Next Article in Journal
Fiducial Reference Measurements (FRMs): What Are They?
Previous Article in Journal
Estimation of Bale Grazing and Sacrificed Pasture Biomass through the Integration of Sentinel Satellite Images and Machine Learning Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Multiple-False-Target ISAR Shape Deception Jamming Method Based on Improved Template Multiplication Modulated Time-Delay Algorithm and Sub-Nyquist Sampling

1
The Institute of Information and Navigation, Air Force Engineering University, Xi’an 710077, China
2
The Collaborative Innovation Center of Information Sensing and Understanding, Xi’an 710077, China
3
The Key Laboratory for Information Science of Electromagnetic Waves, Ministry of Education, Fudan University, Shanghai 200433, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2023, 15(20), 5015; https://doi.org/10.3390/rs15205015
Submission received: 21 August 2023 / Revised: 12 October 2023 / Accepted: 16 October 2023 / Published: 18 October 2023

Abstract

:
In recent decades, the deception jamming approach based on digital radio frequency memory (DRFM) for inverse synthetic aperture radar (ISAR) has been a well-researched topic. Various types of jamming signals based on interrupted-sampling repeater jamming (ISRJ) can induce one-dimensional multiple high-resolution range profile (HRRP) false targets or two-dimensional realistic multiple ISAR false targets for deception. However, these existing methods generate false targets that are identical to the real target. The ISRJ false target also generates a main false target whose energy is much higher than other sub-false targets. Thus, it is easy to discover that the radar has suffered jamming. In order to generate better, more confusing jamming signals, this paper proposes a jamming method based on sub-Nyquist sampling jamming to induce realistic, multiple false targets on ISAR images. It improves a template multiplication modulated time-delay method to eliminate and add scatterers on the selected false target to change its ISAR shape. The frequency-shift parameters of the template jamming signal are analyzed and derived in detail for eliminating and adding scatterers at the specified location. Thus, multiple false targets with different ISAR shapes and similar energy are generated, which can create better deception effects. Meanwhile, this method can adjust the number of false targets and the location of changed-shape false targets. Furthermore, the resolution of the false target can adaptively change with the radar pulse width and the accumulated pulse number. The simulation results show that the proposed deception jamming strategy works.

1. Introduction

In recent decades, inverse synthetic aperture radar (ISAR) has received a lot of interest because it enables high-resolution two-dimensional imaging of airborne targets at all hours and in all weather situations [1,2]. Meanwhile, ISAR is widely used in military air defense and anti-missile applications for target-feature extraction and recognition [3]. Therefore, ISAR jamming research to prevent targets from being detected and recognized has drawn increasing attention in the electronic countermeasure community [4,5].
Digital radio frequency memory (DRFM) technology intercepts radar echoes and processes them with time-frequency modulation to generate false targets for deception jamming [6,7,8]. In [6], the DRFM principles of high-speed sampling and digital memory are discussed, which are used to store radio frequency and microwave signals. In [7], the radar signal distortion is estimated and corrected using an improved digital finite impulse response filter with complex coefficients. In [8], an all-digital image synthesizer is designed to generate false target images. In [9], a deceptive jamming method is proposed to create false targets with multiple ranges by intercepting radar signals and transmitting back with a different time-delay. Another paper [10] proposed an FDA-MIMO deception jamming method of modulating the intercepted radar signals with diversification in frequencies, waveforms, and time modulation. The paper [11] proposed a two-dimensional square-shaped blanket jamming method using frequency modulation and coded phase modulation. This synthesizer can modulate the phase samples of intercepted ISAR pulses, which are stored in DRFM.
Interrupted-sampling repeater jamming (ISRJ) is a method based on DRFM that can generate dense false targets or striped targets for jamming [12,13,14,15]. In [12], the principles and the ways of achieving ISRJ are shown to generate multiple false targets for dechirping radar. In [13], an improved ISRJ method, which can sample and store the radar radio signal at low frequency in the DRFM to preserve its coherent property, was shown to generate a series of false targets before the true target. In [14], a non-uniform periodic repeater jamming method is shown to generate many false targets with different amplitudes and intervals. In [15], a constraints parameter ISRJ method is proposed for use against intra-pulse-frequency-agile waveforms. The constraints parameter is calculated by time-frequency ridge extraction and wavelet transform. This class of methods has been widely used in electronic countermeasures. However, the obvious features of dense, similar targets and strips can easily reveal that the radar has suffered from artificial jamming signals. Then, various anti-jamming techniques can be used to filter out the jamming signals [16,17]. One paper [16] proposed an anti-jamming filter method based on the characteristic time-frequency differences between the target echo and the ISRJ signal. Another paper [17] proposed an anti-jamming method based on the MSMD-net, which utilized the time-domain discontinuity and phase information of ISRJ to perform target-feature extraction and signal reconstruction. Therefore, the research has practical applications for confusing the radar so that it incorrectly identifies the target and cannot detect the jamming.
Sub-Nyquist sampling jamming is a special type of ISRJ in which the width of the sampling pulse is close to the radar sampling pulse. In [18], the principle of sub-Nyquist sampling jamming is presented to show that lower sampling rates can lead to multiple high-resolution false targets. This technology has significantly decreased the sampling rate and processing-time demands. Combined with ISAR image theory, sub-Nyquist sampling jamming can induce a series of realistic false targets with the same energy amplitude and the same shape on ISAR images [19,20,21,22]. In [19,20], the sub-Nyquist sampling jamming signals are processed via the Compress Sensing (CS) method to obtain finer resolution, realistic multiple false targets. In [21], an improved DIS method is proposed based on adding the polyphase code to the pulse and sub-Nyquist sampling the echo along the range direction. In [22], a parallel convolution jamming method is proposed, which samples the radar signal with a sub-Nyquist sampling rate and combines it with a high-resolution range profile.
By generating different shapes of false targets, the radar operator will be confused and misdirected by the false target. The commonly used methods are convolutional modulation jamming [23], electromagnetic model jamming [24,25,26], and template-modulated jamming [27,28]. In [23], a simple real-time jamming method was proposed, which reduces the computation structure by parallel convolution of the intercepted radar pulse and the real target HRRP. In [24], an equivalent facet model of targets is proposed to transmit a jamming signal by modulating with the intercepted radar signal. This model can simulate the ISAR images and radar back-scattering of moving targets. In [25], an imaging technique based on an electromagnetic model is presented, in which a 3-D model is created, triangular facets are divided up, and facet RCS is predicted. In [26], an electromagnetic model-based jamming method is proposed, which can generate verisimilar false targets, including multiple scattering and shadowing. However, convolutional modulation and electromagnetic model methods generally have high computational complexity and poor real-time performance. Another paper [27] proposes a real-time jamming algorithm based on a 2-D template for generating realistic false targets by multiplying a derived matrix based on the improved two-stage digital false-target image synthesizer (DIS). In contrast, the scatter positions of the false target cannot be precisely determined on the ISAR image. In [28], an improved 2-D template jamming method is proposed, fully analyzing the frequency-shift and time-delay relationship between the intercepted LFM pulse and the real target echo. The paper [29] proposed a deceptive jamming method based on one-bit quantization technology, which can decompose harmonics by a single-frequency threshold. However, those deceptive jamming methods generate a single realistic false target with details. It is important to generate multiple realistic false targets with different target shapes.
This paper proposes a multiple-false-target-generating method based on sub-Nyquist sampling jamming and template multiplication modulated time-delay jamming. Firstly, the jammer intercepts the real target echo and samples it at a sub-Nyquist sampling rate, and then transmits it to a radar receiver. During this process, the incidence and reflection angles of the signal are zero, which means that the echo intercepted by the jammer is the same as the real-target echo received by the radar receiver. Thus, the sub-Nyquist jamming signal will induce multiple false targets with the same shape and energy on ISAR images. At the same time as the sub-Nyquist jamming signal, the LFM pulse is intercepted by the jammer and modulated with a false target template. The frequency-shift relationship between the LFM pulse and the sub-Nyquist sampling jamming signal is analyzed in detail. The jamming signal, which can induce and eliminate scatterers at the specified location of the ISAR image, will be transmitted, and the shape of specified false targets will be changed. Thus, multiple false targets with different ISAR shapes are generated. Adjusting the sub-Nyquist sampling period will adaptively change the number of false targets. Meanwhile, the resolution of the shape changes and the sub-Nyquist false target will alter with the different radar pulse resolutions. These advantages can help to more effectively confuse radar discriminators.
The structure of this paper is organized as follows: In Section 2, the sub-Nyquist sampling ISAR imaging model is demonstrated. Section 3 details the procedure and principle of the improved multiple-false-target-generating method. Section 4 presents numerous simulations. Finally, the conclusion is reported in Section 5.

2. Sub-Nyquist ISAR Imaging Model

ISRJ is conducted by intercepting a radar signal with high fidelity on a jammer and then forwarding it to the radar receiver. The mathematical expression of ISRJ consists of a series of periodic rectangular pulses as [18]
p t = r e c t ( t τ ) l = + δ t l T s
where τ indicates the sampling pulse width, T s is the sampling period, and r e c t ( t / τ ) is a rectangle envelope pulse, which is 1 for t τ / 2 .The sub-Nyquist sampling signal is a special type of ISRJ. The difference between them is the sampling pulse width. The sampling rate of the intercepted section of ISRJ still satisfies the Nyquist Sampling Theorem. In contrast, the sub-Nyquist sampling signal is sampled with a much shorter pulse width, which is almost the same as the jammer signal sampling pulse width, as shown in Figure 1. While both sampling methods can induce multiple, identical false targets, the primary middle false target energy of the ISRJ is stronger, while the sub-Nyquist sampling signal produces multiple false targets with the same energy [14].
Combining ISAR imaging theory and the sub-Nyquist sampling signal can induce a series of identical ISAR false targets. The jamming characteristics of the sub-Nyquist sampling signals are discussed below. The radar-reflected echoes of a moving target are sampled at fast time and slow time, respectively, and the sub-Nyquist sampling signal is denoted as
p t r = r e c t ( t r τ r ) l r = + δ t r l r T s r p t a = r e c t ( t a τ a ) l a = + δ t a l a T s a
where t r is the fast time, T s r indicates the sampling period in the fast time, τ r is the sampling pulse width in the fast-time domain, t a is the slow time, T s a indicates the sampling period in the slow-time domain, and τ a is the sampling pulse width in the slow time.
According to the knowledge of the signal system, the sub-Nyquist signals of fast and slow time can be expanded by the Fourier series as
p t r = f s r l r = + exp j 2 π l r f s r t r p t a = f s a l a = + exp j 2 π l a f s a t a
where f s r = 1 / T s r is sampling frequency in the fast-time domain, f s a = 1 / T s a is sampling frequency in the fast-time domain. The LFM signal transmitted by the radar is
s ( t r , t a ) = r e c t ( t r T p ) exp [ j 2 π ( f c t r + 1 2 K r t r 2 ) ]
where K r is the chirp rate, and f c refers to the radar carrier frequency.
Assuming that the scattering coefficients of the target are constant at one, the jammer intercepted the reflection echo of scatters with the sub-Nyquist sampling in the fast and slow time domains, and then transmitted it to the radar receiver. The sub-Nyquist sampling reflection echo of scatters i of the target can be represented as
s J i ( t r , t a ) = r e c t t r 2 R i c T p exp j 2 π f c t r 2 R i c + 1 2 K r t r 2 R i c 2 p t r p t a
where R i is the propagation range of the scatterer i , T p is the pulse duration, and c is the speed of light. When the target moves in a uniform linear motion, the phase compensation under complex motion is not considered. Thus, the echo of scatterers can be processed to the ISAR image at the radar receiver based on the turntable model [24]. By selecting a reference point on the target, the signal reflected back from this reference point can be expressed as
s r e f ( t r , t a ) = r e c t t r 2 R r e f c T p exp j 2 π f c t r - 2 R r e f c + 1 2 K r t r 2 R r e f c 2
where R r e f is the reference range. After de-chirping, the received jamming signal can be expressed as
s J i f ( t r , t a ) = s J i ( t r , t a ) s r e f * ( t r , t a ) = r e c t ( t Δ 2 R Δ i c T p ) exp ( j 4 π K r c t Δ R Δ i ) exp ( j 4 π K r c 2 R Δ i 2 ) exp ( j 4 π f c R Δ i c ) p t r p t a
where t Δ = t r 2 R r e f c , R Δ i = R i R r e f . Substitute the Equation (3) into Equation (7), and perform the Fourier transform on the fast time t r , compensate two phase terms of residual video phase (RVP) and oblique envelope term, then the one-dimensional high-resolution range profile (HRRP) [19] of the sub-Nyquist jamming signal of scatterers is obtained. Assume that the coordinates of the scatterer i on the turntable model are x k , y k . When the target is moving on the turntable model with a tiny angle, there exists an approximate relationship R Δ i x i ω t a + y i [30]. Considering the approximate relationship and M pulse-echoes, the HRRP sum can be expressed as
S J i f ( f r , t a ) = M l r = + σ p τ r f s r T p sin c l r τ f s r sin c T p f r + K r R Δ i c + l r f s r exp j 4 π f c c x k ω t a exp j 4 π f c c y k p t a
where σ p is the scattering coefficient, and ω represents the angular velocity of the moving target on the turntable model. Compensating for the constant phase term, and substituting the expression p t a in Equation (3) into Equation (8), then the jamming signal can be obtained by performing the Fourier transform on the slow time [19], as
S J p f f r , f a = l r = + σ p τ r f s r T p sin c l r τ f s r sin c T p f r + 2 K r R Δ i c + l r f s r τ a f s a l a = + sin c τ f a + 2 f c c x k ω + l a f s a
The resulting Doppler shifts in the ISAR image along the azimuth direction and range direction can be expressed as
f r = 2 K r R Δ i c l r f r f a = 2 f c c x k ω l a f s a
Since there is a relationship between the Doppler shift and the distance offset as
Δ R r = c f r 2 k r Δ R a = λ f a 2 ω
Bringing Equation (10) into Equation (11), the position coordinates of the sub-Nyquist sampling jamming signal along the range direction and azimuth direction can be obtained, respectively, in the ISAR image as
Δ R r = R Δ i c l r f s r 2 K r y i c l r f s r 2 K r Δ R a = x i λ l a f s a 2 ω
From Equation (12), it can be seen that the scatterer coordinates of the sub-Nyquist jamming signal have appeared periodically along the range direction and the azimuth direction with the intervals c f s r 2 K r and λ f s a 2 ω ,respectively, and the positions of the different false targets are controlled by l r and l a , respectively.

3. Template Multiplication Modulated/Time-Delay Jamming Signal

The jammer transmits two types of jamming signals during the jamming process: (1) The sub-Nyquist jamming signal; (2) the template multiplication modulated/time-delay jamming signal, which is transmitted by the jammer based on the false target template, as shown in Figure 2. The target is rotating counterclockwise at an angular velocity ω in the equivalent turntable model, and the position of the scatterer in the coordinate system (i.e., in the turntable model) with the target reference point as the origin is x i , y i , while the position of the jammer k is denoted as x k , y k . Meanwhile, the equivalent position of scatterer i in the false template is i x i , y i . The form of the template multiplication modulated/time-delay jamming signal is derived below.

3.1. Template Multiplication Modulated Jamming Signal

According to Equation (12), the sub-Nyquist sampling jamming signal can induce multiple false targets which are identical and equally spaced on the ISAR image. In order to change the shape of the selected false target, the jammer needs to shift the frequency of the intercepted LFM signal and forward it to the radar receiver. The received jamming signal can induce an added scatterer at a specific location on the ISAR image. Assuming that the radar is transmitting an LFM signal, the form of the shift frequency jamming signal should be
s j ( t r , t a ) = r e c t t r T p exp j 2 π f c t r + 1 2 K r t r 2 exp j 2 π Ψ r · 2 K r c t r exp j 2 π Ψ a · 2 ω λ t a
where Ψ r and Ψ a denote the frequency shift parameters along the range and azimuth direction, respectively. These two parameters determine the position of the false target on the ISAR image along the distance and azimuth directions as Ψ r , Ψ a . In order to change the ISAR shape of the false target by adding a point at the desired location, the correspondence between the frequency shift parameters and the point on the false target template should be deduced. The frequency shift parameters Ψ r and Ψ a will be derived below.
The radar receiver receives the template multiplication modulated jamming signal from the jammer in the form of
s j ( t r , t a ) = r e c t t r 2 R k c T p exp j 2 π f c t r 2 R k c + 1 2 k r t r 2 R k c 2 exp j 2 π Ψ r · 2 k r c t r 2 R c c exp j 2 π Ψ a · 2 ω λ t a
where R k refers to the path of the reflected echo from the scatterer k at the point where the jammer is located. Since the radar performs the same processing on the target echo signal and the jamming signal, the reference point echo signal of Equation (6) is used to de-chirp the jamming signal as
s j k f ( t r , t a ) = s j ( t r , t a ) s r e f * ( t r , t a ) = r e c t t r 2 R k c T p exp j 4 π c K r R Δ k t r exp j 4 π f c c R Δ k exp j 4 π c 2 K r R Δ k 2 exp j 2 π Ψ r · 2 k r c t r 2 R k c exp j 2 π Ψ a · 2 ω λ t a
where R Δ k = R k R r e f indicates the distance between the scatterer k at the jammer’s location and the reference center. By performing an FFT transform on the fast-time and the compensating phase term of RVP and the oblique envelope, the HRRP of the jamming signal can be obtained. Considering the M pulse echoes, the HRRP of M pulse echoes are summed and FFT is conducted on the slow-time of the equation. After neglecting the constant phase, the two-dimensional ISAR image of the jamming signal can be obtained as
S j i f ( f r , f a ) = M T p sin c T p f + 2 k r c R Δ + Ψ r sin c f a + j 2 ω λ x k Ψ r 2 k r x k f c c + Ψ a
where the phase term can be neglected as a constant term. It can be seen that the coordinates of the false-target scatterers induced by the received jamming signal along the range and azimuth directions are
Δ R r = R Δ k + Ψ r y k + Ψ r Δ R a = x k Ψ r 2 k r x k f c c + Ψ a
Since the slow time can be regarded as a constant in a single echo, there exists an approximate relationship between the scatterer coordinate and the distance as R Δ k y k .
To induce the scatterers at the specific locations in the ISAR image, the positions of the scatterers, which are induced by the template multiplication modulated jamming signal, should be the same as the added scatterers’ position in the sub-Nyquist sampling jamming signal [28]. Assuming that scatterer i x i , y i needs to be added, and making Equation (17) equal to Equation (14), then the shift frequency of LFM at the jammer can be obtained as
Ψ r = y i y k c l r f s r 2 K r Ψ a = x i x k + Ψ r 2 k r x k f c c λ l a f s a 2 ω
It can be deduced from Equations (17) and (18) that the template multiplication modulated jamming signal can be processed to generate scatterers in the ISAR image at y i c l r f s r 2 K r , x i λ l a f s a 2 ω .

3.2. Time Delay Eliminating Signal

To change the ISAR shape feature of the sub-Nyquist sampling false target, the signal that can eliminate some false target scatterers should be generated in conjunction with the template multiplication modulated jamming signal.
As shown in Figure 2, the real position of the eliminated scatterer in the ISAR image is x i , y i . Assuming that the position of the eliminated scatterer in the fake-target template is x i , y i , it should be the same as the position in the fake-target template for eliminating, i.e., x i , y i = x i , y i .
As the phase change of target motion has been assumed to be compensated, the position of the reference point in the coordinate system, which originates in the radar, is x r e f , y r e f . Therefore, the distance reflected by the real scatterer location i and the jammer location k are denoted by R i and R k , respectively.
R i = x r e f + x i + x k 2 + y r e f + y i + y k 2 R k = x r e f + x k 2 + y r e f + y k 2
Thus, the time difference between the reflected echoes from the jammer location k and the real scatter location i can be expressed as Δ t k i = 2 R i c 2 R k c . Disregarding the jammer hardware delay, when the LFM signal is captured and then forwarded according to the time delay of the false target template, the cancellation signal can be expressed as
s i ( t r , t a ) = r e c t t r Δ t k i T p exp j 2 π f c t r Δ t k i + 1 2 k r t r Δ t k i 2 + π
This signal can eliminate a single false-target scatterer. According to Equation (10), the sub-Nyquist jamming signal induces a series of false targets in the ISAR image identical to the real target and equally spaced. Thus, the cancellation signal should consider the distance between the false targets, and it is necessary to shift frequency along the range direction and the azimuth direction. The cancellation signal can be expressed as
s i ( t r , t a ) = r e c t t r Δ t k i T p exp j 2 π f c t r Δ t k i + 1 2 k r t r Δ t k i 2 + π exp j 2 π l r f s r t r exp j 2 π l a f s a t a
Bringing Δ t k i = 2 R i c 2 R k c into Equation (21), the jamming signal received at the radar receiver can be obtained as
s A i ¯ ( t r , t a ) = r e c t t r 2 R i c T p exp j 2 π f c t r 2 R i c + 1 2 k r t r 2 R i c 2 + π exp j 2 π l r f s r t r exp j 2 π l a f s a t a = s s A i ¯ ( t r , t a ) exp j 2 π l r f s r t r exp j 2 π l a f s a t a
The echo s s A i ¯ ( t r , t a ) has the same amplitude and opposite phase as the real echo returned from scatterer i . After frequency shift along the range and azimuth direction, the sub-Nyquist sampling signal corresponding to the false-target scatterer i can be eliminated.

3.3. Jamming Signal Generation Process

In order for the jamming signal to induce realistic multiple false targets with different shape characteristics on the ISAR image, the jammer needs to transmit three types of jamming signals: sub-Nyquist sampling jamming signals, template multiplication modulated jamming signals and time-delay cancellation signals. The generation process of the jamming signals is shown in Figure 3.

3.3.1. Sub-Nyquist Jamming Signal

Firstly, the jammer intercepts the target-reflected echo of the LFM. Secondly, it needs to determine the sub-Nyquist period according to the false-target number to be presented on the target ISAR image, i.e.,
T s r = n u m s r d r = n u m s r 2 B T s a = n u m s a d a = n u m s a P R T
where B denotes the bandwidth of the radar signal, P R T denotes the pulse repetition period of the radar, d r and d a denote the signal sampling pulses along the range and azimuth direction, respectively, and n u m s r and n u m s a denote the number of false targets along the range and azimuth direction, respectively. When the sub-Nyquist sampling signal pulse width of the jammer is close to that of the radar receiver, the energy amplitude of the multiple false targets will be the same. Therefore, the sub-Nyquist pulse width is set as the same as the radar signal sampling pulse width, which can be calculated by estimating the radar bandwidth.

3.3.2. Template Multiplication Modulated Jamming Signal

It is easy to see from Section 3.1 that when the jammer transmits the jamming signal as in Equation (12), and where the phase-compensated frequency-shift parameters Ψ r and Ψ a have been derived and obtained as in Equation (12), a false target scatter at the corresponding location on the ISAR image will be induced. Equation (12) has more phase terms than Equation (4) as
m t r , t a = exp j 2 π Ψ r · 2 k r c t r exp j 2 π Ψ a · 2 ω λ t a
where λ = c / f c .This is the phase shift for inducing false scatter, which should be generated by the jammer based on a false template. The generation process of phase shift includes the three steps below [27]: (1) Performing a two-dimensional FFT on the false target template. (2) Compensation for frequency-shifted phases. (3) Interval sampling on the compensated template.
Firstly, Performing a two-dimensional FFT on the false target template m r , a . r is the distance profile, and a is the azimuth profile. This false target template is the difference operation between the real-target scatter model A and the false-target scatter model B as
A ¯ = A ( A B ) B ¯ = B ( A B )
where A ¯ and B ¯ denote the scatters of the two templates over each other, respectively. The eliminating scatter point template A ¯ includes the scatter points which need to be eliminated on the ISAR image, and the added scatter point template B ¯ includes the scatter points which needs to be added on ISAR image. They are used as target templates for modification of the ISAR shape features, i.e., m A ¯ r , a and m B ¯ r , a .
Set the pixel of template m r , a as p r × p a , the resolution along the range and azimuth are Δ r and Δ a , respectively, then L r = p r × Δ r represents the range length and L a = p a × Δ a represents the azimuth length. If the center of the template is set as the origin of the ISAR image, the coordinates of the scatter i of the template m r , a on the ISAR image equal to r Δ r L r / 2 , a Δ a L a / 2 . Thus, the false-target template m r , a is transformed by 2-D FFT as
m f r , f a = a = 0 N a 1 r = 0 N r 1 m r , a exp j 2 π f r r / N r exp j 2 π f a a / N a = exp j 2 π f r r / N r exp j 2 π f a a / N a
where 1 f r N r and 1 f a N a . N r is the number of FFT transforms along the range direction, and N a is the number of FFT transforms along the azimuth direction.
Next, Equation (26) is compensated with the frequency-shifted phase by multiplying by a correction matrix H f r , f a which is
H f r , f a = exp j 2 π L r / 2 + y k + c l r f s r 2 K r f r Δ r N r exp j 2 π L a / 2 + x k + λ l a f s a 2 ω 2 K r x k f c c r Δ r L r / 2 y k + c l r f s r 2 K r f a Δ a N a
Then the frequency domain expression of the false template can be obtained as
m h f r , f a = m f r , f a · H f r , f a = exp j 2 π r Δ r L r / 2 y k c l r f s r 2 K r f r Δ r N r exp j 2 π a Δ a L a / 2 x k + λ l a f s a 2 ω + 2 K r x k f c c r Δ r L r / 2 y k c l r f s r 2 K r f a Δ a N a = exp j 2 π Ψ r f r Δ r N r exp j 2 π Ψ a f a Δ a N a
Thirdly, the template m h f r , f a in Equation (28) is processed, sampling with equal intervals as
η r = 2 K r Δ r N r c F s η a = 2 ω Δ a N a λ P R T
where F s represents the sampling rate of the A/D device on the jammer. If the sampling interval is not an integer, linear interpolation can be used to compensate. There is correspondence between the fast time and range profile t r = f r F s , and the correspondence between the fast time and azimuth profile t a = f a P R T . Due to the equal sampling intervals of the templates, the relationship can also be expressed as f r = η r f r , and f a = η a f a . By substituting these relationships in Equation (29), we can obtain
f r Δ r N r = 2 K r t r c f a Δ a N a = 2 ω t a λ
Bringing it into Equation (28), the false template m t r , t a can be obtained, which can be multiplied by the LFM pulse for the template multiplication modulated jamming signal.

3.3.3. Time-Delay Eliminating Signal

Firstly, the comparison between the false-target template and the real-target template is used to calculate the amount of time delay, which can be used for generating the individual-target scatter-cancellation signal. Secondly, the frequency shift is applied to the generated individual-target scatter-cancellation signal, based on the interval between the false targets induced by the sub-Nyquist sampling jamming signal. Finally, the generated jamming signal is transmitted to the radar receiver.
It should be noted that the improved proposed method did not use the ISAR image of the sub-Nyquist sampling false-target directly as a template to generate the time-delay cancellation signal. The cancellation signal is generated by adding shift frequency to the target scatter-cancellation signal.
This can utilize the known jamming signal parameters at the jammer, which can adjust the phases of the time-delay cancellation signal flexibly based on the known sub-Nyquist sampling false-target intervals. Thus, the two types of jamming signals can cooperate, reducing the parameter estimation accuracy and improving the jammer’s efficiency in generating jamming signals.

4. Simulations

The simulation parameters of the radar imaging and the jammer are shown in Table 1. In order to analyze whether the proposed jamming method can generate the sub-Nyquist sampling jamming, as well as the feature-shape changes of the specified false targets, this section adopts the 29-point scatter model as the real-target aircraft (Figure 4a), and the 54-point scatter model as the false-target aircraft (Figure 4b). The red asterisks in Figure 4a,b represent the scatterer of the aircraft. Figure 4c,d show the ISAR images of these two models.
The adding scatter point template (i.e., B ¯ ) and the eliminating scatter point template (i.e., A ¯ ) are obtained by processing the ISAR image of the real target and that of the false target, as shown in Figure 4c,d. These two scatter point templates are used for generating the eliminating scatter point jamming signal and the adding scatter point jamming signal, as shown in Figure 3. These two jamming signals will change the shape of the false target on the ISAR image, which is induced by the sub-Nyquist sampling jamming signal.

4.1. Experiments of Changing Multiple False-Target ISAR Shapes

Based on the theoretical derivation in Section 3, this section analyzes the effect of the sub-Nyquist sampling jamming signal. The echoes of the 29-point scatter model will be sub-Nyquist sampled and forwarded to the radar receiver. The received jamming signal will induce multiple false targets along the range and azimuth directions on the ISAR image. Then the proposed template multiplication modulated/time-delay method can generate a jamming signal to add scatterers, and cancel existing scatterers, to change the target ISAR shape.
Figure 5a shows the ISAR image of sub-Nyquist sampling jamming signal of the real-target reflected echo in the fast-time domains. This jamming signal induces a series of realistic and identical false targets along the range direction. According to the characteristics of the sub-Nyquist sampling jamming signal, the center false target overlaps with the original real target. Figure 5b shows the ISAR image after the jamming signal cancels the center-target scatterer, generated by an improved time-delayed eliminating method. The parameter l r controls the shifted frequency, which corresponds to the sub-Nyquist sampling false target, to perform the scatterer elimination. The center target corresponds to l r = 0 . The first false target on the upper side of the center false target corresponds to l r = 1 . Similarly, the first false target on the lower side of the center false target corresponds to l r = 1 , and so on. Figure 5c shows the ISAR image of the adding scatterer, induced by the improved template multiplication modulated jamming signal, at the position of the center target. Figure 5d shows the ISAR image of the center target after adding and eliminating scatterers. It can be easily seen that the 29-point real target has been changed to the 54-point false target. Figure 5e shows the ISAR image after the first target scatterer is canceled. Figure 5f shows the ISAR image after the first target has added scatterers and eliminated scatterers, and parameters are set as l r = 2 .
Figure 6a shows the ISAR image of the sub-Nyquist sampling jamming signal for the real-target reflected echo in the slow-time domains. This jamming signal induces a series of realistic and identical false targets along the azimuth direction. Figure 6b shows the ISAR image after the jamming signal cancels the center target scatterer, which is generated by an improved time-delayed cancellation method. The parameter l a controls the shifted frequency to perform the scatterer elimination. The center target corresponds to l a = 0 . The first false target on the left side of the center false target corresponds to l a = 1 . Similarly, the first false target on the right side of the center false target corresponds to l a = 1 , and so on. Figure 6c shows the ISAR image of the center target after adding scatterers and eliminating scatterers. Figure 6d shows the ISAR image after the fifth target has added scatterers and eliminated scatterers l a = 2 .
To verify the jamming effect of the sub-Nyquist sampling jamming signal at both fast and slow time domains, Figure 7 shows that the jammer intercepts the target-reflected echo with sub-Nyquist sampling both in fast and slow times and changes the ISAR shape features of the specified false targets. Figure 7a demonstrates that the sub-Nyquist jamming signal induces 3 × 5 realistic false targets with the same energy at equal intervals along the range and azimuth directions. Figure 7b shows the ISAR image after the jamming signal eliminates the scatterer at the specified false target (row 3, column 4), with the parameter l r = 1 and l a = 1 . These parameters control the selected position of the false target as row 3, column 4. Figure 7c shows the ISAR image of the scatterer that needs to be added at the specified location and Figure 7d shows the ISAR image after the shape-change of the specified false target. Thus, the improved jamming method can generate multiple realistic false targets and autonomously change the ISAR shape of the specified false targets.

4.2. Parameter Analysis

The sub-Nyquist jamming signal can induce multiple false targets in the ISAR image, and the number and interval of the false targets can change with the different parameters. At the same time, the pulse parameters will change according to the imaging requirements, which are not controllable by the jammer, such as the radar resolution. Therefore, this section analyzes the jamming effect with different parameters.

4.2.1. The Experiments with Different Sub-Nyquist Periods

Figure 8 shows the effect of changing the false target ISAR shape after sub-Nyquist sampling in the fast-time domain with different sampling periods. In Figure 8a, the sub-Nyquist period along the range direction is set as T s r = 10   ns . Since the sampling pulse width is τ r = 1 / 2 B = 3.33   ns , the multiplicity is expressed as n u m s r = T s r / τ r = 3 , and there are three identically realistic false targets along the range direction. In Figure 8b, the sub-Nyquist period is set as T s r = 16.67   ns , the multiplicity is expressed as n u m s r = 5 , and there are five identically realistic false targets along the range direction. In Figure 8c, the sub-Nyquist period is set as T s r = 23.33   ns , the multiplicity is expressed as n u m s r = 7 , and there are seven identically realistic false targets along the range direction. Thus, the number of false targets can be controlled according to the multiplicity relationship between the sub-Nyquist sampling period and sampling pulse width. Meanwhile, the shape-change parameter is set as l r = 1 , and the ISAR shape of the first false target on the side of the center target can be changed.
Figure 9 below shows the HRRP with different false target numbers along the range direction. It shows that the number of false targets is controlled by the sub-Nyquist period. Corresponding to the three false targets along the azimuth range in Figure 8a, there are also three targets in the HRRP in Figure 9a. When the first target is changed (count from up to down) on the ISAR image in the Figure 8a, the first targets on the right on the HRRP are different from the other targets too. Corresponding to the five false targets along the azimuth range in Figure 8b, there are also five targets in the HRRP in Figure 9b. When the second target is changed (count from up to down) on the ISAR image, the second targets on the right on the HRRP are different from the other targets too. Corresponding to the seven false targets along the azimuth range in Figure 8c, there are also seven targets in the HRRP in Figure 8c. The HRRP results verify that the proposed method can generate multiple false targets and change the shape of the false targets.
Figure 10 shows the effect of changing the false-target ISAR shape after sub-Nyquist sampling in the slow-time domain with different sampling periods. In Figure 10a, the sub-Nyquist period along the azimuth direction is set as T s a = 3   ms . Since the radar’s pulse repetition period is τ a = P R T = 1   ms , the multiplicity exists as n u m s a = T s r / τ r = 3 , and there are three identically realistic false targets along the range direction. In Figure 10b, the sub-Nyquist period is set as T s a = 5   ms , the multiplicity exists as n u m s a = 5 , and there are five identically realistic false targets along the range direction. In Figure 10c, the sub-Nyquist period is set as T s a = 7   ms , the multiplicity exists as n u m s a = 7 , and there are seven identically realistic false targets along the range direction. Thus, the number of false targets can be controlled according to the multiplicity relationship between the sub-Nyquist sampling and the pulse repetition periods. Meanwhile, the shape-change parameter is set as l r = 1 , and the ISAR shape of the first false target on the side of the center target can be changed. As seen in Figure 8 and Figure 9, the proposed method can flexibly alter the false target feature and change the sub-Nyquist periods of fast and slow time.

4.2.2. The Experiments with Different Radar Resolutions

Figure 11 illustrates the jamming effect of jamming signals with different radar resolutions. The radar bandwidth is set to B = 200 / 300 / 600   MHz , the imaging times are set to t = 0.2 / 0.3 / 1   s , and the pulse repetition frequency is set to P R F = 300 . The parameter is set as l r = 1 and l a = 1 to control the shape of false targets in row 3, column 4. From Figure 11a–c, it can be found that with the higher radar resolution, the ISAR images of the sub-Nyquist false targets are clearer, and the altered shape feature of false targets in row 3 and column 4 is clearer too. Therefore, the proposed jamming method applies to radars with different resolutions.

4.2.3. The Experiments with Different Locating Estimation Accuracies

Figure 12 illustrates the jamming effect of eliminating scatterers with different estimating accuracies at different false targets. The locating estimation accuracies are set as R _ error = 0 . 01 % / 0 . 1 % / 0 . 5 % . From Figure 12a–c, with the higher position estimation error, the scatterer elimination of the false targets in row 3 and column 4 is worse, and the shape of the original targets is retained more, while the un-eliminated scatterer in the false targets is not very obvious in comparison with the large size of the overall ISAR image. Thus, a more effective deception can still be achieved by the added scatterers of the false targets.

4.2.4. The Experiments with Different SNRs

In order to verify its robustness, the proposed method is simulated with different SNRs, which is the power ratio between the real target’s echo and white noise. The jammer intercepted the mixed signal of the real target’s echo and white noise, sampled the mixed signal with sub-Nyquist, then forwarded it to the radar receiver. Figure 13 illustrates the jamming effect of eliminating and adding scatterers with different SNRs. The SNRs are set as SNR = 5   dB / 15   dB / 30   dB , respectively. The radar bandwidth is set as B = 200   MHz , and the imaging times were set to t = 0.2 / 0.3 / 1   s . The sub-Nyquist periods are set as T s a = 5   ms , and T s r = 16.67   ns .The parameters are set as l r = 1 and l a = 1 to control the shape of false targets in row 3, column 4. From Figure 12a to Figure 13c, the false targets are submerged on the ISAR image with the higher SNRs, while the shape of the false targets in row 3 and column 4 can also be changed. Thus, a better deception effect can still be achieved by the added scatterers of the false targets.

4.3. The Experiment with Maneuvering Block-Targets

In order to verify the utility of the proposed method for maneuvering block-targets’ echo data, the ISAR image of a Yak-42 aircraft, which owns hundreds of scatterers and varying scattering coefficients, is used as a false-target template in this section, as shown in Figure 14.

4.3.1. The Experiments with Different Radar Resolutions

Figure 15 illustrates the jamming effect of jamming signals with different radar resolutions. The ISAR image of a Yak-42 aircraft is set as the false-target template. The radar bandwidth is set to B = 200 / 300 / 600   MHz , the imaging times are set to t = 0.2 / 0.3 / 1   s , and the pulse repetition frequency is set to P R F = 300 . The parameter is set as l r = 1 and l a = 1 to control the shape of the false targets in row 3, column 4. From Figure 15a–c, it can be found that with the higher radar resolution, the ISAR image of the sub-Nyquist false targets is clearer, and the altered shape feature of the false targets in row 3 and column 4 is clearer too. Therefore, the proposed jamming method applies to the real-target template with different radar resolutions.

4.3.2. The Experiments with Different SNRs

Figure 16 illustrates the jamming effect of eliminating and adding scatterers with different SNRs. The SNRs are set as SNR = 2   dB / 5   dB / 10   dB , respectively. The radar bandwidth is set to B = 200   MHz , and the imaging times were set to t = 0.2 / 0.3 / 1   s . The sub-Nyquist period is set as T s a = 5   ms , T s r = 16.67   ns .The parameter is set as l r = 1 and l a = 1 to control the shape of the false targets in row 3, column 4. From Figure 16a–c, the false targets are submerged on the ISAR image with the higher SNRs, while the shape of the false targets in row 3 and column 4 can also be changed. Thus, a better deception effect can still be achieved as long as the SNR does not exceed 30   dB .

5. Conclusions

This article proposes a multiple-false-target deception method based on the sub-Nyquist sampling theory and template multiplication modulated time-delay method. This article improved the existing method based on the sub-Nyquist sampling jamming signal by deriving the frequency-shift relationship of the false-target template in detail. Compared with the existing methods, multiple false targets with different shapes will be induced on the ISAR images. As long as the position of the scatterers corresponding to the sub-Nyquist false targets can be accurately determined and the false targets’ shapes can be changed. Meanwhile, the proposed jamming method will alter the number of false targets along the range and azimuth directions. Additionally, the resolution of false targets on ISAR images will adaptively change with different radar resolutions.

Author Contributions

Y.-X.L. proposed the method and designed the experiments; Y.-X.L. and Q.Z. coordinated reading, analyzing and categorizing the articles reviewed in this study; Y.-X.L. and S.-C.X. performed the experiments, analyzed the data and wrote the manuscript; H.Y., H.-B.W. and Y.L. revised the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant No. 62131020 and No. 62301599.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Du, L.; Su, G. Adaptive inverse synthetic aperture radar imaging for nonuniformly moving targets. IEEE Geosci. Remote Sens. Lett. 2005, 2, 247–249. [Google Scholar] [CrossRef]
  2. Tian, B.; Liu, Y.; Hu, P.; Wu, W.; Xu, S.; Chen, Z. Review of high-resolution imaging techniques of wideband inverse synthetic aperture radar. J. Radars 2020, 9, 765–802. [Google Scholar]
  3. Xue, R.H.; Bai, X.R.; Cao, X.Y.; Zhou, F. Sequential ISAR Target Classification Based on Hybrid Transformer. IEEE Trans. Geosci. Remote Sens. 2022, 60, 1–11. [Google Scholar] [CrossRef]
  4. Pan, X.; Wang, W.; Feng, D.; Liu, Y.; Fu, Q.; Wang, G. On deception jamming for countering bistatic ISAR based on sub-Nyquist sampling. IET Radar Sonar Navig. 2014, 8, 173–179. [Google Scholar] [CrossRef]
  5. Shi, Q.; Huang, J.; Xie, T.; Wang, C.; Yuan, N. An Active Jamming Method Against ISAR Based on Periodic Binary Phase Modulation. IEEE Sens. J. 2019, 19, 7950–7960. [Google Scholar] [CrossRef]
  6. Roome, J.S. Digital radio frequency memory. Electron. Commun. Eng. J. 1990, 2, 147–153. [Google Scholar] [CrossRef]
  7. Huang, H.; Pan, H.H.; Gong, S.F. Estimating and calibrating the response of multiple wideband digital radio frequency memories in a hardware-in-the-loop system using shuffled frog leaping algorithm. IET Radar Sonar Navig. 2016, 10, 827–833. [Google Scholar] [CrossRef]
  8. Pace, P.E.; Fouts, D.J.; Ekestorm, S.; Karow, C. Digital false-target image synthesiser for countering ISAR. IEE Proc. Radar Sonar Navig. 2002, 149, 248–257. [Google Scholar] [CrossRef]
  9. Shahid, M.; Aqdas, N.M.; Ijaz, M.Q.; Muhammad, Z.U.K.; Fawad, Z. A Novel Deceptive Jamming Approach for Hiding Actual Target and Generating False Targets. Wirel. Commun. Mob. Comput. 2021, 2021, 8844630. [Google Scholar] [CrossRef]
  10. Zaman, F.; Akhtar, Z.; Mehmood, S.; Akbar, S.; Phanomchoeng, G. A Novel FDA-MIMO Deceptive Jamming Method for Neutralizing Phased Array Radar. IEEE Access 2023, 11, 90449–90458. [Google Scholar] [CrossRef]
  11. Wu, Q.; Liu, X.; Xu, Z.; Zhao, F.; Gu, Z.; Xiao, S. Flexible blanket synthetic aperture radar jamming using joint frequency and phase modulation. IET Radar Sonar Navig. 2023, 17, 1129–1141. [Google Scholar] [CrossRef]
  12. Feng, D.; Tao, H.; Yang, Y.; Liu, Z. Jamming de-chirping radar using interrupted-sampling repeater. Sci. China-Inf. Sci. 2011, 54, 2138–2146. [Google Scholar] [CrossRef]
  13. Li, C.-Z.; Su, W.-M.; Gu, H.; Ma, C.; Chen, J.-L. Improved Interrupted Sampling Repeater Jamming Based on DRFM. In Proceedings of the 2014 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Guilin, China, 5–8 August 2014. [Google Scholar]
  14. Li, J.; Duan, X.; Li, J.; Bai, P. Interrupted-Sampling and Non-Uniform Periodic Repeater Jamming against mDT-STAP System. Electronics 2023, 12, 152. [Google Scholar] [CrossRef]
  15. Sun, Z.Z.; Qian, Y.H.; Liu, Z.X. A Non-Uniform Interrupted-Sampling Repeater Jamming Method for Intra-Pulse Frequency Agile Radar. Remote Sens. 2023, 15, 1851. [Google Scholar] [CrossRef]
  16. Xiong, W.; Zhang, G.; Liu, W. Efficient filter design against interrupted sampling repeater jamming for wideband radar. EURASIP J. Adv. Signal Process. 2017, 2017, 9. [Google Scholar] [CrossRef]
  17. He, X.; Liao, K.; Peng, S.; Tian, Z.; Huang, J. Interrupted-Sampling Repeater Jamming-Suppression Method Based on a Multi-Stages Multi-Domains Joint Anti-Jamming Depth Network. Remote Sens. 2022, 14, 3445. [Google Scholar] [CrossRef]
  18. Almslmany, A.; Wang, C.Y.; Cao, Q.S. Advanced Deceptive Jamming Model Based on DRFM Sub-Nyquist Sampling. In Proceedings of the 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 12–16 January 2016. [Google Scholar]
  19. Wang, W.; Pan, X.Y.; Liu, Y.C.; Feng, D.J.; Fu, Q.X. Sub-Nyquist Sampling Jamming Against ISAR With Compressive Sensing. IEEE Sens. J. 2014, 14, 3131–3136. [Google Scholar] [CrossRef]
  20. Pan, X.; Liu, J.; Chen, J.; Xie, Q.; Ai, X. Sub-Nyquist Sampling Jamming Against Chirp-ISAR With CS-D Range Compression. IEEE Sens. J. 2018, 18, 1140–1149. [Google Scholar] [CrossRef]
  21. Li, G.M.; Zhang, Q.; Su, L.H.; Luo, Y.; Liang, J. A Digital False-Target Image Synthesizer Method Against ISAR Based on Polyphase Code and Sub-Nyquist Sampling. IEEE Geosci. Remote Sens. Lett. 2020, 17, 372–376. [Google Scholar] [CrossRef]
  22. Tai, N.; Wang, Y.; Han, H.; Xu, X.; Wang, C.; Zeng, Y.; Wang, L. Deception Jamming Against ISAR Based on Convolution and Sub-Nyquist Sampling. IEEE Sens. J. 2020, 20, 1807–1820. [Google Scholar] [CrossRef]
  23. Tai, N.; Lin, H.; Wei, C.; Lu, Y.; Wang, C.; Cui, K. A Wideband Real-Time Deception Jamming Method for Countering ISAR Based on Parallel Convolution. IEEE Sens. J. 2019, E103B, 609–617. [Google Scholar] [CrossRef]
  24. Garcia-Fernandez, A.F.; Yeste-Ojeda, O.A.; Grajal, J. Facet Model of Moving Targets for ISAR Imaging and Radar Back-Scattering Simulation. IEEE Trans. Aerosp. Electron. Syst. 2010, 46, 1455–1467. [Google Scholar] [CrossRef]
  25. Zhang, F.L.; Shao, Y.; Wan, Z.; Zhang, X. Interpretation of buildings in high resolution sar images based on electromagnetic method. In Proceedings of the 2010 IEEE International Geoscience and Remote Sensing Symposium, Honolulu, HI, USA, 25–30 July 2010. [Google Scholar]
  26. Bo, Z.; Zhou, F.; Shi, X.R.; Wu, Q.S.; Zheng, B. Multiple Targets Deception Jamming Against ISAR Using Electromagnetic Properties. IEEE Sens. J. 2015, 15, 2031–2038. [Google Scholar] [CrossRef]
  27. Xu, L.T.; Feng, D.J.; Pan, X.Y.; Liu, Q.; Wang, X.S. An Improved Digital False-Target Image Synthesizer Method for Countering Inverse Synthetic Aperture Radar. IEEE Sens. J. 2015, 15, 5870–5877. [Google Scholar] [CrossRef]
  28. Liu, Y.X.; Zhang, Q.; Xiong, S.C.; Ni, J.C.; Wang, D.; Wang, H.B. An ISAR Shape Deception Jamming Method Based on Template Multiplication and Time Delay. Remote Sens. 2023, 15, 2762. [Google Scholar] [CrossRef]
  29. Zhao, B.; Huang, L.; Li, B.; Liu, S.Q.; Bao, W.M. One-bit splitting deceptive jamming against SAR. Def. Technol. 2022, 10, 18. [Google Scholar] [CrossRef]
  30. Chen, C.C.; Candrews, H. Target-Motion-Induced Radar Imaging. IEEE Trans. Aerosp. Electron. Syst. 1980, 16, 2–14. [Google Scholar] [CrossRef]
Figure 1. ISRJ signal and sub-Nyquist sampling jamming signal.
Figure 1. ISRJ signal and sub-Nyquist sampling jamming signal.
Remotesensing 15 05015 g001
Figure 2. Jamming signal model.
Figure 2. Jamming signal model.
Remotesensing 15 05015 g002
Figure 3. The generation process of the jamming signals.
Figure 3. The generation process of the jamming signals.
Remotesensing 15 05015 g003
Figure 4. The models and ISAR images of the real target and false target: (a) the model of the real target (29 points); (b) the model of the false target (54 points); (c) the ISAR image of the real target; and (d) the ISAR image of the false target.
Figure 4. The models and ISAR images of the real target and false target: (a) the model of the real target (29 points); (b) the model of the false target (54 points); (c) the ISAR image of the real target; and (d) the ISAR image of the false target.
Remotesensing 15 05015 g004
Figure 5. The ISAR images of the shape-changed jamming signal along the range direction: (a) the ISAR image of sub-Nyquist sampling jamming signal; (b) the ISAR image after eliminating scatterers with l r = 0 ; (c) the ISAR image of added scatterers with l r = 0 ; (d) the ISAR image after eliminating and adding scatterers with l r = 0 ; (e) the ISAR image after eliminating scatterers with l r = 2 ; and (f) the ISAR image after eliminating and adding scatterers with l r = 2 .
Figure 5. The ISAR images of the shape-changed jamming signal along the range direction: (a) the ISAR image of sub-Nyquist sampling jamming signal; (b) the ISAR image after eliminating scatterers with l r = 0 ; (c) the ISAR image of added scatterers with l r = 0 ; (d) the ISAR image after eliminating and adding scatterers with l r = 0 ; (e) the ISAR image after eliminating scatterers with l r = 2 ; and (f) the ISAR image after eliminating and adding scatterers with l r = 2 .
Remotesensing 15 05015 g005aRemotesensing 15 05015 g005b
Figure 6. The ISAR images of the shape-changed jamming signal along the azimuth direction: (a) the ISAR image of the sub-Nyquist sampling jamming signal; (b) the ISAR image after eliminating scatterers with l a = 0 ; (c) the ISAR image after eliminating and adding scatterers with l a = 0 ; and (d) the ISAR image after eliminating and adding scatterers with l a = 2 .
Figure 6. The ISAR images of the shape-changed jamming signal along the azimuth direction: (a) the ISAR image of the sub-Nyquist sampling jamming signal; (b) the ISAR image after eliminating scatterers with l a = 0 ; (c) the ISAR image after eliminating and adding scatterers with l a = 0 ; and (d) the ISAR image after eliminating and adding scatterers with l a = 2 .
Remotesensing 15 05015 g006aRemotesensing 15 05015 g006b
Figure 7. The ISAR images of the shape-changed jamming signal with l r = 1 and l a = 1 : (a) the ISAR image of the sub-Nyquist sampling jamming signal; (b) the ISAR image after eliminating scatterers; (c) the ISAR image of added scatterers; and (d) the ISAR image after eliminating and adding scatterers.
Figure 7. The ISAR images of the shape-changed jamming signal with l r = 1 and l a = 1 : (a) the ISAR image of the sub-Nyquist sampling jamming signal; (b) the ISAR image after eliminating scatterers; (c) the ISAR image of added scatterers; and (d) the ISAR image after eliminating and adding scatterers.
Remotesensing 15 05015 g007aRemotesensing 15 05015 g007b
Figure 8. The ISAR images with different fast-time sub-Nyquist periods: (a) T s r = 10   ns ; and (b) T s r = 16.67   ns ; (c) T s r = 23.33   ns .
Figure 8. The ISAR images with different fast-time sub-Nyquist periods: (a) T s r = 10   ns ; and (b) T s r = 16.67   ns ; (c) T s r = 23.33   ns .
Remotesensing 15 05015 g008
Figure 9. The HRRP with different fast-time sub-Nyquist periods: (a) T s r = 10   ns ; (b) T s r = 16.67   ns ; and (c) T s r = 23.33   ns .
Figure 9. The HRRP with different fast-time sub-Nyquist periods: (a) T s r = 10   ns ; (b) T s r = 16.67   ns ; and (c) T s r = 23.33   ns .
Remotesensing 15 05015 g009
Figure 10. The ISAR images with different slow-time sub-Nyquist periods: (a) T s a = 3   ms ; and (b) T s a = 5   ms ; (c) T s a = 7   ms .
Figure 10. The ISAR images with different slow-time sub-Nyquist periods: (a) T s a = 3   ms ; and (b) T s a = 5   ms ; (c) T s a = 7   ms .
Remotesensing 15 05015 g010
Figure 11. The ISAR images with different radar resolutions: (a) B = 200   MHz , t = 0.2   s ; (b) B = 300   MHz , t = 0.3   s ; and (c) B = 600   MHz , t = 1   s .
Figure 11. The ISAR images with different radar resolutions: (a) B = 200   MHz , t = 0.2   s ; (b) B = 300   MHz , t = 0.3   s ; and (c) B = 600   MHz , t = 1   s .
Remotesensing 15 05015 g011
Figure 12. The ISAR image with different locating estimation accuracies: (a) R _ error = 0 . 01 % ; (b) R _ error = 0 . 1 % ; and (c) R _ error = 0 . 5 % .
Figure 12. The ISAR image with different locating estimation accuracies: (a) R _ error = 0 . 01 % ; (b) R _ error = 0 . 1 % ; and (c) R _ error = 0 . 5 % .
Remotesensing 15 05015 g012
Figure 13. The ISAR images with different SNRs: (a) SNR = 5   dB ; (b) SNR = 15   dB ; and (c) SNR = 30   dB .
Figure 13. The ISAR images with different SNRs: (a) SNR = 5   dB ; (b) SNR = 15   dB ; and (c) SNR = 30   dB .
Remotesensing 15 05015 g013
Figure 14. The ISAR image of a Yak-42 aircraft.
Figure 14. The ISAR image of a Yak-42 aircraft.
Remotesensing 15 05015 g014
Figure 15. The ISAR images of jamming signals with different radar resolutions: (a) t = 0.2   s , B = 200   MHz ; (b) t = 0.3   s , B = 300   MHz ; and (c) t = 1   s , B = 600   MHz .
Figure 15. The ISAR images of jamming signals with different radar resolutions: (a) t = 0.2   s , B = 200   MHz ; (b) t = 0.3   s , B = 300   MHz ; and (c) t = 1   s , B = 600   MHz .
Remotesensing 15 05015 g015
Figure 16. The ISAR images with different SNRs: (a) SNR = 5   dB ; (b) SNR = 15   dB ; and (c) SNR = 30   dB .
Figure 16. The ISAR images with different SNRs: (a) SNR = 5   dB ; (b) SNR = 15   dB ; and (c) SNR = 30   dB .
Remotesensing 15 05015 g016
Table 1. Simulation parameters of radar and jammer.
Table 1. Simulation parameters of radar and jammer.
ParametersNumerical ValueParametersNumerical Value
f 0 GHz 10 PRF Hz 200
B MHz 300 ω rad 0.03
τ r ns 3.33 τ a ms 1
T p μ s 1 α rad 0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Y.-X.; Zhang, Q.; Xiong, S.-C.; Wang, H.-B.; Yuan, H.; Luo, Y. A Multiple-False-Target ISAR Shape Deception Jamming Method Based on Improved Template Multiplication Modulated Time-Delay Algorithm and Sub-Nyquist Sampling. Remote Sens. 2023, 15, 5015. https://doi.org/10.3390/rs15205015

AMA Style

Liu Y-X, Zhang Q, Xiong S-C, Wang H-B, Yuan H, Luo Y. A Multiple-False-Target ISAR Shape Deception Jamming Method Based on Improved Template Multiplication Modulated Time-Delay Algorithm and Sub-Nyquist Sampling. Remote Sensing. 2023; 15(20):5015. https://doi.org/10.3390/rs15205015

Chicago/Turabian Style

Liu, Ying-Xi, Qun Zhang, Shi-Chao Xiong, Hao-Bo Wang, Hang Yuan, and Ying Luo. 2023. "A Multiple-False-Target ISAR Shape Deception Jamming Method Based on Improved Template Multiplication Modulated Time-Delay Algorithm and Sub-Nyquist Sampling" Remote Sensing 15, no. 20: 5015. https://doi.org/10.3390/rs15205015

APA Style

Liu, Y. -X., Zhang, Q., Xiong, S. -C., Wang, H. -B., Yuan, H., & Luo, Y. (2023). A Multiple-False-Target ISAR Shape Deception Jamming Method Based on Improved Template Multiplication Modulated Time-Delay Algorithm and Sub-Nyquist Sampling. Remote Sensing, 15(20), 5015. https://doi.org/10.3390/rs15205015

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop