Next Article in Journal
Exceptional Drought across Southeastern Australia Caused by Extreme Lack of Precipitation and Its Impacts on NDVI and SIF in 2018
Next Article in Special Issue
Estimating Traffic Intensity Employing Passive Acoustic Radar and Enhanced Microwave Doppler Radar Sensor
Previous Article in Journal
Mapping the Seabed and Shallow Subsurface with Multi-Frequency Multibeam Echosounders
Previous Article in Special Issue
Real-Time Bottom Tracking Using Side Scan Sonar Data Through One-Dimensional Convolutional Neural Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Large-Scene Deceptive Jamming Method for Space-Borne SAR Based on Time-Delay and Frequency-Shift with Template Segmentation

1
Space Engineering University, Beijing 101416, China
2
The Unit 94657 of PLA, Jiujiang 332104, China
3
Logistics Science and Technology Institute, Institute of Systems Engineering, Academy of Military Science, Beijing 100071, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2020, 12(1), 53; https://doi.org/10.3390/rs12010053
Submission received: 2 December 2019 / Revised: 19 December 2019 / Accepted: 20 December 2019 / Published: 21 December 2019
(This article belongs to the Special Issue Radar and Sonar Imaging and Processing)

Abstract

:
Due to advantages such as its low power consumption and higher concealment, deceptive jamming against synthetic aperture radar (SAR) has received extensive attention during the past decades. However, large-scene deception jamming is still a challenge because of the huge computing burden. In this paper, we propose a new large-scene deceptive jamming algorithm. First, the time-delay and frequency-shift (TDFS) algorithm is introduced to improve the jamming processing speed. The system function of jammer (JSF) for a fake scatter is simplified to the multiplication of the scattering coefficient, a time-delay term in the range dimension and a frequency-shift term in the azimuth dimension. Then, in order to solve the problem that the effective region of the TDFS algorithm is limited, the scene deceptive jamming template is divided into several blocks according to the SAR parameters and imaging quality control factor. The JSF of each block is calculated by the TDFS algorithm and added together to achieve the large-scene jamming. Finally, the correction algorithm in squint mode is derived. The simplification and parallel-block processing could improve the calculation efficiency significantly. The simulation results verified the validity of the algorithm.

Graphical Abstract

1. Introduction

Synthetic aperture radar (SAR) is an effective system that uses electromagnetic waves for high-resolution imaging. Due to the unique advantages of its all-day, all-weather operation, and ability to penetrate camouflage compared with traditional optical remote sensing methods, SAR has become a major means of remote sensing and has been widely used, especially in the military field. At the same time, for the purpose of protecting sensitive targets and regions, electronic countermeasures against SAR have received intensive attention [1,2,3,4,5].
In general, active electronic interference against SAR is divided into two types: barrage jamming and deception jamming. The former uses high-power noise to cover the echo signal from the region of interest (ROI) and makes it impossible to form a clear and distinguishable image [6,7]. The latter emits an echo signal of a false target by the direct generation or modulation–retransmission method, which is mixed with the echo of the real target, affecting the image interpretation process and achieving the purpose of “hidden truth in falsehood” [8,9,10,11,12,13,14,15,16,17,18,19]. Compared with barrage jamming, deception jamming belongs to a type of smart jamming method which has lower power consumption, higher concealment, and more flexible application scenarios; thus, it is more attractive and does not arouse the awareness of the enemy.
At present, almost all SAR deceptive jamming methods are based on the modulation and retransmission mechanism. In each pulse repetition interval (PRI), according to a series of parameters of the SAR which should be jammed, including kinematic parameters, antenna parameters, and signal parameters, and combining the jamming scene template, the jammer modulates and retransmits the intercepted radar pulse to generate a jamming signal, which will form a false image after range and azimuth compression by the receiver. The deceptive jammer can be regarded as a linear time-invariant (LTI) system in a single PRI. The problem of obtaining the system function of jammer (JSF) is a focus in the field of SAR deceptive jamming. A straightforward method is to calculate the signal propagation delay difference between each scatter in the jamming scene template and the jammer during each PRI [8]. However, this method is computationally intensive and can hardly guarantee real-time processing. Subsequent research has mainly focused on reducing the computational complexity and increasing the processing speed. Usually, parts of the processing are performed in advance to reduce the computational burden during the implementation of jamming. In the specific implementation, this is divided into two categories: azimuth time-domain processing and azimuth frequency-domain processing. The former reduces the computational complexity by approximating the distance equation and is suitable for the broadside or low squint angle mode, including the inverse range-Doppler algorithm [9], phase pre-modulation [10], segmented modulation [11,12], and approach of multiple receivers [13,14]. The latter, including frequency-domain pre-modulation [15], the frequency-domain three-stage algorithm [16], the inverse Omega-K algorithm [17], etc., needs to perform 2-D Fourier transform and Stolt interpolation on the jamming scene template [20,21], which can work under a large squint angle but requires additional information such as the azimuth bandwidth.
Although the methods above improve the computational efficiency of the jamming process to varying degrees, the large computational burden is still the bottleneck of large-scene deceptive jamming for SAR. Zhou etc. proposed a large-scene deceptive jamming method by dividing the jamming scene template into sub-templates according to the depth of focus in the range dimension to simplify the JSF and decomposing the JSF into the slow-time independent terms generated off-line and slow-time dependent terms calculated in real-time [11]. However, this algorithm only works for space-borne SAR operating at the broadside mode, and the computational efficiency is still insufficient. Inspired by this, we propose a new large-scene deceptive jamming algorithm called time-delay and frequency-shift with template segmentation (TDFS-TS). First, the complex modulation process is simplified into the time-delay and frequency-shift operation to increase the computational efficiency. Second, the jamming scene template is divided both in the range dimension and azimuth dimension according to the imaging quality control factor. The correction algorithm in the squint situation is derived as well. Compared with other available deceptive jamming techniques, the proposed method can produce well-focused large deceptive scenes more efficiently.
This paper is organized as follows. Section 2 provides a detailed description of the TDFS-TS algorithm. We begin with the analysis of the basic principles of deceptive jamming against SAR; based on these, we propose the time-delay and frequency-shift (TDFS) jamming algorithm to simplify the process. Then the template segmentation (TS) method is used to achieve large-scene jamming, and the correction algorithm in squint mode is described. In Section 3, the TDFS-TS algorithm is verified by simulation and the computation complexity is analyzed. Section 4 discusses the results and Section 5 concludes this paper.

2. Large-Scene Deceptive Jamming Method Based on TDFS-TS

This section will derive the TDFS-TS deceptive jamming algorithm step by step. First, the principles of deceptive jamming against SAR are introduced. Then the TDFS algorithm is proposed which can significantly improve computational efficiency. The analysis of the jamming signal generated by TDFS shows that the effective region is limited. To solve this problem, the TS method is introduced, and the squint correction algorithm is derived to extend the application scope of the jamming algorithm. Finally, the TDFS-TS algorithm procedure is clarified.

2.1. Principles of Deceptive Jamming against SAR

The principle of SAR deceptive jamming based on modulation–retransmission is presented in Figure 1 [17]. The jammer performs a serious of operations including the amplification, down-conversion, analog-to-digital conversion (A/D), and fast Fourier transform (FFT) on the intercepted radar radio frequency (RF) signal to obtain the frequency domain representation of the baseband, while the JSF is calculated based on the template and the SAR parameters including kinematic parameters (platform position, velocity, etc.), antenna parameters (antenna direction, beam pattern, etc.), and signal parameters (carrier frequency, PRI, etc.). Then, we multiply the two and perform an inverse fast Fourier transform (IFFT) to obtain the baseband of the jamming signal and finally perform the digital-to-analog conversion (D/A), up-conversion, gain control, and retransmission. By repeating the above steps for each pulse, a false image can be generated by the receiver. The template is an array of false scatters that depicts the electromagnetic characteristic of the fake scene artificially fabricated by the jammer.
The JSF is the key to the generation of jamming signals. The following illustrates the basic idea for JSF in combination with the geometric model of SAR jamming. As shown in Figure 2, we assume that the SAR platform moves at a constant velocity v and the azimuth time t a = 0 when the plane of zero Doppler passes through the jammer. A Cartesian coordinate system with the location of the jammer as the origin is established in a two-dimensional slant range plane. The x-axis points to the range direction and the y-axis points to the azimuth direction. The shortest slant distance between the jammer and the SAR is R J 0 , and the instantaneous slant distance is R J ( t a ) at azimuth time t a . An arbitrary false point scatter P is generated by the jammer, the scattering coefficient of P is σ P and the location is ( x ,   y ) in the coordinate above. R P ( t a ) denotes the instantaneous slant distance between P and the jammer.
In order to generate the fake point target P in the SAR image, the JSF at azimuth time t a is [17]
H P ( f r ,   t a ) = σ P exp [ j 2 π ( f r + f 0 ) 2 Δ R P ( t a ) c ] ,
where f r is the range frequency, c is the velocity of light, Δ R P ( t a ) is the difference between R P ( t a ) and R J ( t a ) :
Δ R P ( t a ) = R P ( t a ) R J ( t a ) = ( x + R J 0 ) 2 + ( y v t a ) 2 R J 0 2 + ( v t a ) 2 .
By calculating the JSF for each scatter in the template T , the JSF for the deception scene can be derived as follows:
H ( f r ,   t a ) = P T H P ( f r , t a ) = P T σ P exp [ j 2 π ( f r + f 0 ) 2 Δ R P ( t a ) c ] .
In the implementation of jamming, the jammer must calculate JSF H ( f r ,   t a ) and modulate the intercepted signal real-time in each PRI. The calculation of Equation (2) is time-consuming, therefore the method represented by Equation (3) cannot be used directly for large-scene deceptive jamming unless some improvements are made.

2.2. TDFS-TS Algorithm

2.2.1. Deceptive Jamming Based on TDFS

For space-borne SAR, we can assert that R J 0 x , R J 0 y , and R J 0 v t a throughout the synthetic aperture time. After the Taylor series expansion, Equation (2) can be approximated as follows [11]:
Δ R P ( t a ) [ x + R J 0 + y 2 2 ( x + R J 0 ) y v t a x + R J 0 + ( v t a ) 2 2 ( x + R J 0 ) ] [ R J 0 + ( v t a ) 2 2 R J 0 ] x + y 2 2 R J 0 y v t a R J 0 .
With the approximation above, the JSF—i.e., Equation (1)—can be rewritten as follows:
H P ( f r ,   t a ) = σ P exp [ j 2 π ( f r + f 0 ) ( 2 x c + y 2 c R J 0 2 y v t a c R J 0 ) ] = σ P exp [ j 2 π ( f r + f 0 ) 2 x c ] exp ( j 2 π f 0 2 y v t a c R J 0 ) exp ( j 2 π f 0 y 2 c R J 0 ) exp ( j 2 π f r 2 y v t a y 2 c R J 0 ) .
where the third exponential term is independent of f r and t a and is equivalent to introducing a fixed phase that has no effect on the imaging; thus, it can be ignored. The fourth exponential term can also be omitted when y is small enough (details will be analyzed in the next subsection). Thus, Equation (5) can be simplified as follows:
H P ( f r ,   t a ) = σ P exp [ j 2 π ( f r + f 0 ) 2 x c ] exp ( j 2 π f 0 2 y v t a c R J 0 ) .
Actually, at the broadside mode, the azimuth frequency modulation rate of the SAR echo signal from the location of the jammer is [22]
K a = 2 f 0 v 2 c R J 0 .
Combined with Equations (6) and (7), we can derive
H P ( f r , t a ) = σ P exp [ j 2 π ( f r + f 0 ) 2 x c ] exp ( j 2 π K a y v t a ) .
This is equivalent to delaying the original echo signal 2 x / c in fast-time to achieve position deception in the range dimension and a shifting frequency K a y / v in slow-time. According to the frequency shifting property of the linear frequency modulation (LFM) signal, the frequency shifting is equivalent to time-delaying y / v in slow-time, which can implement position deception in the azimuth dimension as well.
If the scattering coefficient of the false point target which locates ( x , y ) in the template is σ ( x , y ) , the JSF for the deception scene can be derived as follows:
H ( f r , t a ) = x y σ ( x , y ) exp [ j 2 π ( f r + f 0 ) 2 x c ] exp ( j 2 π f 0 2 y v t a c R J 0 ) = y exp ( j 4 π f 0 y v t a c R J 0 ) x σ ( x , y ) exp [ j 4 π ( f r + f 0 ) x c ] .
The second summation term in Equation (9) is independent of azimuth time t a and only related to the relative position of each point in the false scene, which can be calculated off-line to reduce the real-time computational burden. This is the TDFS jamming algorithm, which has the advantages of simplicity and high computational efficiency.

2.2.2. Jamming Signal Analysis

Due to the approximation and simplification, the TDFS algorithm has high computational efficiency. However, the approximation and simplification will cause a decline in the image quality of the deceptive target at the same time. In this subsection, we will analyze the impact of the simplified operations above on the imaging results by comparing the difference between the jamming signal and real point target echo in the range-Doppler domain [23].
The echo signal of a real scatter point P ( x , y ) is represented as follows [22]:
s P ( t r , t a ) = σ P w a ( t a ) w r [ t r 2 R P ( t a ) c ] exp [ j 4 π f 0 R P ( t a ) c ] exp { j π K r [ t r 2 R P ( t a ) c ] 2 } ,
where w a ( t a ) represents the azimuth amplitude, w r ( t r ) is the SAR pulse complex envelope, and K r is the frequency modulation rate of the SAR pulse.
The parabolic approximation of the instantaneous slant range R P ( t a ) by Taylor series is [22]
R P ( t a ) = ( x + R J 0 ) 2 + ( y v t a ) 2 = x + R J 0 + ( y v t a ) 2 2 ( x + R J 0 ) .
We can derive the echo signal expression (12) of the real target point P ( x , y ) in the range-Doppler domain by bringing Equation (11) into Equation (10) and using the principle of stationary phase (POSP) [22]:
S P ( t r , f a ) = σ P W a ( f a ) w r [ t r 2 R P ( f a ) c ] exp { j π K r [ t r 2 R P ( f a ) c ] 2 j π f a 2 K a j 2 π f a y v j 4 π f 0 x + R J 0 c } ,
where R P ( f a ) is the range cell migration (RCM) curve of the target in the range-Doppler domain:
R P ( f a ) = x + R J 0 + ( x + R J 0 ) c 2 8 v 2 f 0 2 f a 2 ,
and the azimuth frequency modulation rate is
K a = 2 v 2 f 0 c ( x + R J 0 ) .
The echo signal will focus on the coordinate ( x , y ) after range compression, RCM correction (RCMC), and azimuth compression.
For comparison, when the JSF is Equation (8), the jamming signal is expressed as follows:
s J ( t r , t a ) = σ P w a ( t a ) w r [ t r 2 R J ( t a ) c 2 x c ]                                               exp { j 4 π f 0 [ R J ( t a ) c + x c y v t a c R J 0 ] } exp { j π K r [ t r 2 R J ( t a ) c 2 x c ] 2 } .
Similarly, the parabolic approximation and POSP is used to obtain the expression of the jamming signal in the range-Doppler domain:
S J ( t r , f a ) = σ P W a ( f a ) w r [ t r 2 R J P ( f a ) c ]                                               exp { j π K r [ t r 2 R J P ( f a ) c ] 2 j π f a 2 K J a j 2 π f a y v j 4 π f 0 x + R J 0 c + j 2 π f 0 y 2 c R J 0 } ,
where the RCM of fake target is
R J P ( f a ) = x + R J 0 + R J 0 c 2 8 v 2 f 0 2 f a 2 y c 2 v f 0 f a + y 2 2 R J 0 ,
and the azimuth frequency modulate rate of jamming signal is
K J a = 2 v 2 f 0 c R J 0 .
It can be found that there are differences between the real target echo signal and the jamming signal in the RCM curve and azimuth frequency modulation rate, ignoring the phase terms unrelated to pulse compression. The effects of these differences on the imaging results and the corresponding effective region of deceptive jamming are analyzed in detail below.
First, it is obvious that the jamming signal introduces the azimuth frequency modulation rate error, which will cause a mismatch of the azimuth matched filter and finally lead to the main lobe broadening of the azimuth pulse compression result. The azimuth frequency modulation rate error is
Δ K a = K J a K a = 2 v 2 f 0 x c R J 0 ( x + R J 0 ) .
The effect of Δ K a on the main lobe broadening can be measured by the quadratic phase error (QPE); the expression of QPE is as follows [22]:
QPE = π Δ K a ( T 2 ) 2 = 2 π v 2 f 0 x c R J 0 ( x + R J 0 ) ( L 2 v ) 2 ,
where T = L / v is the synthetic aperture time and L represents the synthetic aperture length.
For a typical Kaiser window with β = 2.5 , if the broadening is required to be less than 2%, 5%, and 10%, the corresponding QPE absolute value should be less than 0.27 π , 0.41 π , and 0.55 π [22]. Here, we define the azimuth QPE factor ε ; when the condition | QPE | ε π is required, the range coordinate x should satisfy
| x | 2 ε c R J 0 ( x + R J 0 ) f 0 L 2 2 ε c f 0 ( R J 0 L ) 2 .
Second, in the range-Doppler domain, the RCM error of the jamming signal is
Δ R P ( f a ) = R J P ( f a ) R P ( f a ) = x c 2 8 v 2 f 0 2 f a 2 y c 2 v f 0 f a + y 2 2 R J 0 .
The last term in Equation (22) can be omitted because R J 0 y . The residual RCM introduced by Δ R P ( f a ) in broadside mode is represented as follows:
RCM res = | Δ R P ( B a 2 ) Δ R P ( B a 2 ) | = B a c 2 v f 0 | y | ,
where B a is the azimuth Doppler bandwidth and can be expressed as [22]
B a = L v | K J a | = 2 v f 0 L c R J 0 .
Combined with Equations (23) and (24), we can simplify the expression of residual RCM:
RCM res = L R J 0 | y | .
The residual RCM will result in the main lobe broadening in both range and azimuth dimensions and the extent of broadening can be measured by the ratio of the residual RCM to the range resolution. The range resolution ρ r c / 2 B , where B is the signal bandwidth. Then, we define the residual RCM factor η ; if we require RCM res η ρ r , the azimuth coordinate y should satisfy
| y | η ρ r R J 0 L = η c R J 0 2 B L .
According to [22], the residual RCM should be no more than 0.5 of the range cell; therefore, η should be no more than 0.5.
In addition, due to the difference between the false and real point targets in the instantaneous slant range history, the Doppler center frequency of the jamming signal shifts, and the azimuth main lobe broadening and ghost targets are introduced. This phenomenon limits the effective azimuth scale as well; according to [11], the azimuth coordinate y should satisfy
| y | c R J 0 2 v f 0 ( PRF v D ) L 2 ,
where PRF is the pulse repetition frequency and D is the antenna aperture in the azimuth direction.
Equations (21) and (26) describe the effective region of the range and azimuth directions of the TDFS algorithm with the specified azimuth QPE factor ε and residual RCM factor η . The jamming signals representing the false target located beyond the region will not achieve the desired deception. Equation (27) described the inherent limitations of SAR deceptive jamming in the azimuth direction, which is beyond the scope of this article. In the following discussion, we suppose that the size of the template in the azimuth dimension meets the requirement of Equation (27). When the typical C-band space-borne SAR parameters (see Table 1 in Section 3) are set as an example, we can calculate the effective region: | x | 1.25   km and | y | 0.75   km with ε = 0.25 and η = 0.5 ; i.e., a rectangular area of 2.5   km   ×   1.5   km .

2.2.3. Template Segmentation

The analysis in the previous subsection shows that the effective region of the TDFS algorithm is limited. In order to achieve deceptive jamming in a larger scene, we divide the jamming scene template into several blocks and apply a time-delay and frequency-shift in each block to calculate the partial JSF, which will be summed to get the JSF on the whole template. As shown in Figure 3, the template consisting of m   ×   n point scatters is divided into M   ×   N blocks; each block contains U   ×   V point scatters, namely U = m / M and V = n / N . If the range interval between each point is Δ x and the azimuth interval is Δ y , U and V should satisfy the following conditions according to the limitation of the effective region Equations (21) and (26) with the required ε and η :
U η c R m i n B L Δ y ,       V 4 ε c f 0 Δ x ( R m i n L ) 2 ,
where R m i n is the minimum value of the shortest slant range of all point scatters, which can be approximated by R J 0 .
The scattering coefficients of point scatters in block pq can be expressed as a matrix T p q :
T p q = [ σ 11 σ 12 σ 1 V σ 21 σ 22 σ 2 V σ U 1 σ U 2 σ U V ] .
Suppose the coordinate of the block pq geometric center is ( x q ,   y p ) , where p = 1 ,   2 ,   ,   M and q = 1 ,   2 ,   ,   N . According to Equations (1) and (2), the JSF on the block pq geometry center H c p q ( f r , t a ) is represented as follows:
H c p q ( f r , t a ) = exp { j 4 π ( f r + f 0 ) c [ ( x q + R J 0 ) 2 + ( y p v t a ) 2 R J 0 2 + ( v t a ) 2 ] } .
The jamming signal generated by H c p q ( f r , t a ) can generate a well-focused point target in the center of block pq after imaging, which is equivalent to moving the jammer to the geometric center of block pq .
Then, we use the TDFS algorithm to generate the JSF on block pq :
H p q ( f r , t a ) = H c p q ( f r , t a ) k = 1 U exp [ j 4 π f 0 v t a Δ y c ( R J 0 + x q ) ( k U + 1 2 ) ] l = 1 V σ k l exp [ j 4 π ( f 0 + f r ) Δ x c ( l V + 1 2 ) ] ,
where σ k l is the element of row k and column l in the matrix T p q . Finally, the JSF on the whole template can be derived by summing JSF on all blocks:
H ( f r , t a ) = p = 1 M q = 1 N H p q ( f r , t a ) .
Since the number of blocks is very small compared to the total number of scatters in the template, Equation (30) has a limited effect on the computing load. In addition, the second summation term of Equation (31) is independent of slow time t a and can be calculated offline. The template segmentation method can solve the problem that the effective region of the TDFS algorithm is limited and achieve the purpose of the rapid generation of large scene deceptive jamming signals.

2.2.4. Correction Algorithm in Squint Mode

The analyses above are based on the broadside mode with the squint angle θ = 0 . In order to extend the broadside jamming algorithm to squint mode, this subsection will discuss the effect of the squint angle on the jamming result and the corresponding correction method. It should be pointed out that the parabolic approximation of the instantaneous slant range in Equation (4) will no longer be applicable under the condition of a large squint angle, so the jamming method of this article is limited to the small squint angle and the medium aperture length SAR.
First, the Doppler center frequency of the echo signal f a c = 2 v f 0 sin θ / c , the presence of the squint angle will result in the non-zero Doppler center frequency. At this time, the azimuth signal can be regarded as the non-baseband signal, and the frequency modulation rate error will cause the position offset besides main lobe broadening in pulse compression [22]. According to the pulse compression principle [22], the azimuth main lobe position offset of scatter with coordinate ( x , y ) is
y o f s ( x , y ) = Δ K a K a t a c v = x tan θ ,
where t a c = R J 0 tan θ / v is the pulse center time of the jamming signal in the azimuth dimension.
On the other hand, when f a c 0 , the RCM error will cause the RCM curve to shift along the range dimension in addition to introducing the residual RCM, causing main lobe broadening. According to Equation (22), the offset in the range dimension of fake point P ( x , y ) is
x o f s ( x , y ) = Δ R P ( f a c ) x 2 sin 2 θ y sin θ .
The residual RCM will increase at the same time:
RCM res = | Δ R P ( f a c + B a 2 ) Δ R P ( f a c B a 2 ) | = | B a c 2 v f 0 y + B a c sin θ 4 v f 0 x | .
In order to ensure the image quality of the fake scene, the size of the blocks should be reduced. However, the RCM res increment is not obvious when the squint angle is small. Thus, it can be ignored in this paper.
According to the analysis above, the main effect of the squint angle is the location offset of fake targets in the deceptive image, and the offset depends on the coordinates in the template. This effect will cause the distortion of the jamming image. Therefore, the coordinates of each scatter in the template should be corrected. For the false scatter with coordinate ( x , y ) , the corrected coordinate ( x c , y c ) can be represented as follows:
{ x c = x x o f s ( x , y ) = x + x 2 sin 2 θ + y sin θ , y c = y y o f s ( x , y ) = y x tan θ .
Correspondingly, Equation (31) will be modified as follows:
H p q ( f r , t a ) = H c p q ( f r , t a ) k = 1 U l = 1 V σ k l exp { j 4 π ( f r + f 0 ) Δ x c [ ( 1 + sin 2 θ 2 ) ( l V + 1 2 ) + Δ y sin θ ( k U + 1 2 ) ] } exp { j 4 π f 0 v t a c ( R J 0 + x q ) [ Δ x   tan θ ( l V + 1 2 ) + Δ y ( k U + 1 2 ) ] } .
The range and azimuth-related terms in Equation (37) are separable, so Equation (37) can be rewritten as matrix operations to increase the calculation speed. Here, we define the time-delay matrixes H r 1 , H r 2 and frequency-shift matrixes H a q 1 , H a q 2 :
H r 1 = [ exp [ j 4 π ( f r + f 0 ) Δ x c ( 1 + sin 2 θ 2 ) ( 1 V + 1 2 ) ] exp [ j 4 π ( f r + f 0 ) Δ x c ( 1 + sin 2 θ 2 ) ( 2 V + 1 2 ) ] exp [ j 4 π ( f r + f 0 ) Δ x c ( 1 + sin 2 θ 2 ) ( V V + 1 2 ) ] ] ,
H r 2 = [ exp [ j 4 π ( f r + f 0 ) Δ y sin θ c ( 1 U + 1 2 ) ] exp [ j 4 π ( f r + f 0 ) Δ y sin θ c ( 2 U + 1 2 ) ] exp [ j 4 π ( f r + f 0 ) Δ y sin θ c ( U U + 1 2 ) ] ] ,
H a q 1 = [ exp [ j 4 π f 0 v t a Δ x tan θ c ( R J 0 + x q ) ( 1 V + 1 2 ) ] exp [ j 4 π f 0 v t a Δ x tan θ c ( R J 0 + x q ) ( 2 V + 1 2 ) ] exp [ j 4 π f 0 v t a Δ x tan θ c ( R J 0 + x q ) ( V V + 1 2 ) ] ] ,
H a q 2 = [ exp [ j 4 π f 0 v t a Δ y c ( R J 0 + x q ) ( 1 U + 1 2 ) ] exp [ j 4 π f 0 v t a Δ y c ( R J 0 + x q ) ( 2 U + 1 2 ) ] exp [ j 4 π f 0 v t a Δ y c ( R J 0 + x q ) ( U U + 1 2 ) ] ] .
Equation (37) is rewritten as follows:
H p q ( f r , t a ) = H c p q ( f r , t a ) [ ( H r 2 H a q 2 ) T T p q ( H r 1 H a q 1 ) ] ,
where ( · ) T represents the matrix transposition and the operator represents the Hadamard product of the matrix.
We can get the JSF on the entire scene by superimposing the JSF on all blocks, which is the same as Equation (32). The time-delay matrixes H r 1 and H r 2 are independent of the azimuth time t a , which can be calculated offline in advance to improve the real-time processing speed.

2.3. TDFS-TS Algorithm Procedure

The prerequisite for the successful implementation of SAR deceptive jamming is to obtain relevant intelligence on the jamming object, which mainly includes the follows aspects.
  • Kinematic parameters of the SAR platform, including motion trajectory, motion velocity v , etc. The motion trajectory information is used to establish the jamming coordinate system and determine R J 0 , the shortest distance between the jammer and SAR;
  • Antenna parameters, including the squint angle θ , synthetic aperture length L , etc.;
  • Signal parameters, including the carrier frequency f 0 , bandwidth B , PRI, etc.
The specific detection methods of the parameters above will not be discussed in this paper; we simply suppose that the parameters have been obtained in advance.
As shown in Figure 4, the entire procedure includes two parts: preprocessing and real-time calculation. The first step in the preprocessing stage is template segmentation: according to the parameters including synthetic aperture length L , signal bandwidth B , shortest slant range of the jammer R J 0 and the given factors ε and η , we divide the template into several blocks based on the limitation of Equation (28); then, we perform offline calculation and calculate the time-delay matrixes H r 1 and H r 2 according to Equations (38) and (39). In the real-time calculation stage, we calculate frequency-shift matrixes H a q 1 , H a q 2 according to Equations (40) and (41); then, we calculate the JSF on each block based on Equations (30) and (42); finally, we add the JSF on all blocks to obtain the JSF on the entire scene.

3. Simulation Results

In this section, the effectiveness of the TDFS-TS algorithm is verified by simulating the imaging results of false point targets and fake scenes, and the computational complexity is analyzed. The simulation results of the range dimension segmentation (RDS) algorithm proposed by Zhou et al. [11] are used as a comparison. The main parameters of the radar, which reference the satellite RADARSAT-1, are listed in Table 1.

3.1. Fake Point Scatters Case

In order to analyze the imaging result of fake point scatter at different positions after imaging, a deceptive scene template containing only four-point scatters is set as shown in Figure 5. The four points P 0 ~ P 3 are arranged in a rectangular shape with a distance of 6 km in the range dimension and 2 km in the azimuth dimension. According to the calculation results in Section 2.2.2, we set the length of blocks to 2.5 km in the range dimension and 1.5 km in the azimuth dimension. Since the imaging quality of fake scatters is only related to the position in the block, for the purpose of analyzing the jamming effect of the algorithm comprehensively, the template segmentation scheme is shown by the dashed line in Figure 5, meaning that P 0 is located at the center of block 1, P 1 is at the edge of block 3 in the range dimension, P 2 is at the azimuth edge of block 4, and P 3 is at the edge of block 6 in both range and azimuth dimensions. In addition, the position of the jammer (i.e., the origin position) is set at the point P 0 ; actually, the position of the jammer has little effect on the imaging result. In the simulation of the RDS algorithm, the template is divided into three segments with the same segmentation length (2.5 km) in the range dimension and is no longer segmented in the azimuth dimension.
Figure 6, Figure 7, Figure 8 and Figure 9 show the imaging results of the four scatters by the RDS and TDFS-TS algorithm in the broadside mode and squint mode with the squint angle θ = 5 ° , including the close-up image, range profile, and azimuth profile. Table 2 and Table 3 list the imaging quality parameters of range and azimuth dimensions in the two modes, including 3 dB impulse response width (IRW), main lobe position offset (MLPO), peak sidelobe ratio (PSLR), and integrated sidelobe ratio (ISLR). It can be seen that, compared with the RDS algorithm, the performance of the TDFS-TS algorithm is basically equivalent, the RDS algorithm is more advantageous on IRW, while TDFS-TS is dominant over MLPO. The IRW of TDFS-TS algorithm is increased especially for the azimuth dimension in squint mode; however, the maximum broadening does not exceed 3.6%. In the squint mode, the MLPO of the RDS algorithm can reach up to −80.32 m in the azimuth dimension, which can be eliminated basically by the TDFS-TS algorithm due to the corresponding correction. Because of the influence of the residual RCM, the MLPO in the range dimension cannot be completely corrected, but the overall image is affected very little. In short, the simulation of fake point scatters shows that the TDFS-TS algorithm is effective and has certain advantages in several areas.

3.2. General Deceptive Scene Case

In this subsection, the TDFS-TS algorithm is applied to yield a fake scene. The jamming object is RADARSAT-1, whose parameters are listed in Table 1, and the squint angle θ 1.58 ° . The raw data of the radar are obtained from the appendix in [22]. The fake scene template is another SAR image, as shown in Figure 10, whose length in the range dimension is 12.5 km and 4.5 km in the azimuth dimension. We divide the template according to the same block size calculated in Section 2.2.2, as shown by the yellow line in Figure 10.
First, the signals generated by the two algorithms are processed to get the images which are shown in Figure 11 after being amplitude-normalized, and partially enlarged images are shown in Figure 12. Due to the existence of the squint angle, each segment of the image generated by the RDS algorithm has geometric distortion, which is especially obvious at the splicing of each segment. Moreover, since the positions of adjacent scatters in the template are shifted after the imaging process, the image is blurred, and the ghost targets generated by the Doppler center frequency shifting in the azimuth dimension will be more obvious after the amplitude normalization. Actually, for the same reason, the brightness of the image is weakened as well, this phenomenon can be seen in Figure 13 and Figure 14. These problems are solved by the TDFS-TS algorithm which corrected the geometric distortion caused by the squint angle.
The imaging results of the superposition of the jamming signal and original signal are shown in Figure 13, and partially enlarged images are shown in Figure 14. It can be seen that the TDFS-TS algorithm achieves a good deception effect, generating clear false targets such as land and buildings and changing the topographic structure of the protected area. However, the fake scene generated by the RDS algorithm is not obvious, mainly because of the decrease in brightness caused by geometric distortion. The jamming power has to increase in order to achieve a satisfactory jamming purpose, but the ghost targets will be strengthened at the same time. In conclusion, the TDFS-TS algorithm has certain advantages compared with the RDS algorithm in large-scene jamming.

3.3. Computational Complexity Analysis

The effectiveness of the TDFS-TS algorithm is verified by simulation in the previous subsection. In this subsection, we will estimate the computational complexity of the TDFS-TS algorithm to assess its practical value. Assume that the jamming scene template consists of m   ×   n point scatters and is divided into M   ×   N blocks, each block contains U   ×   V point scatters. Here, for ease of analysis, the addition, multiplication and power operations are all considered to be a basic operation. The following will analyze the number of basic operations to obtain the JSF H ( f r , t a ) at a specific frequency f r and azimuth time t a .
In the preprocessing stage, calculating an element of matrix H r 1 requires 15 basic operations, and the operation amount of all elements is 15 V ; however, because the elements in H r 1 are actually a geometric series, the other elements can be generated by multiplying the first element by the common ratio, meaning that the amount of calculation is reduced to 15 + V . According to the same analysis, the operation amount of H r 2 is 12 + U , so the total computational complexity in the preprocessing stage is
C p r e = 15 + V + 12 + U = U + V + 27 .
In the real-time calculation stage, calculating the JSF of a block center requires 20 basic operations, and a total of 20 M N operations are required for all blocks. The operation amount for calculating matrix H a q 1 is 15 + V , which needs to be repeated N times. The calculation amount of matrix H a q 2 is 14 + U and needs to be repeated N times as well. The computational complexity of matrix multiplication in Equation (42) is 2 U V + U + 2 V 1 , so the operation amount of Equation (42) is 2 U V + U + 2 V added to the multiplication with H c p q ( f r , t a ) , and the calculation of Equation (42) needs to be repeated M N times. Finally, the operation amount of the summation—i.e., Equation (32)—is M N 1 . Based on the analysis above, the total amount of computation in the real-time calculation stage is
C r t = 20 M N + N ( 15 + V ) + N ( 14 + U ) + M N ( 2 U V + U + 2 V ) + M N 1 = m n ( 2 + 2 U + 1 V + 21 U V ) + n ( 1 + U V + 29 V ) 1 .
According to the same analysis method, the computational complexity of different jamming algorithms including TDFS-TS, RDS, TDFS-TS without squint correction (TDFS-TS-WSC) and the basic algorithm (BA) shown by Equation (3) is derived and shown in Table 4.
The block size U and V are determined by the parameters of the jamming object, the scatter density of the template, and the two imaging quality control factors ε and η . We fix U and V and observe the relationship between the computational complexity and the template size m and n . According to the simulation parameters in Section 4.1, we set U = 267 and V = 539 , draw the relationship between the computational complexity and the total number of scatters in the template shown in Figure 15. Here, for the convenience of analysis, we set m = n and take the logarithm of computational amount for display.
It can be seen that, no matter in the preprocessing stage or in the real-time calculation stage, the computational complexity of the TDFS-TS-WSC algorithm is less than that of the RDS algorithm. In particular, in the real-time calculation stage, the computational complexity can be reduced by more than one order of magnitude because the TDFS algorithm in Equation (31) simplifies the calculation procedure significantly. When the squint correction is added, the calculation amount in the preprocessing stage is reduced, but increased in the real-time calculation stage.

4. Discussion

4.1. Imaging Quality

According to the analysis of the TDFS-TS algorithm in Section 2.2.2 and Section 2.2.4, the simplification in the range dimension leads to a distortion of the azimuth profile including the main lobe broadening and position offset (in the squint mode), and the residual RCM introduced by the simplification in the azimuth dimension affects both the range and the azimuth profile. In addition, the inherent limitations of jamming signal, namely the Doppler bandwidth loss of the fake scatter far away from the jammer in the azimuth dimension, will broaden the azimuth main lobe. In summary, we can draw the following conclusions on the TDFS-TS algorithm:
  • The imaging quality of the jamming signal in the range dimension depends on the azimuth position of the false scatter ;
  • The distortion of the azimuth profile depends on both the range and the azimuth position of the false scatter;
  • These distortions become severe as the distance between the fake scatter and the block center increases.
These phenomena can be seen clearly in Table 2: P 0 and P 1 are both at the azimuth center of the block, thus they have the same imaging quality parameters in the range dimension; the imaging quality parameters of P 2 and P 3 in the range dimension are the same, and worse than that of P 0 and P 1 because the two points are both in the azimuth edge of the block; the situation in the azimuth dimension is more complicated: affected by both the range and azimuth position, the four points have different degrees of azimuth distortion, where P 3 is the worse and P 0 is the best; the impact of residual RCM in the azimuth dimension is greater than that of azimuth chirp rate error by comparing the imaging quality parameters of P 1 and P 2 .
From Table 2 it can be seen that, in the broadside mode, the main lobe positions of P 2 and P 3 in the range dimension are slightly shifted. This is caused by the residual RCM as well. Due to the existence of residual RCM, the curve of jamming signal after RCM correction in the range-Doppler domain is not a straight line but a parabola which is expressed as Equation (22), thus the main lobe in the range dimension will shift towards the negative direction besides broadening. In the squint mode, the effect of residual RCM is more complicated, which can be seen in Table 3. Due to the nonlinear nature of the RCM error shown in Equation (22), the offset in the range dimension expressed in Equation (34) is just an approximation. In fact, it can hardly be eliminated completely, thus the images of P 1 , P 2 , and P 3 shift to varying degrees in the range dimension. In addition, by comparing the range offset of P 1 and P 2 , we can consider that the range coordinate has a greater effect on the range offset in the squint mode. Although the TDFS-TS algorithm cannot correct the range offset accurately, the maximum residual offset shown in Table 3 is approximately equal to the range resolution, and has little impact on the deceptive image shown in Figure 11, Figure 12 and Figure 13.
In the squint mode, the offset in the azimuth dimension caused by the frequency modulation rate error can be effectively corrected by the TDFS-TS algorithm; the results are shown in Table 3. As a comparison, the RDS algorithm divides the template in the range dimension as well, thus the problem of frequency modulation rate error still exists. Without a correction algorithm, the main lobe position of the RDS algorithm shift severely in the azimuth dimension and the image is distorted. In short, the imaging quality of the TDFS-TS algorithm can be guaranteed both in the broadside mode and in the squint mode with a small squint angle.

4.2. Computational Efficiency

According to the results in Section 3.3, in the broadside mode, the TDFS-TS-WSC algorithm has a quite high computational efficiency, and the squint correction is time-consuming. This is because the range coordinate correction is related to the azimuth coordinate and the azimuth coordinate correction is also related to the range coordinate. Therefore, the range and azimuth coupling terms are added, resulting in a large number of calculations needing to be completed in the real-time calculation stage, and the computational efficiency becomes worse. However, due to the calculation of each block being completely independent in the TDFS-TS algorithm and the introduction of matrix operations, it is convenient to apply parallel computing technology to greatly increase the calculation speed. Therefore real-time jamming is feasible. In summary, compared with the RDS algorithm, the TDFS-TS algorithm is more efficient in the broadside mode, and the application scenario can be extended to the squint mode.

5. Conclusions

In this paper, the large-scene electromagnetic deception of SAR is studied. The primary focus is to reduce the computational burden during the jamming process. For this purpose, the TDFS algorithm is proposed, which can improve the computational efficiency significantly. In addition, the focus capability of the jamming signal must be considered. In order to ensure the deceptive image quality of the TDFS algorithm in a large scene, the template is divided into several blocks according to the SAR parameters and imaging quality control factor. The correction algorithm in squint mode is introduced so that the TDFS-TS algorithm can be used to the SAR with a low squint angle and medium aperture length. Finally, simulation results and computational complexity analyses show that, compared to other jamming algorithms, the TDFS-TS algorithm has higher computational efficiency with less image quality decline in the broadside mode. Furthermore, the application of parallel computation can partially compensate for the computational performance decline in the squint mode.
The TDFS-TS algorithm is applicable to space-borne SAR operating at broadside mode or a low squint angle mode. In the future, we will investigate the rapid jamming method against the SAR with a significant squint angle and long synthetic aperture. Additionally, other problems such as intelligence gathering and gain control will also be studied.

Author Contributions

Conceptualization and supervision, W.Y.; formal analysis, F.M.; methodology, K.Y. and F.M.; experiment, G.L. and Q.T.; writing, K.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Science and Technology on Complex Electronic System Simulation Laboratory, grant number DXZF-JC-ZZ-2017-007.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Walter, W.G. Synthetic Aperture Radar and Electronic Warfare; Artech House: Boston, MA, USA, 1993; pp. 25–39. [Google Scholar]
  2. Condley, C.J. Some system considerations for electronic countermeasures to synthetic aperture radar. In Proceedings of the IEE Colloquium on Electronic Warfare Systems, London, UK, 14 January 1991. [Google Scholar]
  3. Dumper, K.; Cooper, P.S.; Wons, A.F.; Condley, C.J.; Tully, P. Spaceborne synthetic aperture radar and noise jamming. In Proceedings of the 1997 Radar Edinburgh International Conference, Edinburgh, UK, 14–16 October 1997; pp. 411–414. [Google Scholar]
  4. Fouts, D.J.; Pace, P.E.; Karow, C.; Ekestorm, S.R.T. A single-chirp false target radar image generator for countering wideband imaging radars. IEEE J. Solid State Circuits 2002, 37, 751–759. [Google Scholar] [CrossRef]
  5. Kristoffersen, S.; Thingsrud, O. The EKKO II synthetic target generator for imaging radar. In Proceedings of the 5th European Conference on Synthetic Aperture Radar, Ulm, Germany, 25–27 May 2004; pp. 871–874. [Google Scholar]
  6. Wei, Y.; Hang, R.; Shuxian, Z.; Li, Y. Study of noise jamming based on convolution modulation to SAR. In Proceedings of the 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering, Changchun, China, 24–26 August 2010; pp. 169–172. [Google Scholar]
  7. Garmatyuk, D.S.; Narayanan, R.M. ECCM capabilities of an ultrawideband bandlimited random noise imaging radar. IEEE Trans. Aerosp. Electron. Syst. 2002, 28, 1243–1255. [Google Scholar] [CrossRef]
  8. Yan, Z.; Guoqing, Z.; Yu, Z. Research on SAR jamming technique based on man-made map. In Proceedings of the International Conference on Radar, Shanghai, China, 16–19 October 2006; pp. 1–4. [Google Scholar]
  9. Lin, X.; Liu, P.; Xue, G. Fast generation of SAR deceptive jamming signal based on inverse range doppler algorithm. In Proceedings of the IET International Radar Conference, Xi’an, China, 14–16 April 2013; pp. 1–4. [Google Scholar]
  10. Xiaodong, H.; Jun, Z.; Jun, W.; Dongping, D.; Bin, T. False target deception jamming for countering missile-borne SAR. In Proceedings of the IEEE 17th International Conference on Computational and Engineering, Chengdu, China, 19–21 December 2014; pp. 1974–1978. [Google Scholar]
  11. Feng, Z.; Bo, Z.; Mingliang, T.; Xueru, B.; Bo, C.; Guangcai, S. A Large scene deceptive jamming method for space-borne SAR. IEEE Trans. Geosci. Remote Sens. 2013, 51, 4486–4495. [Google Scholar] [CrossRef]
  12. Qingyang, S.; Ting, S.; Shicheng, Z.; Bin, T.; Wenxian, Y. A novel jamming signal generation method for deceptive SAR jammer. In Proceedings of the IEEE Radar Conference, Cincinnati, OH, USA, 19–23 May 2014; pp. 1174–1178. [Google Scholar]
  13. Bo, Z.; Feng, Z.; Zheng, B. Deception jamming for squint SAR based on multiple receivers. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2015, 8, 3988–3998. [Google Scholar] [CrossRef]
  14. Bo, Z.; Lei, H.; Feng, Z.; Jihong, Z. Performance improvement of deception jamming against SAR based on minimum condition number. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2017, 10, 1039–1055. [Google Scholar] [CrossRef]
  15. Qingyang, S.; Ting, S.; Kaibor, Y.; Wenxian, Y. Efficient deceptive jamming method of static and moving targets against SAR. IEEE Sens. J. 2018, 18, 3601–3618. [Google Scholar] [CrossRef]
  16. Yongcai, L.; Wei, W.; Xiaoyi, P.; Dahai, D.; Dejun, F. A Frequency-domain three-stage algorithm for active deception jamming against synthetic aperture radar. IET Radar Sonar Navig. 2014, 8, 639–646. [Google Scholar] [CrossRef]
  17. Yongcai, L.; Wei, W.; Xiaoyi, P.; Qixiang, F.; Guoyu, W. Inverse omega-K algorithm for the electromagnetic deception of synthetic aperture radar. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2016, 9, 3037–3049. [Google Scholar] [CrossRef]
  18. Bo, Z.; Lei, H.; Jian, L.; Maliang, L.; Jinwei, W. Deceptive SAR jamming based on 1-bit sampling and time-varying thresholds. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2018, 11, 939–950. [Google Scholar] [CrossRef]
  19. Yongcai, L.; Wei, W.; Xiaoyi, P.; Letao, X.; Guoyu, W. Influence of estimate error of radar kinematic parameter on deception jamming against SAR. IEEE Sens. J. 2016, 16, 5904–5911. [Google Scholar] [CrossRef]
  20. Franceschetti, G.; Guida, R.; Iodice, A.; Riccio, D.; Ruello, G. Efficient simulation of hybrid stripmap/spotlight SAR raw signals from extended scenes. IEEE Trans. Geosci. Remote Sens. 2004, 42, 2385–2396. [Google Scholar] [CrossRef]
  21. Ahmed, S.K.; Laurent, F.F.; Eric, P. Efficient SAR raw data generation for anisotropic urban scenes based on inverse processing. IEEE Geosci. Remote Sens. Lett. 2009, 6, 757–761. [Google Scholar] [CrossRef]
  22. Ian, G.C.; Frank, H.W. Digital Processing of Synthetic Aperture Radar Data: Algorithms and Implementation; Artech House: Boston, MA, USA, 2005; pp. 45–63. [Google Scholar]
  23. Yongcai, L.; Wei, W.; Xiaoyi, P.; Dahai, D. Effective region of active decoy jamming to SAR based on time-delay doppler-shift method. J. Radars 2013, 2, 46–53. [Google Scholar]
Figure 1. Principle of synthetic aperture radar (SAR) deceptive jamming.
Figure 1. Principle of synthetic aperture radar (SAR) deceptive jamming.
Remotesensing 12 00053 g001
Figure 2. The geometric model of SAR deceptive jamming.
Figure 2. The geometric model of SAR deceptive jamming.
Remotesensing 12 00053 g002
Figure 3. Jamming scene template segmentation diagram.
Figure 3. Jamming scene template segmentation diagram.
Remotesensing 12 00053 g003
Figure 4. Time-delay and frequency-shift with template segmentation (TDFS-TS) algorithm procedure.
Figure 4. Time-delay and frequency-shift with template segmentation (TDFS-TS) algorithm procedure.
Remotesensing 12 00053 g004
Figure 5. The deceptive scene containing four-point scatters.
Figure 5. The deceptive scene containing four-point scatters.
Remotesensing 12 00053 g005
Figure 6. Simulation results of the RDS algorithm for false point scatters in broadside mode. (ac) are the close-up image, range profile, and azimuth profile of P 0 , respectively; (d–f) are the close-up image, range profile, and azimuth profile of P 1 respectively; (g–i) are the close-up image, range profile, and azimuth profile of P 2 , respectively; (j–l) are the close-up image, range profile, and azimuth profile of P 3 , respectively.
Figure 6. Simulation results of the RDS algorithm for false point scatters in broadside mode. (ac) are the close-up image, range profile, and azimuth profile of P 0 , respectively; (d–f) are the close-up image, range profile, and azimuth profile of P 1 respectively; (g–i) are the close-up image, range profile, and azimuth profile of P 2 , respectively; (j–l) are the close-up image, range profile, and azimuth profile of P 3 , respectively.
Remotesensing 12 00053 g006
Figure 7. Simulation results of the TDFS-TS algorithm for false point scatters in broadside mode. (ac) are the close-up image, range profile, and azimuth profile of P 0 , respectively; (d–f) are the close-up image, range profile, and azimuth profile of P 1 , respectively; (g–i) are the close-up image, range profile, and azimuth profile of P 2 , respectively; (j–l) are the close-up image, range profile, and azimuth profile of P 3 , respectively.
Figure 7. Simulation results of the TDFS-TS algorithm for false point scatters in broadside mode. (ac) are the close-up image, range profile, and azimuth profile of P 0 , respectively; (d–f) are the close-up image, range profile, and azimuth profile of P 1 , respectively; (g–i) are the close-up image, range profile, and azimuth profile of P 2 , respectively; (j–l) are the close-up image, range profile, and azimuth profile of P 3 , respectively.
Remotesensing 12 00053 g007
Figure 8. Simulation results of the RDS algorithm for false point scatters in squint mode with a squint angle θ = 5 ° . (a–c) are the close-up image, range profile, and azimuth profile of P 0 , respectively; (d–f) are the close-up image, range profile, and azimuth profile of P 1 , respectively; (g–i) are the close-up image, range profile, and azimuth profile of P 2 , respectively; (j–l) are the close-up image, range profile, and azimuth profile of P 3 , respectively.
Figure 8. Simulation results of the RDS algorithm for false point scatters in squint mode with a squint angle θ = 5 ° . (a–c) are the close-up image, range profile, and azimuth profile of P 0 , respectively; (d–f) are the close-up image, range profile, and azimuth profile of P 1 , respectively; (g–i) are the close-up image, range profile, and azimuth profile of P 2 , respectively; (j–l) are the close-up image, range profile, and azimuth profile of P 3 , respectively.
Remotesensing 12 00053 g008
Figure 9. Simulation results of the TDFS-TS algorithm for false point scatters in squint mode with a squint angle θ = 5 ° . (a–c) are the close-up image, range profile, and azimuth profile of P 0 , respectively; (d–f) are the close-up image, range profile, and azimuth profile of P 1 , respectively; (g–i) are the close-up image, range profile, and azimuth profile of P 2 , respectively; (j–l) are the close-up image, range profile, and azimuth profile of P 3 , respectively.
Figure 9. Simulation results of the TDFS-TS algorithm for false point scatters in squint mode with a squint angle θ = 5 ° . (a–c) are the close-up image, range profile, and azimuth profile of P 0 , respectively; (d–f) are the close-up image, range profile, and azimuth profile of P 1 , respectively; (g–i) are the close-up image, range profile, and azimuth profile of P 2 , respectively; (j–l) are the close-up image, range profile, and azimuth profile of P 3 , respectively.
Remotesensing 12 00053 g009
Figure 10. Deceptive jamming template with 12.5 km in the range dimension and 4.5 km in the azimuth dimension, which is divided into blocks by the yellow line. The block size is 2.5   km   ×   1.5   km .
Figure 10. Deceptive jamming template with 12.5 km in the range dimension and 4.5 km in the azimuth dimension, which is divided into blocks by the yellow line. The block size is 2.5   km   ×   1.5   km .
Remotesensing 12 00053 g010
Figure 11. Imaging results of the fake scene in Figure 10 using (a) the RDS algorithm and (b) the TDFS-TS algorithm. Parts of the images marked by rectangular boxes are enlarged and shown in Figure 12.
Figure 11. Imaging results of the fake scene in Figure 10 using (a) the RDS algorithm and (b) the TDFS-TS algorithm. Parts of the images marked by rectangular boxes are enlarged and shown in Figure 12.
Remotesensing 12 00053 g011
Figure 12. Partially enlarged image of Figure 11. (ac) are the partial enlargement of the image generated by the RDS algorithm in the yellow, green, and red boxes, respectively; (df) are the partial enlargement of the image generated by the TDFS-TS algorithm in the yellow, green, and red boxes.
Figure 12. Partially enlarged image of Figure 11. (ac) are the partial enlargement of the image generated by the RDS algorithm in the yellow, green, and red boxes, respectively; (df) are the partial enlargement of the image generated by the TDFS-TS algorithm in the yellow, green, and red boxes.
Remotesensing 12 00053 g012
Figure 13. Comparison of jamming results. (a) is the image formed by the original signal, (b) is the image formed by the superposition of the original signal and jamming signal generated by the RDS algorithm, and (c) is the image formed by the superposition of the original signal and jamming signal generated by the TDFS-TS algorithm. Parts of the images marked by rectangular boxes are enlarged and shown in Figure 14.
Figure 13. Comparison of jamming results. (a) is the image formed by the original signal, (b) is the image formed by the superposition of the original signal and jamming signal generated by the RDS algorithm, and (c) is the image formed by the superposition of the original signal and jamming signal generated by the TDFS-TS algorithm. Parts of the images marked by rectangular boxes are enlarged and shown in Figure 14.
Remotesensing 12 00053 g013aRemotesensing 12 00053 g013b
Figure 14. Partially enlarged image of Figure 13. (ac) are the partial enlargement of the original image, the jamming image of the RDS algorithm, and the TDFS-TS algorithm, respectively in the yellow rectangular boxes; (df) are the partial enlargement of the original image, the jamming image of the RDS algorithm, and the TDFS-TS algorithm, respectively in the green boxes.
Figure 14. Partially enlarged image of Figure 13. (ac) are the partial enlargement of the original image, the jamming image of the RDS algorithm, and the TDFS-TS algorithm, respectively in the yellow rectangular boxes; (df) are the partial enlargement of the original image, the jamming image of the RDS algorithm, and the TDFS-TS algorithm, respectively in the green boxes.
Remotesensing 12 00053 g014
Figure 15. The relationship between the computational complexity and the total number of scatters in the template. (a) is the computational complexity in the preprocessing stage and (b) is the computational complexity in the real-time calculation stage.
Figure 15. The relationship between the computational complexity and the total number of scatters in the template. (a) is the computational complexity in the preprocessing stage and (b) is the computational complexity in the real-time calculation stage.
Remotesensing 12 00053 g015
Table 1. The setting of SAR parameters in simulations.
Table 1. The setting of SAR parameters in simulations.
Carrier FrequencyChirp RatePRIPulse WidthPlatform VelocityShortest Slant RangeAntenna Aperture
5.30 GHz0.72 MHz/μs0.79 ms41.74 μs7.06 km/s989 km10 m
Table 2. Comparison of imaging quality parameters between the RDS algorithm and TDFS-TS algorithm in broadside mode.
Table 2. Comparison of imaging quality parameters between the RDS algorithm and TDFS-TS algorithm in broadside mode.
Range DimensionAzimuth Dimension
IRW (m)MLPO (m)PSLR (dB)ISLR (dB)IRW (m)MLPO (m)PSLR (dB)ISLR (dB)
P 0 RDS7.730−11.78−12.576.770−17.24−19.50
TDFS-TS7.730−11.78−12.576.770−17.24−19.50
P 1 RDS7.730−11.78−12.576.880−13.47−15.05
TDFS-TS7.730−11.78−12.576.880−13.39−14.98
P 2 RDS7.730−11.78−12.577.395.04−14.46−14.90
TDFS-TS7.78−0.21−12.03−12.967.470−13.95−13.67
P 3 RDS7.730−11.77−12.577.535.52−15.03−14.24
TDFS-TS7.78−0.21−12.04−12.967.600.48−15.12−12.55
Table 3. Comparison of imaging quality parameters between the range dimension segmentation (RDS) algorithm and TDFS-TS algorithm in squint mode with squint angle θ = 5 ° .
Table 3. Comparison of imaging quality parameters between the range dimension segmentation (RDS) algorithm and TDFS-TS algorithm in squint mode with squint angle θ = 5 ° .
Range DimensionAzimuth Dimension
IRW (m)MLPO (m)PSLR (dB)ISLR (dB)IRW (m)MLPO (m)PSLR (dB)ISLR (dB)
P 0 RDS7.730−12.07−12.796.770−17.79−20.30
TDFS-TS7.730−12.07−12.796.770−17.79−20.30
P 1 RDS7.88−3.48−12.79−13.877.07−80.32−16.56−17.91
TDFS-TS7.887.69−12.94−13.927.15−0.98−18.76−17.83
P 2 RDS7.772.46−12.02−12.607.3929.01−15.03−15.45
TDFS-TS7.740.01−11.68−12.487.34−0.01−14.59−14.96
P 3 RDS7.95−1.17−12.36−13.478.05−50.70−14.05−14.08
TDFS-TS8.167.73−13.29−14.878.34−0.57−15.95−14.28
Table 4. Computational complexity comparison of different algorithms.
Table 4. Computational complexity comparison of different algorithms.
TDFS-TSRDS1TDFS-TS-WSCBA
Preprocessing U + V + 27 m n ( 14 1 V ) 2 U V U + V + 11 -
Real-time calculation m n ( 2 + 2 U + 1 V + 21 U V ) + n ( 1 + U V + 29 V ) 1 22 m n V 1 21 m n U V + n V ( 3 U + 13 ) 13 )   V   21 m n 1
1 the segment length in the range dimension of the RDS algorithm is the same as the block size of the TDFS-TS algorithm.

Share and Cite

MDPI and ACS Style

Yang, K.; Ye, W.; Ma, F.; Li, G.; Tong, Q. A Large-Scene Deceptive Jamming Method for Space-Borne SAR Based on Time-Delay and Frequency-Shift with Template Segmentation. Remote Sens. 2020, 12, 53. https://doi.org/10.3390/rs12010053

AMA Style

Yang K, Ye W, Ma F, Li G, Tong Q. A Large-Scene Deceptive Jamming Method for Space-Borne SAR Based on Time-Delay and Frequency-Shift with Template Segmentation. Remote Sensing. 2020; 12(1):53. https://doi.org/10.3390/rs12010053

Chicago/Turabian Style

Yang, Kaizhi, Wei Ye, Fangfang Ma, Guojing Li, and Qian Tong. 2020. "A Large-Scene Deceptive Jamming Method for Space-Borne SAR Based on Time-Delay and Frequency-Shift with Template Segmentation" Remote Sensing 12, no. 1: 53. https://doi.org/10.3390/rs12010053

APA Style

Yang, K., Ye, W., Ma, F., Li, G., & Tong, Q. (2020). A Large-Scene Deceptive Jamming Method for Space-Borne SAR Based on Time-Delay and Frequency-Shift with Template Segmentation. Remote Sensing, 12(1), 53. https://doi.org/10.3390/rs12010053

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop