[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113484829B - Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar - Google Patents

Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar Download PDF

Info

Publication number
CN113484829B
CN113484829B CN202110744105.8A CN202110744105A CN113484829B CN 113484829 B CN113484829 B CN 113484829B CN 202110744105 A CN202110744105 A CN 202110744105A CN 113484829 B CN113484829 B CN 113484829B
Authority
CN
China
Prior art keywords
signal
frequency threshold
bit
false target
frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110744105.8A
Other languages
Chinese (zh)
Other versions
CN113484829A (en
Inventor
赵博
陈泉宇
黄磊
张彬
刘仕奇
赵源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN202110744105.8A priority Critical patent/CN113484829B/en
Publication of CN113484829A publication Critical patent/CN113484829A/en
Application granted granted Critical
Publication of CN113484829B publication Critical patent/CN113484829B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/021Auxiliary means for detecting or identifying radar signals or the like, e.g. radar jamming signals
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/38Jamming means, e.g. producing false echoes
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/89Radar or analogous systems specially adapted for specific applications for mapping or imaging
    • G01S13/90Radar or analogous systems specially adapted for specific applications for mapping or imaging using synthetic aperture techniques, e.g. synthetic aperture radar [SAR] techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

The invention discloses a method for generating 1-bit multi-decoy spoofing interference aiming at a synthetic aperture radar, which comprises the following steps: acquiring a target synthetic aperture radar signal, and constructing a false target signal according to the target synthetic aperture radar signal; preparing for subsequent generation of a single-frequency threshold signal, obtaining a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase; the single-frequency threshold signal is used for decomposing harmonic waves caused by 1-bit quantization, a 1-bit quantized signal is obtained according to the single-frequency threshold signal and the false target signal, the complexity of an interference machine is reduced, and the 1-bit quantized signal is subjected to interference modulation to obtain a 1-bit multi-false target deception interference signal.

Description

Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar
Technical Field
The invention relates to the technical field of radar signal processing, in particular to a method for generating 1-bit multi-false target deception jamming aiming at a synthetic aperture radar.
Background
Synthetic aperture radar (Synthetic Aperture Radar, SAR) is a method that enables continuous surveillance in a variety of weather and lighting conditions and is therefore widely used in civilian, and in particular military, reconnaissance. The spoofing jammer imitates the characteristic of SAR echo, so that the spoofing jammer can obtain higher processing gain through SAR imaging, and the consumption of interference power is greatly reduced. Thus, the understanding of SAR images is unknowingly misled by false targets, which is a more concealed and detrimental countermeasure to SAR. However, the spoofing modulation requires a large amount of computation, which results in a problem of high computational complexity in the existing spoofing modulation method.
Accordingly, there is a need for improvement and development in the art.
Disclosure of Invention
The invention aims to solve the technical problems that the prior art is overcome by providing a 1-bit multi-decoy deception jamming generation method for a synthetic aperture radar, and aims to solve the problems that deception jamming modulation in the prior art requires a large amount of calculation, and the calculation complexity is high in the prior deception jamming modulation method.
The technical scheme adopted by the invention for solving the problems is as follows:
in a first aspect, an embodiment of the present invention provides a method for generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar, where the method includes:
acquiring a target synthetic aperture radar signal, and constructing a false target signal according to the target synthetic aperture radar signal;
obtaining a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase;
and obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, and performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception interference signal.
In one implementation, the constructing a false target signal from the target synthetic aperture radar signal includes:
acquiring an oblique distance course; wherein the slant range history is the distance from the cheating jammer to the SAR system;
and carrying out fusion calculation on the slant range process and the target synthetic aperture radar signal to obtain a false target signal.
In one implementation, the obtaining the single-frequency threshold frequency and the single-frequency threshold phase according to the false target signal includes:
calculating scattering distances of two false scattering bodies of the false target signals;
performing distance translation on the scattering distance and the oblique distance course to obtain a single-frequency threshold frequency;
and carrying out azimuth translation on the scattering distance and the slant distance process to obtain a single-frequency threshold phase.
In one implementation, the obtaining the single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase includes:
acquiring single-frequency threshold amplitude;
and determining a single-frequency threshold signal according to the single-frequency threshold amplitude, the single-frequency threshold frequency and the single-frequency threshold phase.
In one implementation manner, the obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, and performing interference modulation on the 1-bit quantized signal, to obtain a 1-bit multi-false target spoofing interference signal includes:
acquiring the instantaneous amplitude of the false target signal;
acquiring the instantaneous amplitude of the single-frequency threshold signal;
obtaining a 1-bit quantized signal according to the instantaneous amplitude of the false target signal and the instantaneous amplitude of the single-frequency threshold signal;
and performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception jamming signal.
In one implementation, the obtaining a 1-bit quantized signal according to the instantaneous amplitude of the false target signal and the instantaneous amplitude of the single frequency threshold signal includes:
when the instantaneous amplitude of the false target signal is larger than that of the single-frequency threshold signal, a 1-bit quantized signal value corresponding to the instantaneous moment of the false target signal is 1;
when the instantaneous amplitude of the false target signal is smaller than or equal to the instantaneous amplitude of the single-frequency threshold signal, a 1-bit quantized signal value corresponding to the instantaneous moment of the false target signal is 0;
and combining a plurality of 1-bit quantized signal values into a 1-bit quantized signal.
In one implementation, the performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-decoy spoofing interference signal includes:
and carrying out distance modulation and azimuth modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception jamming signal.
In one implementation, the performing distance modulation and azimuth modulation on the 1-bit quantized signal to obtain a 1-bit multi-decoy spoofing interference signal includes:
adjusting the time delay of the 1-bit quantized signal to obtain a distance-modulated 1-bit quantized signal;
and modulating the Doppler frequency of the 1-bit quantized signal after the distance modulation to obtain a 1-bit multi-false target deception jamming signal.
In a second aspect, an embodiment of the present invention further provides a generating device for 1-bit multi-decoy spoofing interference with respect to a synthetic aperture radar, where the device includes:
the false target signal construction module is used for acquiring a target synthetic aperture radar signal and constructing a false target signal according to the target synthetic aperture radar signal;
the single-frequency threshold signal acquisition module is used for obtaining single-frequency threshold frequency and single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase;
and the 1-bit multi-false target deception jamming signal acquisition module is used for obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, and performing interference modulation on the 1-bit quantized signal to obtain the 1-bit multi-false target deception jamming signal.
In a third aspect, an embodiment of the present invention further provides an intelligent terminal, including a memory, and one or more programs, where the one or more programs are stored in the memory, and configured to be executed by the one or more processors, where the one or more programs include a method for executing the 1-bit multi-decoy spoofing interference for a synthetic aperture radar as set forth in any one of the above.
In a fourth aspect, embodiments of the present invention also provide a non-transitory computer-readable storage medium, which when executed by a processor of an electronic device, enables the electronic device to perform a method of generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar as described in any of the above.
The invention has the beneficial effects that: firstly, acquiring a target synthetic aperture radar signal, and constructing a false target signal according to the target synthetic aperture radar signal; preparing for subsequent generation of a single-frequency threshold signal, obtaining a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase, wherein the single-frequency threshold signal is used for decomposing harmonic waves caused by 1-bit quantization; finally, according to the single-frequency threshold signal and the false target signal, a 1-bit quantized signal is obtained, the complexity of an jammer is reduced, and interference modulation is carried out on the 1-bit quantized signal, so that a 1-bit multi-false target deception jamming signal is obtained; therefore, in the embodiment of the invention, the method generates a plurality of separated decoy spoofing interference signals, so that the complexity of interference modulation calculation can be effectively reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings may be obtained according to the drawings without inventive effort to those skilled in the art.
Fig. 1 is a flow chart of a method for generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar according to an embodiment of the present invention.
Fig. 2 is a diagram of a geometric model of 1-bit split spoofing interference provided by an embodiment of the present invention.
Fig. 3 is a schematic diagram of modulation after interception of the slope interval in the slow time domain according to an embodiment of the present invention.
Fig. 4 is a flow chart of one implementation of 1-bit multi-decoy spoofing for a synthetic aperture radar in accordance with an embodiment of the present invention.
Fig. 5 is a schematic diagram of a simulation result of scatterer spoofing interference provided in an embodiment of the present invention.
Fig. 6 is a schematic block diagram of a generating device for 1-bit multi-decoy spoofing interference for a synthetic aperture radar according to an embodiment of the present invention.
Fig. 7 is a schematic block diagram of an internal structure of an intelligent terminal according to an embodiment of the present invention.
Detailed Description
The invention discloses a method for generating 1-bit multi-false target deception jamming aiming at a synthetic aperture radar, an intelligent terminal and a storage medium, and in order to make the purposes, technical schemes and effects of the invention clearer and more definite, the invention is further described in detail below by referring to the accompanying drawings and the embodiments. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
It will be understood by those skilled in the art that all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Since in the prior art, in order to prevent targets from being detected by local SAR, electronic Challenge (ECM) technology is continuously developed as SAR is developed. When an active jammer emits electromagnetic waves to strive for electronic countermeasure initiative against synthetic aperture radar, a compromise must be made between power consumption and computational complexity. The interceptor jammers interfere with SAR with high power noise, which SAR imaging algorithms typically cannot effectively accumulate. The signal-to-noise ratio of the SAR image is continuously reduced under the interception interference. Therefore, it is difficult for the enemy SAR to extract the target feature. Intercepting interference has the advantage of low computational complexity. However, since it is difficult to obtain a coherent processing gain similar to that of SAR, a large amount of transmit power is used in the mask interference, making it easy to expose. The situation is the opposite for a rogue interferer. The spoofing jammer imitates the characteristic of SAR echo, so that the spoofing jammer can obtain higher processing gain through SAR imaging, and the consumption of interference power is greatly reduced. Thus, the understanding of SAR images is unknowingly misled by false targets, which is a more concealed and detrimental countermeasure to SAR. However, spoofing the modulation requires a significant amount of computation. That is, the advantage of spoofing the jammer in terms of power consumption is at the cost of computational complexity. At a certain technical level, the computational complexity is a bottleneck that restricts the implementation and practical application of the fraudulent interference.
Franchetti et al in document "Processing of signum coded SAR signal: theory and experiments" (IEE Proceedings F-Radar and Signal Processing, vol.138, no.3,1991, pp.192-198) propose a one-bit sampling based SAR imaging solution, which greatly reduces the data volume of the imaging process by one-bit quantization of the echo signals, thereby greatly simplifying the imaging process implementation complexity. The imaging quality loss caused by the system simplification is in an acceptable range, so that the cost of imaging processing is greatly reduced while the imaging quality is ensured, and the real-time performance of SAR imaging is improved.
Gianelli et al in the literature "One-bit compressive sampling with time-varying thresholds for sparse parameter estimation" (IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM' 16), rio de Janeiro, brazil, jul.2016, pp.1-5.) introduce a random time-varying threshold into One-bit samples, thereby enabling high quality recovery of the absolute amplitude information of the original signal, guaranteeing the integrity of the information when One-bit signal is reconstructed. However, the method is difficult to apply in a non-sparse scene of SAR imaging on the premise that the original signal has sparse characteristics.
Zhao et al in document "Deception jamming for squint SAR based on multiple receivers" (IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol.8, no.8, pp.3988-3998,2015.) utilize a multi-receiver system for spoofing modulation, which greatly improves SAR spoofing accuracy and robustness. However, the method is based on the traditional high-precision signal interception, modulation and forwarding system, and still has the problems of complex system and large operand.
Zhao et al in document "Deceptive SAR jamming based on 1-bit sampling and time-varying thresholds" (IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol.11, no.3, pp.939-950,2018.) use 1-bit sampling techniques to intercept radar transmit signals. The complexity of the system is simplified to a certain extent. The random time-varying threshold corresponds to introducing additional noise into the signal, which can reduce the signal-to-noise ratio and affect the imaging quality.
In order to solve the problems in the prior art, the present embodiment provides a method for generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar, by which a plurality of separated decoy spoofing interference signals are generated, so that the interference modulation computation complexity can be effectively reduced. When the method is implemented, firstly, a target synthetic aperture radar signal is acquired, and a false target signal is constructed according to the target synthetic aperture radar signal; preparing for subsequent generation of a single-frequency threshold signal, obtaining a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase, wherein the single-frequency threshold signal is used for decomposing harmonic waves caused by 1-bit quantization; and finally, obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, reducing the complexity of an jammer, and performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception jamming signal.
Exemplary method
The embodiment provides a method for generating 1-bit multi-false target spoofing interference aiming at a synthetic aperture radar, which can be applied to an intelligent terminal for radar signal processing. As shown in fig. 1, the method includes:
s100, acquiring a target synthetic aperture radar signal, and constructing a false target signal according to the target synthetic aperture radar signal;
specifically, the target synthetic aperture radar signal may be acquired by a radar receiver, or may be acquired by a rogue jammer. In this embodiment, the chirped signal (LFM) is typically employed by SAR due to its high resolution and high signal-to-noise gain, and the target synthetic aperture radar signal can be expressed as:
wherein rect (·) is a rectangular function, representing a width T r Envelope degree, t, of the chirped pulse r Is a fast time, f c For carrier frequency, K r Is the tuning frequency. To get fraudulent use of the dryFor the purpose of interference, the primary task of the jammer is to simulate the signal emitted by the radar. The target synthetic aperture radar signal is obtained, and false target signals can be constructed in a mode of adding other signals to the target synthetic aperture radar signal or in a mode of re-synthesizing the target synthetic aperture radar signal.
In one implementation of the present invention, the constructing a false target signal according to the target synthetic aperture radar signal includes the steps of:
s101, acquiring an inclined distance course; wherein the slant range history is the distance from the cheating jammer to the SAR system;
s102, carrying out fusion calculation on the slope distance history and the target synthetic aperture radar signal to obtain a false target signal.
Specifically, obtaining an inclined distance course; wherein the slant range history is the distance from the cheating jammer to the SAR system; the SAR system is a synthetic aperture radar system, e.g. R as shown in FIG. 2 O′ (t a ) To deceive the distance of the jammer's location O' from the SAR system. And then, carrying out fusion calculation on the slant range process and the target synthetic aperture radar signal to obtain a false target signal. For example, suppose that a rogue jammer is deployed at O' (x) of the SAR imaging plane O′ ,y O′ ) Where R is O′ (t a ) Will be O' (x O′ ,y O′ ) The distance from the SAR system is characterized by a slow time t a The LFM signal intercepted by the jammer, i.e. the false target signal is:
where c is the propagation velocity of the electromagnetic wave. In conventional jammers, the amplitude, delay and doppler frequencies of the above equation are directly modulated to create false targets in the SAR image, i.e., to perform the signal processing described above on the digitized signal after interception. Aiming at the deception jamming task, the invention improves a 1-bit quantization method based on SFT (single frequency threshold), improves the deception jamming effect with extremely low complexity, and assumes that the synthetic aperture radar works in a side-looking mode in the geometric model of the jammer as shown in figure 2. The rogue jammer is deployed at O'. As indicated by the dashed line in fig. 2, a coupled pseudo-diffuser P 'is produced' + And P' - And obtain P' + Is (Deltax ', deltay ') and P ' - Coordinates (- Δx ', - Δy').
After obtaining the false target signal, the following steps may be performed as shown in fig. 1: s200, obtaining a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase;
specifically, according to some parameter information in the false target signal, the false target signal can be calculated to obtain the single-frequency threshold frequency and the single-frequency threshold phase, and the single-frequency threshold signal contains the single-frequency threshold frequency and the single-frequency threshold phase information.
In one implementation manner of the present invention, the obtaining the single-frequency threshold frequency and the single-frequency threshold phase according to the false target signal includes the following steps:
s201, calculating scattering distances of two false scattering bodies of the false target signals;
s202, performing distance translation on the scattering distance and the oblique distance course to obtain a single-frequency threshold frequency;
s203, carrying out azimuth translation on the scattering distance and the slant distance process to obtain a single-frequency threshold phase.
Specifically, firstly calculating scattering distances of two false scattering bodies of the false target signals; for example, coupled pseudo-scatterers P' + And P' - And obtain P' + Is (Deltax ', deltay ') and P ' - Coordinates (- Δx ', - Δy'), according to the formula:obtain scattering distance->Then, carrying out distance translation on the scattering distance and the slant distance process to obtain a single-frequency threshold frequency; for example, for a pseudo-diffuser P 'modulated by an jammer' + And P' - Their projection on the fast time axis is projected in the same area as O' on the fast time axis. The distance-shifting modulation is actually achieved by introducing an additional frequency offset. The distance translation task is performed by SFT (Single frequency threshold) frequency, with f τ (t a ) And executing a distance translation task, wherein the single-frequency threshold frequency expression is as follows:
where Θ represents the square of the slope history divided by c 2 . Since c is much larger than the pitch history, Θ can be ignored.
The value of the slope distance difference value is as follows:
ΔR′ m (t a )=[R′ + (t a )-R′ - (t a )]/2
for practical purposes, taylor approximations are generally usedΔR′ ± (t a ) To make a compromise between performance and complexity, the advantage of rogue jammers in terms of power consumption comes at the cost of computational complexity, since rogue modulation requires a large amount of computation. Increasing the computational complexity reduces power consumption and increases performance.
In DeltaR' + (t a ) For example, P 'is obtained' + An approximation of the instantaneous skew difference of (2) can be expressed as:
for higher precision, P 'is required' - Instantaneous skew difference ΔR' - (t a ) The approximation is:
to reduce errors, according to P' + Instantaneous pitch difference sum P' - Instantaneous skew difference ΔR' - (t a ) Obtaining an instantaneous skew difference, and calculating the following formula:
depending on the modulation accuracy, either only the constant term or both the constant term and the first order term may be used, and if higher accuracy is desired, the constant term, the first order term and the second order term may be used, or even higher terms may be introduced. (constant term is free of t a The primary term is the term containing t a The second term is the term containingThe above three formulas are similar. )
After the single-frequency threshold frequency is obtained, azimuth translation can be carried out on the scattering distance and the slant distance process to obtain a single-frequency threshold phase. For example: changing SFT by changing different pulse repetition intervalsFrequency, simulating a real scatterer P in the slant range + And P - Is a characteristic of (a). However, the LFM signal intercepted by the jammer, that is, the split modulation in the false target signal interception is constructed only to be half, and the intercepted LFM signal needs to be modulated. From the perspective of doppler frequency, the range history of the spoofing disturbance is inconsistent with the true scatterer. Thus, additional azimuthal modulation is still required to be achieved. The azimuth-shift task being performed by SFT (single frequency threshold) phase, usingAnd executing azimuth translation tasks, wherein the single-frequency threshold phase expression is as follows:
wherein lambda is the wavelength of electromagnetic wave, deltaR' ± (t a ) Taylor approximation of the skew difference.
In another implementation manner of the present invention, the obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase includes the following steps:
s204, acquiring single-frequency threshold amplitude;
s205, determining a single-frequency threshold signal according to the single-frequency threshold amplitude, the single-frequency threshold frequency and the single-frequency threshold phase.
Specifically, a single-frequency threshold amplitude A is obtained s Then determining a single frequency threshold signal according to the single frequency threshold amplitude, the single frequency threshold frequency and the single frequency threshold phase, for example, generating a corresponding single frequency threshold h according to the single frequency threshold frequency and the single frequency threshold phase obtained by calculation s (t r ,t a ),h s (t r ,t a ) Are single frequency thresholds for different parameters at different Pulse Repetition Intervals (PRI). Single frequency threshold signal h s (t r ,t a ) The expression of (2) is:
wherein f τ (t a ) Andis along with the slow time t a Frequency of change and initial phase.
After obtaining the single frequency threshold signal, the following steps may be performed as shown in fig. 1: s300, obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, and performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception interference signal.
Specifically, 1-bit quantization is the modulation of a signal with 1-bit binary code transmission samples. Interference modulation is a modulation scheme that interferes with the amplitude or frequency or phase of a signal.
In one implementation manner of the present invention, the obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, and performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target spoofing interference signal includes the following steps:
s301, acquiring the instantaneous amplitude of the false target signal;
s302, acquiring the instantaneous amplitude of the single-frequency threshold signal;
s303, obtaining a 1-bit quantized signal according to the instantaneous amplitude of the false target signal and the instantaneous amplitude of the single-frequency threshold signal;
s304, performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception interference signal.
Specifically, firstly, acquiring the instantaneous amplitude of the false target signal and the instantaneous amplitude of the single-frequency threshold signal; then obtaining a 1-bit quantized signal according to the instantaneous amplitude of the false target signal and the instantaneous amplitude of the single-frequency threshold signal; correspondingly, the obtaining the 1-bit quantized signal according to the instantaneous amplitude of the false target signal and the instantaneous amplitude of the single-frequency threshold signal comprises the following steps: when the instantaneous amplitude of the false target signal is larger than that of the single-frequency threshold signal, a 1-bit quantized signal value corresponding to the instantaneous moment of the false target signal is 1; when the instantaneous amplitude of the false target signal is smaller than or equal to the instantaneous amplitude of the single-frequency threshold signal, a 1-bit quantized signal value corresponding to the instantaneous moment of the false target signal is 0; and combining a plurality of 1-bit quantized signal values into a 1-bit quantized signal. For example, the introduction of SFT complicates the spectrum of the intercepted synthetic aperture radar signal, however, it enables a 1-bit quantizer to shift the harmonic spectrum to meet different applications. For a rogue machine that achieves high efficiency at as low a cost as possible, SFT increases the target number by preserving some harmonics with low complexity of the rogue modulation. The custom 1-bit SFT quantizer for synthetic aperture radar signal interception can be written as:
s O′1 (t r ,t a )=csign[s O′ (t r ,t a )+h s (t r ,t a )] *
wherein ( * Calculating the conjugate of a complex signal, and returning the symbol of the complex sample by csign(s) corresponding toFrom the above processing, the intercepted modulation is simplified by processing the 1-bit quantized signal, and double decoys are generated by one-time modulation, so that the complexity of deception jamming is remarkably reduced. And finally, performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception interference signal. Correspondingly, the performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-decoy spoofing interference signal includes the following steps: and carrying out distance modulation and azimuth modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception jamming signal. In one implementation manner, the performing distance modulation and azimuth modulation on the 1-bit quantized signal to obtain a 1-bit multi-decoy spoofing interference signal includes the following steps: adjusting the time delay of the 1-bit quantized signal to obtain 1-bit after distance modulationQuantizing the signal; for example, dividing an intercepted synthetic aperture radar into two false scatterers requires conventional rogue modulation to adjust the scattering characteristics and overall position of the two false scatterers, i.e., modulating the coordinate system x ' O ' y ' to produce the coordinate system x "O" y ". By P + For example, post-acquisition modulation may be described as:
wherein R' O (t a ) Is the instantaneous offset difference between O "and O',representing P' + This formula is expressed by passing P' + Point modulation to P + To simulate a real scatterer. Delta (·) represents the Dirichlet function,>the scattering coefficient is changed. Combining a plurality of scatterers with the scattering properties described above, false objects and even false scenes can be manufactured. In the distance domain, the task of the post-interception modulation is still to adjust the pseudo-scatterer P + And P' - To simulate the true scatterer +.>And->Is a ramp history of (1). The time delay of the truncated 1-bit signal is directly changed to adjust the instantaneous skew. After the post-interception distance domain modulation, the slope distance history is obtained as shown by the dashed line in fig. 3. And then modulating the Doppler frequency of the 1-bit quantized signal after the distance modulation to obtain a 1-bit multi-false target deception jamming signal. For example, according to the formula:
the Doppler frequency is modulated as the azimuth modulation in the interception LFM signal, and a 1-bit multi-false target deception jamming signal is obtained. And finally, the modulated signal is forwarded to a radar receiver to form interference to the radar. The flow chart is shown in fig. 4.
The task of the invention of deception jamming modulation is divided into internal modulation and external modulation, wherein the internal modulation is internal modulation, namely the modulation in interception, and the external modulation is the modulation after interception. Internal modulation is synchronized with 1-bit quantized signal interception, the split pseudo-scatterers are moved to the required positions, and parameters of SFT at different pulse repetition intervals are adjusted. The external modulation then provides scattering properties and further positional translation of the segmented scatterers to produce decoy-disturbance, which can generate multiple decoy-disturbances with less computational effort. Therefore, the complexity of the jammer is reduced, the working efficiency is improved, and the method can be practically applied to multiple scenes.
The effects of the present invention can be further illustrated by the following simulation experiments. The simulation platform uses MATLAB.
The synthetic aperture radar parameters are as follows:
in the simulation of scatterers, the synthetic aperture radar signal is truncated by the 1-bit quantizer of the present invention, where Δx '= -25m and Δy' = 150m. The simulation shows an internally modulated pseudo-diffuser P' + And P' - . Then further performing external modulation of Deltax=25m and Deltay=150m on the synthetic aperture radar signal intercepted by the 1-bit quantizer, and finally obtaining a pseudo scatterer P' + And P' - . O 'and O' are respectively represented by 'X' andand (3) representing. The scatterer spoofing simulation results are shown in fig. 5.
The invention is characterized in that:
(1) The invention relates to a 1-bit split deceptive jamming generation method and a system based on a synthetic aperture radar.
(2) The invention improves the 1-bit quantization scheme, and greatly reduces the complexity of the jammer on the premise of ensuring the focusing quality. The single frequency threshold is used to decompose the 1-bit quantization induced harmonics, the parameters of which vary with different pulse repetition intervals, to provide controllable modulation. Thus, during 1-bit interception, the synthetic aperture radar signal is split into coupled false scatterers. By further amplitude, time delay and doppler frequency modulating the intercepted signal of the 1-bit quantizer, a separate decoy can be created.
(3) To split the spoofing disturbance a 1-bit quantization model based on SFT was constructed. SFT has the ability to split the spectrum into separate components using time dependent frequency and phase. In this way, part of the fraudulent modulation is forwarded to the interception module, consuming very little computing resources.
Exemplary apparatus
As shown in fig. 6, an embodiment of the present invention provides a generating device for 1-bit multi-decoy spoofing interference with respect to a synthetic aperture radar, the device including a decoy signal constructing module 401, a single frequency threshold signal acquiring module 402,1-bit multi-decoy spoofing interference signal acquiring module 403, wherein:
the false target signal construction module 401 is configured to acquire a target synthetic aperture radar signal, and construct a false target signal according to the target synthetic aperture radar signal;
a single-frequency threshold signal acquisition module 402, configured to obtain a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtain a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase;
and the 1-bit multi-decoy spoofing jamming signal acquisition module 403 is configured to obtain a 1-bit quantized signal according to the single-frequency threshold signal and the decoy target signal, and perform interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-decoy spoofing jamming signal.
Based on the above embodiment, the present invention further provides an intelligent terminal, and a functional block diagram thereof may be shown in fig. 7. The intelligent terminal comprises a processor, a memory, a network interface, a display screen and a temperature sensor which are connected through a system bus. The processor of the intelligent terminal is used for providing computing and control capabilities. The memory of the intelligent terminal comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the intelligent terminal is used for communicating with an external terminal through network connection. The computer program is executed by a processor to implement a method of generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar. The display screen of the intelligent terminal can be a liquid crystal display screen or an electronic ink display screen, and a temperature sensor of the intelligent terminal is arranged in the intelligent terminal in advance and used for detecting the running temperature of internal equipment.
It will be appreciated by those skilled in the art that the schematic diagram of fig. 7 is merely a block diagram of a portion of the structure related to the present invention, and does not constitute a limitation of the smart terminal to which the present invention is applied, and a specific smart terminal may include more or less components than those shown in the drawings, or may combine some components, or have different arrangements of components.
In one embodiment, a smart terminal is provided that includes a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors, the one or more programs comprising instructions for:
acquiring a target synthetic aperture radar signal, and constructing a false target signal according to the target synthetic aperture radar signal;
obtaining a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase;
and obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, and performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception interference signal.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
In summary, the invention discloses a method for generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar, an intelligent terminal and a storage medium, wherein the method comprises the following steps:
acquiring a target synthetic aperture radar signal, and constructing a false target signal according to the target synthetic aperture radar signal; preparing for subsequent generation of a single-frequency threshold signal, obtaining a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase; the single-frequency threshold signal is used for decomposing harmonic waves caused by 1-bit quantization, a 1-bit quantized signal is obtained according to the single-frequency threshold signal and the false target signal, the complexity of an interference machine is reduced, and the 1-bit quantized signal is subjected to interference modulation to obtain a 1-bit multi-false target deception interference signal.
Based on the above embodiments, the present invention discloses a method for generating 1-bit multi-decoy spoofing for a synthetic aperture radar, it should be understood that the application of the present invention is not limited to the above examples, and those skilled in the art can make modifications or changes according to the above description, and all such modifications and changes should fall within the scope of the appended claims.

Claims (7)

1. A method of generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar, the method comprising:
acquiring a target synthetic aperture radar signal, and constructing a false target signal according to the target synthetic aperture radar signal;
obtaining a single-frequency threshold frequency and a single-frequency threshold phase according to the false target signal, and obtaining a single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase;
obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, and performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception interference signal;
the obtaining the single-frequency threshold signal according to the single-frequency threshold frequency and the single-frequency threshold phase comprises:
acquiring single-frequency threshold amplitude;
determining a single-frequency threshold signal according to the single-frequency threshold amplitude, the single-frequency threshold frequency and the single-frequency threshold phase;
obtaining a 1-bit quantized signal according to the single-frequency threshold signal and the false target signal, and performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target spoofing interference signal, wherein the obtaining comprises the following steps:
acquiring the instantaneous amplitude of the false target signal;
acquiring the instantaneous amplitude of the single-frequency threshold signal;
obtaining a 1-bit quantized signal according to the instantaneous amplitude of the false target signal and the instantaneous amplitude of the single-frequency threshold signal;
performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception interference signal;
the obtaining a 1-bit quantized signal according to the instantaneous amplitude of the false target signal and the instantaneous amplitude of the single-frequency threshold signal includes:
when the instantaneous amplitude of the false target signal is larger than that of the single-frequency threshold signal, a 1-bit quantized signal value corresponding to the instantaneous moment of the false target signal is 1;
when the instantaneous amplitude of the false target signal is smaller than or equal to the instantaneous amplitude of the single-frequency threshold signal, a 1-bit quantized signal value corresponding to the instantaneous moment of the false target signal is 0;
and combining a plurality of 1-bit quantized signal values into a 1-bit quantized signal.
2. The method of generating 1-bit multi-decoy spoofing for a synthetic aperture radar of claim 1 wherein constructing a false target signal from the target synthetic aperture radar signal comprises:
acquiring an oblique distance course; wherein the slant range history is the distance from the cheating jammer to the SAR system;
and carrying out fusion calculation on the slant range process and the target synthetic aperture radar signal to obtain a false target signal.
3. The method of generating 1-bit multi-decoy spoofing for a synthetic aperture radar of claim 2 wherein said deriving a single frequency threshold frequency and a single frequency threshold phase from said decoy signal comprises:
calculating scattering distances of two false scattering bodies of the false target signals;
performing distance translation on the scattering distance and the oblique distance course to obtain a single-frequency threshold frequency;
and carrying out azimuth translation on the scattering distance and the slant distance process to obtain a single-frequency threshold phase.
4. The method for generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar of claim 1, wherein said performing interference modulation on the 1-bit quantized signal to obtain a 1-bit multi-decoy spoofing interference signal comprises: and carrying out distance modulation and azimuth modulation on the 1-bit quantized signal to obtain a 1-bit multi-false target deception jamming signal.
5. The method for generating 1-bit multi-decoy spoofing interference for a synthetic aperture radar of claim 4 wherein said performing distance modulation and azimuth modulation on said 1-bit quantized signal to obtain a 1-bit multi-decoy spoofing interference signal comprises:
adjusting the time delay of the 1-bit quantized signal to obtain a distance-modulated 1-bit quantized signal;
and modulating the Doppler frequency of the 1-bit quantized signal after the distance modulation to obtain a 1-bit multi-false target deception jamming signal.
6. An intelligent terminal comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors, the one or more programs comprising instructions for performing the method of any of claims 1-5.
7. A non-transitory computer readable storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the method of any one of claims 1-5.
CN202110744105.8A 2021-06-30 2021-06-30 Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar Active CN113484829B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110744105.8A CN113484829B (en) 2021-06-30 2021-06-30 Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110744105.8A CN113484829B (en) 2021-06-30 2021-06-30 Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar

Publications (2)

Publication Number Publication Date
CN113484829A CN113484829A (en) 2021-10-08
CN113484829B true CN113484829B (en) 2023-09-05

Family

ID=77937472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110744105.8A Active CN113484829B (en) 2021-06-30 2021-06-30 Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar

Country Status (1)

Country Link
CN (1) CN113484829B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116068501B (en) * 2023-04-04 2023-06-23 烟台初心航空科技有限公司 Method for generating anti-interference radio altimeter modulation signal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4045795A (en) * 1975-06-23 1977-08-30 Nasa Charge-coupled device data processor for an airborne imaging radar system
CN106772280A (en) * 2017-01-23 2017-05-31 深圳大学 A kind of SAR cheating interferences production method and system for being based on a bit sample
CN108508438A (en) * 2018-04-09 2018-09-07 深圳大学 A kind of a bit echo data acquisition method and system based on single-frequency time-varying threshold value
CN111077503A (en) * 2020-01-16 2020-04-28 深圳大学 Mixed interference signal generation method, device, equipment and medium
CN111077504A (en) * 2020-01-16 2020-04-28 深圳大学 Mixed interference signal generation method, device, equipment and medium
CN111077505A (en) * 2020-01-16 2020-04-28 深圳大学 Mixed interference signal generation method, device, equipment and medium
CN111896952A (en) * 2020-06-17 2020-11-06 深圳大学 Multi-target deception jamming method and device based on 1-bit quantization
CN112799023A (en) * 2020-12-25 2021-05-14 中国人民解放军63892部队 Multi-false-target interference method for fast forwarding

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4045795A (en) * 1975-06-23 1977-08-30 Nasa Charge-coupled device data processor for an airborne imaging radar system
CN106772280A (en) * 2017-01-23 2017-05-31 深圳大学 A kind of SAR cheating interferences production method and system for being based on a bit sample
CN108508438A (en) * 2018-04-09 2018-09-07 深圳大学 A kind of a bit echo data acquisition method and system based on single-frequency time-varying threshold value
CN111077503A (en) * 2020-01-16 2020-04-28 深圳大学 Mixed interference signal generation method, device, equipment and medium
CN111077504A (en) * 2020-01-16 2020-04-28 深圳大学 Mixed interference signal generation method, device, equipment and medium
CN111077505A (en) * 2020-01-16 2020-04-28 深圳大学 Mixed interference signal generation method, device, equipment and medium
CN111896952A (en) * 2020-06-17 2020-11-06 深圳大学 Multi-target deception jamming method and device based on 1-bit quantization
CN112799023A (en) * 2020-12-25 2021-05-14 中国人民解放军63892部队 Multi-false-target interference method for fast forwarding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Deceptive SAR Jamming Based on 1-bit Sampling and Time-Varying Thresholds;Bo Zhao等;《IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing》;第11卷(第3期);第939-950页 *

Also Published As

Publication number Publication date
CN113484829A (en) 2021-10-08

Similar Documents

Publication Publication Date Title
Le Chevalier Principles of radar and sonar signal processing
CN108051809B (en) Moving target imaging method and device based on Radon transformation and electronic equipment
CN110109117B (en) Satellite-borne synthetic aperture radar convolution modulation interference method based on frequency control array
Chang et al. A barrage noise jamming method based on double jammers against three channel SAR GMTI
CN111142105A (en) ISAR imaging method for complex moving target
CN102721948A (en) Large-scene SAR deception jamming implementation method
CN113093122B (en) Method for synthesizing fast scene deception jamming of aperture radar
Yang et al. Fast generation of deceptive jamming signal against spaceborne SAR based on spatial frequency domain interpolation
CN111896952B (en) Multi-target deception jamming method and device based on 1-bit quantization
Gromek et al. Passive SAR imaging using DVB‐T illumination for airborne applications
Dong et al. A novel scattered wave deception jamming against three channel SAR GMTI
Yang et al. Fast generation of deceptive jamming signal against space-borne SAR
CN116413662B (en) Synthetic aperture radar radio frequency interference suppression method based on deep expansion network
CN113484829B (en) Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar
Zhao et al. One-bit splitting deceptive jamming against SAR
CN112285658A (en) Recursive computation based method for rapidly generating satellite-borne SAR deception jamming signal
CN114047483A (en) Radar waveform design method based on initial phase-PRI joint modulation
CN112255596A (en) Space-borne SAR deception jamming signal generation method based on spatial frequency interpolation
CN118566854A (en) Space-time adaptive clutter free degree smart disturbing method and device for airborne radar
CN110471040B (en) Inverse synthetic aperture radar interference method based on FDA antenna
Cheng et al. Multiple-phases-sectionalized-modulation SAR barrage jamming method based on NLFM signal
CN106980110A (en) A kind of sidelobe cancellation method of adaptive confrontation active pressing jamming containing multipath
Saeedi A new hybrid method for synthetic aperture radar deceptive jamming
CN113311431B (en) Deception jamming inhibition method and system based on single-channel SAR single imaging
CN116047428A (en) SAR deception jamming method based on hybrid domain efficient track offset compensation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant