of the samples stored in digital memory can be manipulated to generate a wide range of jammer signals. The stored samples are later recalled, passed through a digital-to-analog converter, upconverted by the common LO, and transmitted back to the SAR system. To guarantee the coherency of the jammer signal, the bandwidth of DRFM should not be less than the bandwidth of the SAR signal. The block diagram of a DRFM-based SAR jammer system is shown in Fig. 3. Take the example of the block diagram in Fig. 3, the jammer system has the capability of capturing and replicating the SAR signal with maximum instantaneous bandwidth of 1 GHz, using ADC with 2.4-GSPs sample rate and the DRFM with 1-GHz bandwidth. In previous work, an experimental jammer system has been built up and several hardware-in-the-loop experiments have been carried out.9 4.Simulation ResultsIn this section, some examples are presented to assess the validity of the proposed method. A typical X-band spaceborne SAR platform working in the broadside and strip-map mode is set up in the simulation. The system parameters are also listed in Table 1. Table 1Simulation system parameters.
4.1.Analysis of FocusingIn the deception jamming against spaceborne SAR, the jammer intercepts the chirp signals transmitted by the radar and then retransmits jamming signals to the radar. Consequently, the imaging result along the range is well-focused as the transmitted chirp rate is not changed during the modulation procedure. Therefore, we mainly analyze the image focusing along azimuth. In the experiment, the position of the center of the target deception coordinates system is located the same as that of the jammer, because the former mainly determines a relative location to the false target from the jammer and has no impact on the focusing capability. Moreover, five scatterers are set as the false targets for the analysis of focusing, which are located at , and in the target deception coordinates system. The real scatterers are set at the same position as the false scatterers for contrast analysis. The scatterers are numbered as P1 to P5 in sequence. The raw echoes of the five real scatterers are achieved by the method in Ref. 12. The jamming signals with the five isolated false scatterers are generated by the proposed method. The imaging algorithm is applied to obtain the SAR images.1 Then, the point spread functions (PSF) along azimuth of the five real and false scatterers are shown in Fig. 4. The solid lines and the dot lines denote the real scatterers and the false scatterers, respectively. To demonstrate the validity of the proposed method quantitatively, the detailed evaluating results, including impulse response width (IRW), peak sidelobe ratio (PSLR), and integrated sidelobe ratio (ISLR), are listed in Table 2. The IRW is defined as the width of the main lobe of the impulse response, measured 3 dB below the peak value. The PSLR is the ratio between the height of the largest sidelobe and the height of the main lobe. The ISLR is the ratio between the total power of the sidelobes and the power of the main lobe. The PSLR and ISLR are both expressed in decibels (dB). As shown in Table 2, it is accurate for P1, which is also the center of the target deception coordinates system, but not for the other four scatterers. And, we can see there is only minor difference in the IRW between the other four false scatterers and the corresponding real scatterers, according to Table 2, where the minor differences are caused by the approximation of range equation, as expressed in Eq. (10). However, the IRW errors are too small to cause an obvious defocusing effect in the jamming result along azimuth direction. Moreover, the image contrasts indicated by PSLR or ISLR of the false targets have nearly the same or a little better performance compared with those of the real targets. It means that the imaging quality of false targets obtained by the proposed method along azimuth is similar to that of real targets. In addition, it is also indicated that the approximation in Eq. (10) is acceptable and will not greatly affect the performance of the proposed method while fabricating the small target. This is because the distance to the target is long and the synthetic aperture duration is relatively short for spaceborne SAR. Therefore, the experiments verify that the proposed method can generate well-focused false scatterers, and the nonexistent small deceptive targets are expected to be well-focused under the proposed method. Table 2The detailed evaluating results.
4.2.Deceptive Target SimulationThe simulation parameters of the spaceborne SAR system are also listed in Table 1. In this experiment, we aim to plant a deceptive target into the real scene. The real scene is shown in Fig. 5, which is near the coast and consists of . In the meantime, a typical destroyer is chosen as the deceptive target. The high precision 3-D CAD model of the destroyer is shown in Fig. 6, whose length and width are roughly equivalent to 161.8 and 20 m, respectively. Generally, a deception template with a destroyer is pretty hard to be found in the existing SAR images. It leads to the traditional method based on the deception template can hardly generate the desired destroyer. Hence, the proposed method also contributes to the generation of the specific deceptive target. In addition, another superiority is that the proposed method is able to generate the deceptive target in various attitude with high fidelity. To demonstrate the superiority of the proposed method, we perform a comparison with an existing deception template-based method in Ref. 7. On one hand, a chip SAR image is chosen as the deception template, in which a civilian ship is considered as the deceptive target, as shown in Fig. 7. In the SAR image, the length and width of the ship are and 36.93 m, respectively. Then, the jamming result of the deceptive target in two different attitudes is performed by applying the method in Ref. 7. One of two attitudes is consistent with that of the original chip SAR image, and another is rotated 50-deg clockwise. On the other hand, as for the proposed deception jamming, the EM scattering data from the destroyer in two different attitudes are built up ahead of time by means of the CST Microwave Studio software. The attitude of the target is set in the CST Microwave Studio software. Different attitude of the target corresponds to different frequency response of EM scattering according to Eq. (13). When the offline calculation of frequency response of EM scattering is finished, the jamming signals of the deceptive target in various attitude are then generated using the proposed method. Similarly, the algorithm is applied to the image formation. Figures 8(a) and 8(b) show the imaging results after the deception jamming achieved by Ref. 7 in two different attitudes, respectively. They are numbered as DT1 to DT2 in sequence. It is observed that the method in Ref. 7 is able to generate a well-focused deceptive target, as shown in Fig. 8(a), where the attitude is identical with that of the deception template. However, the performance of the deception jamming will start to deteriorate once the attitude of the target is changed to another one. Figure 8(b) shows the result of the deterioration as the contour of the ship is too distorted. On the other hand, the imaging results after deception jamming of the proposed method in two different attitudes are shown in Figs. 9(a) and 9(b), respectively. They are numbered as DT3 to DT4 in sequence. It is observed that the contour of the deceptive target in the two different attitudes is similar to that of the destroyer. In addition, the open rail of the destroyer in the two jamming results corresponds to the scattering effects of shadowing, because the warship’s superstructure, such as the mainmast and bridge, occludes the radar signals partly illuminating the distant rail, in which it appears black. Moreover, it is seen that the well-focused deceptive target merges with the real scene, which makes the SAR hard to distinguish the false target. Generally, the geometrical feature is another widely explored ship feature used for ship classification. They can be extracted in a minimum bounding rectangle around the target to avoid interference of sea clutter.3 Hence, we measure the length and width of the deceptive target as critera for the comparison of the detection of classification performance. The measured length and width of the deceptive target simulated with the two methods are listed in Table 3. It is shown that the measured length and width of the two deceptive destroyers for the proposed method in various attitude are both similar to that of a destroyer represented in the 3-D model. However, there is an evident difference between the measured length and width of the deceptive targets in two attitudes for the method in Ref. 7. This is because it is impossible to represent a target in different attitudes using a 2-D deception-template model without changing the model. Therefore, the simulation results reveal that the proposed deception jamming method is able to generate the deceptive target in various attitude with higher fidelity by comparison. Table 3The measured length and width of deceptive target simulated with the two methods.
5.ConclusionIn this paper, a target deception jamming method using the EM scattering is proposed, which counters the broadside and strip-map spaceborne SAR. In the proposed method, the modulation process is mainly divided into two stages: offline stage and real-time stage. In the offline stage, the proposed JFR is calculated by means of the EM scattering data from the deceptive target and further processing. In the real-time stage, the deception jamming is achieved by the DRFM-based SAR jammer system. Thus, the proposed method has a good prospect for practical application. Additionally, the EM scattering model can simulate the scattering characteristic of the target accurately, which is able to generate the deceptive target in various attitude with higher fidelity compared with the traditional deception jamming method. In conclusion, the simulation results of this paper show that the proposed method can generate well-focused false scatterers and generate the deceptive target in various attitude with high fidelity. AcknowledgmentsThis work was supported in part by the National Natural Science Foundation of China (Grant No. 61771302) and the Aeronautical Science Foundation of China (Grant Nos. 20142057007 and 2015ZD07006). ReferencesI. Cumming and F. Wong, Digital Signal Processing of Synthetic Aperture Radar Data: Algorithms and Implementation, Artech House, Norwood, Massachusetts
(2005). Google Scholar
W. Chao et al.,
“Ship detection for high-resolution SAR images based on feature analysis,”
IEEE Geosci. Remote Sens. Lett., 11
(1), 119
–123
(2014). https://doi.org/10.1109/LGRS.2013.2248118 Google Scholar
H. Lang et al.,
“Ship classification in SAR image by joint feature and classifier selection,”
IEEE Geosci. Remote Sens. Lett., 13
(2), 212
–216
(2015). https://doi.org/10.1109/LGRS.2015.2506570 Google Scholar
W. Walter and W. Goj, Synthetic Aperture Radar and Electronic Warfare, Artech House, Boston, Massachusetts
(1993). Google Scholar
K. Dumper et al.,
“Spaceborne synthetic aperture radar and noise jamming,”
in Proc. IET Int. Radar System,
411
–414
(1997). https://doi.org/10.1049/cp:19971707 Google Scholar
F. Zhou et al.,
“A novel method for adaptive SAR barrage jamming suppression,”
IEEE Geosci. Remote Sens. Lett., 9
(2), 292
–296
(2012). https://doi.org/10.1109/LGRS.2011.2166753 Google Scholar
F. Zhou et al.,
“A large scene deceptive jamming method for space-borne SAR,”
IEEE Trans. Geosci. Remote Sens., 51
(8), 4486
–4495
(2013). https://doi.org/10.1109/TGRS.2013.2259178 IGRSD2 0196-2892 Google Scholar
Y. Liu et al.,
“A frequency-domain three-stage algorithm for active deception jamming against synthetic aperture radar,”
IET Radar Sonar Navig., 8
(6), 639
–646
(2014). https://doi.org/10.1049/iet-rsn.2013.0222 Google Scholar
Q. Sun et al.,
“A novel jamming signal generation method for deceptive SAR jammer,”
in Radar Conf.,
1174
–1178
(2014). https://doi.org/10.1109/RADAR.2014.6875774 Google Scholar
P. Pace et al.,
“Digital false-target image synthesiser for countering ISAR,”
IEE Proc. Radar Sonar Navig., 149
(5), 248
–257
(2002). https://doi.org/10.1049/ip-rsn:20020635 Google Scholar
CST Studio Suite, CST Suite 2013, Computer Simulation Technology AG, Darmstadt
(2013). Google Scholar
O. Dogan and M. Kartal,
“Time domain SAR raw data simulation of distributed targets,”
EURASIP J. Adv. Signal Process., 2010
(1), 784
–815
(2010). https://doi.org/10.1155/2010/784815 Google Scholar
BiographyQingyang Sun received his BS degree in electrical information engineering from Northeast University, China, in 2012. Since September 2012, he has been working toward his PhD at the Shanghai Key Laboratory of Intelligent Sensing and Recognition, Shanghai Jiao Tong University (SJTU), China. His research interests include radar signal processing, radar imaging processing, and radar countermeasure. Ting Shu received his BS and MSc degrees in electronic engineering from Nanjing University of Science and Technology, China, in 2004 and 2006, respectively. Then, he received his PhD in electronic engineering from SJTU in 2010. Since 2011, he has been an assistant professor at the School of Electronic Information and Electrical Engineering (SEIEE), SJTU, China. His research interests include radar system design and implementation, radar signal processing, and radar countermeasure. Bin Tang received his BS degree in communication engineering and his MSc degree in signal processing from Xidian University, China, in 1989 and 1997, respectively. Then, he received his PhD from SJTU in 2002. From 2002 to 2009, he was the fellow-class senior engineer at the Institute of Marine Electronic Equipment. Since 2009, he has been an associate professor at SEIEE, SJTU, China. His research interests include signal processing and radar countermeasure. Wenxian Yu received his BS, MS, and PhD degrees from the National University of Defense Technology, Changsha, China, in 1985, 1988, and 1993, respectively. Currently, he is a professor and head of the SEIEE, SJTU. His research interests include target recognition, remote sensing information processing, multisensor data fusion, etc. In these areas, he has published more than 200 research papers. |