CN115951312A - Cooperative anti-deception jamming method, device and equipment based on double-base radar - Google Patents

Cooperative anti-deception jamming method, device and equipment based on double-base radar Download PDF

Info

Publication number
CN115951312A
CN115951312A CN202211162657.9A CN202211162657A CN115951312A CN 115951312 A CN115951312 A CN 115951312A CN 202211162657 A CN202211162657 A CN 202211162657A CN 115951312 A CN115951312 A CN 115951312A
Authority
CN
China
Prior art keywords
isar image
radar
echo signal
target
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211162657.9A
Other languages
Chinese (zh)
Inventor
胡杰民
陈锡清
李鑫
滕俊鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Leixiang Electronic Technology Co ltd
Original Assignee
Hunan Leixiang Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Leixiang Electronic Technology Co ltd filed Critical Hunan Leixiang Electronic Technology Co ltd
Priority to CN202211162657.9A priority Critical patent/CN115951312A/en
Publication of CN115951312A publication Critical patent/CN115951312A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Radar Systems Or Details Thereof (AREA)

Abstract

The application relates to a cooperative anti-deception jamming method and device based on a bistatic radar and computer equipment. The method comprises the following steps: after a detection signal is transmitted to a target by one of the bistatic radars, an echo signal received by the radar transmitting the detection signal is a first echo signal, an echo signal received by the other radar is a second echo signal, ISAR imaging is respectively carried out on the first echo signal and the second echo signal to obtain a first ISAR image and a second ISAR image, the second ISAR image is rotated according to the difference value of two radar imaging angles to enable the scattering center of the second ISAR image to be consistent with the first ISAR image, a second rotated ISAR image is obtained, two-dimensional correlation filtering is carried out according to the first ISAR image and the second rotated ISAR image to obtain a correlation coefficient, and finally whether the echo signal is an interference signal transmitted by the interference target is judged according to the correlation coefficient and a preset threshold. By adopting the method, the real target and the interference target can be simply and quickly identified.

Description

Cooperative anti-deception jamming method, device and equipment based on double-base radar
Technical Field
The application relates to the technical field of radar deception jamming resistance, in particular to a cooperative deception jamming resistance method and device based on a double-base radar and computer equipment.
Background
Radar interference resistance is one of the core problems facing radar detection in battlefield environments. Compared with the suppression type interference, the deceptive interference can simulate false echoes according to the transmitting signals by receiving the transmitting signals of the radar, send out the false echoes through the jammer so that the radar receives the false signals, and complete the deceptive interference on an enemy radar system under the condition of no awareness. The performance of the traditional single radar is sharply reduced when the traditional single radar faces the deceptive jamming, so that the mode of using the multi-base radar to resist the deceptive jamming is widely concerned by numerous scholars, and the principle is that the multi-base radar obtains information such as the direction, the distance, the echo signal and the like of a target relative to each radar through detection, and shares the echo information received by each radar, so that the anti-jamming capability of a radar system is greatly improved.
The existing cooperative anti-interference methods are divided into two categories: data level co-spoof interference resistance and signal level co-spoof interference resistance. The data level cooperation means that each radar independently completes target detection to obtain target track or track information, and then utilizes the point track or track information to fuse and resist interference, so that the method has the advantage of small data transmission quantity, but the available information is limited. Compared with data level cooperation anti-interference, the signal level cooperation carries out joint processing on echo signals of all radars to realize anti-interference, and the method has the characteristics of large transmission information amount, high algorithm complexity and the like. The existing signal level cooperation technology comprises the steps of identifying a target and interference through the difference of slow time envelope correlation coefficients among different radars; an adaptive threshold is further designed according to the misjudgment probability; interference identification is carried out by utilizing the amplitude ratio of different radar single pulse echoes, so that the real-time performance of an anti-interference algorithm is improved. In addition, in order to improve the target detection capability, in the prior art, distributed echo joint detection and anti-interference are combined, and a target detection identification method based on a generalized likelihood ratio is explored.
Disclosure of Invention
In view of the foregoing, there is a need to provide a cooperative anti-spoofing interference method, apparatus and computer device based on dual-base radar, which can quickly discriminate the target and the interference.
A cooperative anti-spoofing interference method based on bistatic radar, the method comprising:
acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, wherein the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
determining a rotation angle according to a difference value of two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable a scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
performing two-dimensional correlation filtering according to the first ISAR image and the second rotary ISAR image to obtain a correlation coefficient;
and judging whether the echo signal is an interference signal transmitted by an interference target or not according to the correlation coefficient and a preset judgment threshold value.
In one embodiment, the rotating the second ISAR image according to the rotation angle to make the scattering center of the second ISAR image consistent with the first ISAR image and obtaining a second rotated ISAR image includes:
and performing continuous three-time one-dimensional signal difference calculation on the second ISAR image according to the rotation angle to obtain the second rotation ISAR image.
In one embodiment, the one-dimensional signal difference calculation is performed by fast fourier transform.
In one embodiment, the determining, according to the correlation coefficient and a preset determination threshold, whether the echo signal is an interference signal transmitted by an interference target includes:
if the correlation coefficient is larger than the judgment threshold, the echo signal is the echo signal after the real target is reflected
And if the correlation coefficient is smaller than the judgment threshold, the echo signal is an interference signal transmitted by an interference target.
In one embodiment, the target is a ship.
In one embodiment, the judgment threshold is set according to the length, the width and the rotation angle of the ship target.
A cooperative anti-spoofing interference apparatus based on bistatic radar, the apparatus comprising:
the signal acquisition module is used for acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
the ISAR image imaging module is used for respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
the ISAR image rotation module is used for determining a rotation angle according to a difference value of two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable a scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
the two-dimensional correlation filtering module is used for performing two-dimensional correlation filtering according to the first ISAR image and the second rotation ISAR image to obtain a correlation coefficient;
and the interference target judging module is used for judging whether the echo signal is an interference signal transmitted by an interference target according to the correlation coefficient and a preset judging threshold.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, wherein the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
determining a rotation angle according to the difference value of the two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable the scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
performing two-dimensional correlation filtering according to the first ISAR image and the second rotary ISAR image to obtain a correlation coefficient;
and judging whether the echo signal is an interference signal transmitted by an interference target or not according to the correlation coefficient and a preset judgment threshold value.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, wherein the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
determining a rotation angle according to the difference value of the two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable the scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
performing two-dimensional correlation filtering according to the first ISAR image and the second rotary ISAR image to obtain a correlation coefficient;
and judging whether the echo signal is an interference signal transmitted by an interference target or not according to the correlation coefficient and a preset judgment threshold value.
According to the cooperative anti-deception jamming method, the cooperative anti-deception jamming device and the computer equipment based on the bistatic radar, after a detection signal is transmitted to a target by one radar in the bistatic radar, an echo signal received by the radar transmitting the detection signal is a first echo signal, an echo signal received by the other radar is a second echo signal, ISAR imaging is respectively carried out on the first echo signal and the second echo signal to obtain a first ISAR image and a second ISAR image, a rotation angle is determined according to a difference value of two radar imaging angles, the second ISAR image is rotated according to the rotation angle to enable a scattering center of the second ISAR image to be consistent with the first ISAR image, a second rotation ISAR image is obtained, two-dimensional correlation filtering is carried out according to the first ISAR image and the second rotation ISAR image to obtain a correlation coefficient, and finally whether the echo signal is a jamming signal transmitted by the jamming target is judged according to the correlation coefficient and a preset threshold. By adopting the method, the real target and the interference target can be simply and quickly identified, and the anti-interference performance of the double-base radar is further improved.
Drawings
FIG. 1 is a schematic flow chart of a cooperative anti-spoofing interference method based on bistatic radar in one embodiment;
FIG. 2 is a schematic diagram of the spatial distribution of bistatic radar ISAR imaging in one embodiment;
FIG. 3 is a schematic diagram illustrating a geometric relationship comparison of bistatic radar imaging in an embodiment, where FIG. 3 (a) is a schematic diagram illustrating imaging geometric relationship of radar 1 and FIG. 3 (b) is a schematic diagram illustrating imaging geometric relationship of radar 2;
FIG. 4 is a diagram illustrating the implementation of convolution in the frequency domain in one embodiment;
FIG. 5 is a schematic diagram of a rectangular rotation in one embodiment;
FIG. 6 is a schematic diagram of an algorithm flow for the present method in one embodiment;
FIG. 7 is a schematic diagram of a scattering model of a target point in a simulation experiment;
FIG. 8 is an ISAR image of an echo of a radar 1 in a simulation experiment;
fig. 9 is an echo ISAR image of the radar 2 in the simulation experiment, in which fig. 9 (a) is an echo ISAR image of a target, and fig. 9 (b) is an echo ISAR image of an interference;
fig. 10 is an echo ISAR image after the radar 2 is rotated in the simulation experiment, in which fig. 10 (a) is an image after the echo ISAR image of the target is rotated, and fig. 10 (b) is an image after the echo ISAR image of the interference is rotated;
fig. 11 is a diagram illustrating the result of the correlation filtering in the simulation experiment, in which fig. 11 (a) is a diagram illustrating the result of the correlation filtering of the target, and fig. 11 (b) is a diagram illustrating the result of the correlation filtering of the interference;
FIG. 12 is a diagram illustrating the results of multi-rotation angle dependent filtering in a simulation experiment;
FIG. 13 is a block diagram of a cooperative anti-spoofing interference device based on bistatic radar in one embodiment;
FIG. 14 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
As shown in fig. 1, a cooperative anti-spoofing interference method based on bistatic radar is provided, which includes the following steps:
step S100, acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, wherein the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
step S110, respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
step S120, determining a rotation angle according to the difference value of the two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable the scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
step S130, performing two-dimensional correlation filtering according to the first ISAR image and the second rotation ISAR image to obtain a correlation coefficient;
step S140, determining whether the echo signal is an interference signal transmitted by the interference target according to the correlation coefficient and a preset determination threshold.
In step S100, the spatial scene of cooperative detection by the bistatic radar is shown in fig. 2. In this embodiment, the cooperative detection adopts a "one-shot two-shot" signal system, that is, the radar 1 transmits radar signals, and the reflected echoes are received by the radar 1 and the radar 2, for the sake of simplicity, it is assumed that the two radars are at the same height, and the corresponding pitch angle is β, and here, only the difference of azimuth angles of the radar lines of sight is considered, and they are respectively marked as α 1 And alpha 2 . The origin O of the object specimen coordinate system OXY is positioned at the center of mass of the object, the OY axis points to any determined direction in the imaging plane, and the OX axis is in the imaging plane and is vertical to the OY axis.
On the basis of the scattering point model and the plane wave assumption, let the number of scattering points on the object be q, and the position of the ith scattering point in the local coordinate system in fig. 2 be (x) i ,y i ),x i Is the abscissa, y, of the scattering point i i Is the ordinate of the scattering point i. And assuming that the translation of the target is effectively compensated, the imaging of the compensated target is equivalent to a turntable model. The geometrical relationship of two radars to the imaging of the target by the rotating table is shown in FIG. 3, wherein X fr Indicating the direction, Y, corresponding to the distance resolution of the current radar imaging result fa Indicating the Doppler resolution corresponding direction of the current radar imaging result. It can be seen that for radar sensors with different orientations, the difference of radar line of sight (LOS) causes a certain viewing angle difference between the distance orientation and the orientation of the target.
Assume that the chirp signal transmitted by the radar 1 is as shown in the following equation:
Figure SMS_1
in the formula (1), t r For the distance to the fast time, T p For emitting pulse width, gamma for modulating frequency of signal, f c For a signal carrier frequency, t is the full time, t = t r +t m ,t m For slow times, rect (-) represents a rectangular window function.
And echo signals received by the two radars are represented as a set of signals of each scattering point, and after frequency mixing, the signals are:
Figure SMS_2
in the formula (2), σ i Representing the intensity of the echo signal, f the instantaneous frequency, mu i Signal delay for the ith scattering point:
Figure SMS_3
in the formula (3), c is the speed of light, R i (t m ) I.e. the time history of the electromagnetic wave, the distance can be approximated as:
R i (t m )≈r a -[x i cos(ωt m )-y i sin(ωt m )] (4)
in the formula (4), r a Is the distance of the radar from the reference center.
In step S110, for the target RD image (the RD image is an ISAR image imaged by using RD (Range Doppler) algorithm), the radar 1 and the radar 2 respectively perform the following processes of dechirping, removing Range images of the RVP term and the envelope oblique term, and performing the translation processing:
Figure SMS_4
Figure SMS_5
wherein formula (5) represents a first ISAR image, formula (6) represents a second ISAR image, and in formula (5) and formula (6), T a To observe the length of the time window, R s As reference distance, f a Is the azimuth frequency, f r Is the range frequency. (x) 1i ,y 1i ),(x 2i ,y 2i ) The scattering point position coordinates under the imaging coordinate systems of the radar 1 and the radar 2 are respectively, namely:
Figure SMS_6
in formula (7), Δ α = α 21 Is the imaging angle difference of the radar 1 and the radar 2. Due to the difference in resolution between the horizontal and vertical coordinates, the position in the ISAR image is modulated by the resolution. The scattering points in equation (5) and company (6) are represented as sinc functions of the corresponding cells, and the two-dimensional resolution of the ISAR image can be derived from equation (9):
Figure SMS_7
in equation (8), B is the signal bandwidth, the range resolution
Figure SMS_8
Orientation resolution pick>
Figure SMS_9
Δθ=ωT a Expressed as the total rotation angle of the imaging process, and λ is the signal wavelength.
Because the target echo has azimuth sensitivity, and the interference machine radiation echo has the characteristic of isotropy, based on the echo spatial correlation difference, in this document, a bistatic radar anti-interference method for performing correlation filtering on ISAR images obtained by two radars is provided. Due to the pulse compression gain and the Doppler accumulation gain, the radar two-dimensional image has a higher signal-to-noise ratio than a slow-time complex envelope or a single pulse echo. Therefore, interference discrimination in the radar two-dimensional image domain has a more robust effect. The echo correlation difference between the target and the interference is introduced from different radar incidence directions and is reflected on the time domain characteristics and the frequency domain characteristics of echo signals: the two-dimensional imaging results of the target have different visual angles, interference two-dimensional imaging is obtained by modulating electromagnetic waves, and the two-dimensional imaging results under different visual angles are completely consistent.
Specifically, under the observation of the radar 1, the position coordinate of a certain scattering center in the imaging coordinate system of the radar 1 is (x) 1i ,y 1i ) The corresponding distance unit and orientation unit are respectively
Figure SMS_10
Under the observation of the radar 2, the position coordinate of a certain scattering center in the imaging coordinate system of the radar 1 is (x) 2i ,y 2i ) The corresponding distance unit and orientation unit are respectively
Figure SMS_11
According to the formula (8), (x) is obtained 1i ,y 1i ),(x 2i ,y 2i ) Further deriving the rotation of the location of the scattering center in the ISAR image can be expressed as:
Figure SMS_12
the ISAR images of radar 1 and radar 2 can thus be obtained by means of a rotation matrix H (Δ α):
Figure SMS_13
for an ISAR image with a difference between the distance and lateral distance dimensions, the following equation can be obtained by decomposing H (Δ α):
H(Δα)=U R (Δα)D A (Δα)U R (Δα) (11)
in the formula (11), U R (Δα),D A (Δ α) eachIndicating lateral and longitudinal offsets, i.e.
Figure SMS_14
Figure SMS_15
/>
Through the above matrix decomposition, in step S120, the process of rotating the second ISAR image may be decomposed into three consecutive one-dimensional signal difference calculations performed on the second ISAR image according to the rotation angle, so as to obtain a second rotated ISAR image. In this embodiment, the one-dimensional signal difference calculation is implemented by fast fourier transform.
Specifically, the whole second ISAR image rotation process is decomposed into a one-dimensional signal translation sequence, and these translation transformations can be implemented by simple convolution operations, and can be implemented by fourier transformation as shown in fig. 4 in the frequency domain.
When the radar 2 detects a target, the ISAR image is rotated by Δ α to obtain the following formula:
Figure SMS_16
due to SC after rotation RD2 (f r ,f a ) ' the strong scattering center has already been changed from the original (x) 2i ,y 2i ) Rotate to (x) 1i ,y 1i ) I.e. the position f of the scattering center in the image r ,f a Consistent, and therefore very high, correlation, is two-dimensionally correlated with equation (5), i.e., the first ISAR image,
Figure SMS_17
representing a convolution, then the correlation coefficient R 12 Can be expressed as:
Figure SMS_18
when the first ISAR image matches the second ISAR image in the convolution process, then:
Figure SMS_19
at this time, a large peak energy can be obtained.
And when the detected target is active interference, the echo signal of the radar 2 can be expressed as:
Figure SMS_20
after rotation, the following can be obtained:
Figure SMS_21
due to, SC after rotation RD2 (f r ,f a ) ' Medium-intensity scatter Point and SC RD1 (f r ,f a ) The position of the strong scattering point in the (first ISAR image) is inconsistent and mismatch occurs, and the strong scattering point is correlated with the formula (5), namely the first ISAR image, so that the obtained maximum energy is dispersed and reduced.
Therefore, in step S130, the rotated second ISAR image and the first ISAR image are subjected to two-dimensional correlation filtering to obtain a correlation coefficient. In step S140, the target echo is determined according to the magnitude relationship between the correlation coefficient and the preset determination threshold. And if the correlation coefficient is larger than the judgment threshold, the echo signal is the echo signal after the real target is reflected. And if the correlation coefficient is smaller than the judgment threshold, the echo signal is an interference signal transmitted by the interference target.
Specifically, when the signal received by the radar 2 is the target signal, a large energy peak occurs in equation (15), and the energy is dispersed when the signal is received as interference. Thus, the following are defined:
Figure SMS_22
here, it can be seen that the maximum value of the correlation coefficient and the determination threshold are actually used for determination.
In the case of the formula (19),
Figure SMS_23
for an RD image rotation angle, in one RD image rotation->
Figure SMS_24
The following can be evaluated by the formula (20):
Figure SMS_25
where Sh is the judgment threshold.
In this embodiment, the target is a ship. The method can also be used for other targets such as vehicles, airplanes and the like.
When the target is a ship, the judgment threshold value can be set according to the length, width and rotation angle of the ship target.
As shown in fig. 5, which is a schematic diagram of rectangle rotation, the ratio of the overlapping area to the original rectangle area can be obtained as follows:
Figure SMS_26
therefore, the determination threshold value may be set to Sh = η.
When the actual algorithm calculation is performed on the method, the flow is shown in fig. 6, firstly, ISAR imaging is performed on the received signals of the radar 1 and the radar 2 respectively to obtain a formula (5) and a formula (6), and then, the ISAR image of the radar 2 is rotated counterclockwise by 3 times of the method of 1D signal translation shown in fig. 4
Figure SMS_27
And the obtained rotation image and the ISAR image of the radar 1 are subjected to two-dimensional correlation filtering, and whether S (delta alpha) > Sh is larger or not is judged by setting a proper threshold value Sh to distinguish the target from the interference.
In order to verify the effectiveness of the algorithm, a simulation experiment is adopted, and a target ship point scattering model is adoptedThe model is shown in fig. 7, and consists of 367 scattering points, and the ship l =120m, b =30m. The radar 1 and the radar 2 are same-type radars, the radar 1 sends linear frequency modulation signals, the radar 2 is only responsible for receiving the signals, the carrier frequency is 10GHz, the transverse resolution of an ISAR image is 1.5m, the longitudinal resolution is 1.5m, and the pitch angle beta is 1 =β 2 =30 °, initial azimuth angle α respectively 1 =30 ° and α 2 =60 °, total rotation angle Δ θ =0.57 °, and biradical radar viewing angle difference Δ α =30 °, η =0.5 is obtained by equation (21), and Sh =0.5 is set.
Fig. 8 is an ISAR image of the target echo of the radar 1, and fig. 9 (a) and 9 (b) are ISAR images of the target and the interference received by the radar 2, respectively. Fig. 10 (a) and 10 (b) are ISAR images of the target of the radar 2 and the interference after the rotation Δ α =30 °, respectively, and it can be seen from the images that the ISAR image of the target after the rotation coincides with the imaging result of the radar 1, and the interference image after the rotation is greatly different from the imaging result of the radar 1. The ISAR image of the radar 2 is rotated and then subjected to orientation perception correlation filtering with the ISAR image of the radar 1 through a formula (15), and the obtained result is shown in FIG. 11. From FIG. 11 (a), it can be seen that the energy concentration of the target after the azimuth sensing filtering is high
Figure SMS_28
While disturbing the position mismatch occurring due to strong scattering points->
Figure SMS_29
The target virtuality and reality can be determined according to the formula (20).
To further study the robustness of the algorithm, the target and the disturbance are rotated by different angles
Figure SMS_30
Will make the rotation angle->
Figure SMS_31
Setting the angle to 0-60 degrees, obtaining the maximum correlation coefficient change function of the target and the disturbance at different rotation angles is shown in FIG. 12, which shows that the maximum number of phase relations of the disturbance appears at the origin and decreases as the rotation angle increases, and the target is at ^ and/or greater>
Figure SMS_32
The maximum peak appears at that time and->
Figure SMS_33
Gradually decreases towards two sides as the center, and is normalized and divided by/based on the rotating angles 0.2932-0.8063 which meet the condition that the real target correlation coefficient is more than 0.55 and the interference target is less than 0.55>
Figure SMS_34
The final value is 0.2699-0.7699, which accounts for 47.74% of the whole rotation interval, so the algorithm has good robustness.
In the cooperative anti-deception jamming method based on the double-base radar, aiming at the problem that deception jamming faced by radar detection in a complex electromagnetic environment seriously affects the detection performance of the radar, a novel anti-deception jamming method based on orientation perception related filtering is provided based on the difference of a target and a jamming signal in the direction. The method comprises the steps of rotating an ISAR image of one radar echo to a reference coordinate system of the other radar, carrying out relevant filtering processing, realizing identification of a target and interference by analyzing the contrast of a normalized filtering result, and analyzing the influence of anti-interference performance under different rotation angles. And carrying out simulation experiments and high-frequency electromagnetic calculation data experiments. Experiments show that the method further improves the anti-interference performance of the bistatic radar.
It should be understood that, although the steps in the flowchart of fig. 1 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 1 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 13, there is provided a cooperative anti-spoofing interference apparatus based on bistatic radar, including: the system comprises a signal acquisition module 200, an ISAR image imaging module 210, an ISAR image rotation module 220, a two-dimensional correlation filtering module 230 and an interference target judgment module 240, wherein:
a signal obtaining module 200, configured to obtain two echo signals reflected by a target, where the two echo signals are obtained by two radars respectively after a radar in the bistatic radar transmits a detection signal to the target, where an echo signal received by the radar that transmits the detection signal is a first echo signal, and an echo signal received by another radar is a second echo signal;
an ISAR image imaging module 210, configured to perform ISAR imaging on the first echo signal and the second echo signal respectively to obtain a first ISAR image and a second ISAR image correspondingly;
an ISAR image rotation module 220, configured to determine a rotation angle according to a difference between two radar imaging angles, rotate the second ISAR image according to the rotation angle so that a scattering center of the second ISAR image is consistent with the first ISAR image, and obtain a second rotated ISAR image;
a two-dimensional correlation filtering module 230, configured to perform two-dimensional correlation filtering according to the first ISAR image and the second rotated ISAR image to obtain a correlation coefficient;
and an interference target judging module 240, configured to judge whether the echo signal is an interference signal transmitted by an interference target according to the correlation coefficient and a preset threshold.
The specific definition of the cooperative anti-spoofing interference device based on the bistatic radar can be referred to the definition of the cooperative anti-spoofing interference method based on the bistatic radar, and is not described in detail here. The various modules in the cooperative anti-spoofing interference device based on bistatic radar may be implemented in whole or in part by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 14. The computer device comprises a processor, a memory, a network interface, a display screen and an input device which are connected through a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a cooperative anti-spoofing interference method based on bistatic radar. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 14 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, wherein the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
determining a rotation angle according to the difference value of the two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable the scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
performing two-dimensional correlation filtering according to the first ISAR image and the second rotary ISAR image to obtain a correlation coefficient;
and judging whether the echo signal is an interference signal transmitted by an interference target or not according to the correlation coefficient and a preset judgment threshold value.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, wherein the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
determining a rotation angle according to the difference value of the two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable the scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
performing two-dimensional correlation filtering according to the first ISAR image and the second rotary ISAR image to obtain a correlation coefficient;
and judging whether the echo signal is an interference signal transmitted by an interference target or not according to the correlation coefficient and a preset judgment threshold value.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, and these are all within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (8)

1. The cooperative anti-deception jamming method based on the bistatic radar is characterized by comprising the following steps:
acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, wherein the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
determining a rotation angle according to the difference value of the two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable the scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
performing two-dimensional correlation filtering according to the first ISAR image and the second rotary ISAR image to obtain a correlation coefficient;
and judging whether the echo signal is an interference signal transmitted by an interference target or not according to the correlation coefficient and a preset judgment threshold value.
2. The cooperative anti-spoofing interference method of claim 1 wherein said rotating said second ISAR image according to said angle of rotation so that its scattering center coincides with said first ISAR image and obtaining a second rotated ISAR image comprises:
and performing continuous three-time one-dimensional signal difference calculation on the second ISAR image according to the rotation angle to obtain the second rotation ISAR image.
3. A synergistic anti-spoofing interference method as in claim 2 wherein said one-dimensional signal difference calculation is performed by a fast fourier transform.
4. The cooperative anti-spoofing interference method of claim 3, wherein the step of determining whether the echo signal is an interference signal transmitted by an interference target according to the correlation coefficient and a preset determination threshold comprises:
if the correlation coefficient is larger than the judgment threshold, the echo signal is the echo signal after the real target is reflected
And if the correlation coefficient is smaller than the judgment threshold, the echo signal is an interference signal transmitted by an interference target.
5. A synergistic anti-spoofing interference method as in any of claims 1-4 wherein said target is a ship.
6. The cooperative spoof interference resisting method of claim 5 wherein the decision threshold is set according to the length, width and angle of rotation of the ship target.
7. Cooperative anti-spoofing interference device based on bistatic radar, characterized in that the device comprises:
the signal acquisition module is used for acquiring two echo signals reflected by a target, wherein the two echo signals are respectively received by two radars after a radar in the bistatic radar transmits a detection signal to the target, the echo signal received by the radar transmitting the detection signal is a first echo signal, and the echo signal received by the other radar is a second echo signal;
the ISAR image imaging module is used for respectively carrying out ISAR imaging on the first echo signal and the second echo signal to correspondingly obtain a first ISAR image and a second ISAR image;
the ISAR image rotation module is used for determining a rotation angle according to a difference value of two radar imaging angles, rotating the second ISAR image according to the rotation angle to enable a scattering center of the second ISAR image to be consistent with the first ISAR image, and obtaining a second rotated ISAR image;
the two-dimensional correlation filtering module is used for performing two-dimensional correlation filtering according to the first ISAR image and the second rotation ISAR image to obtain a correlation coefficient;
and the interference target judging module is used for judging whether the echo signal is an interference signal transmitted by an interference target according to the correlation coefficient and a preset judging threshold.
8. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 5 to 6 when executing the computer program.
CN202211162657.9A 2022-09-23 2022-09-23 Cooperative anti-deception jamming method, device and equipment based on double-base radar Pending CN115951312A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211162657.9A CN115951312A (en) 2022-09-23 2022-09-23 Cooperative anti-deception jamming method, device and equipment based on double-base radar

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211162657.9A CN115951312A (en) 2022-09-23 2022-09-23 Cooperative anti-deception jamming method, device and equipment based on double-base radar

Publications (1)

Publication Number Publication Date
CN115951312A true CN115951312A (en) 2023-04-11

Family

ID=87288332

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211162657.9A Pending CN115951312A (en) 2022-09-23 2022-09-23 Cooperative anti-deception jamming method, device and equipment based on double-base radar

Country Status (1)

Country Link
CN (1) CN115951312A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117741594A (en) * 2024-02-19 2024-03-22 中国科学院空天信息创新研究院 Interference device and method for distributed cooperative ISAR detection system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117741594A (en) * 2024-02-19 2024-03-22 中国科学院空天信息创新研究院 Interference device and method for distributed cooperative ISAR detection system
CN117741594B (en) * 2024-02-19 2024-04-30 中国科学院空天信息创新研究院 Interference device and method for distributed cooperative ISAR detection system

Similar Documents

Publication Publication Date Title
CN109116311B (en) Clutter suppression method based on knowledge-aided sparse iteration covariance estimation
CN107037410B (en) Method and device for interfering radar and frequency control array jammer
Chen et al. Detection and extraction of target with micromotion in spiky sea clutter via short-time fractional Fourier transform
Vu et al. Detection of moving targets by focusing in UWB SAR—Theory and experimental results
US7456780B1 (en) Method and system for developing and using an image reconstruction algorithm for detecting and imaging moving targets
US9057783B2 (en) Change detection method and system for use in detecting moving targets behind walls, barriers or otherwise visually obscured
CN107340518A (en) A kind of ISAR radar imaging methods being used under signal deletion
CN108387884B (en) Airborne radar clutter suppression method based on knowledge-assisted sparse progressive minimum variance
Vu et al. Phase error calculation for fast time-domain bistatic SAR algorithms
CN115951312A (en) Cooperative anti-deception jamming method, device and equipment based on double-base radar
Dong et al. A novel scattered wave deception jamming against three channel SAR GMTI
Chen et al. Deception jamming against ISAR with coupled two-dimensional compressive sensing via sub-Nyquist sampling
CN109283497A (en) Bistatic FDA-MIMO distance by radar cheating interference recognition methods
CN112098956A (en) Cross eye interference countermeasure method based on imaging technology
CN114047483A (en) Radar waveform design method based on initial phase-PRI joint modulation
CN113093122B (en) Method for synthesizing fast scene deception jamming of aperture radar
CN113514833A (en) Sea surface arbitrary point wave direction inversion method based on sea wave image
CN108957430A (en) Radiofrequency Interference in High Frequency Radar method for extracting region based on distance-Doppler figure
Sizov et al. Forward scatter RCS estimation for ground targets
Griffiths et al. Fundamentals of tomography and radar
CN113484829B (en) Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar
Demirci et al. Wide‐field circular SAR imaging: An empirical assessment of layover effects
Carretero-Moya et al. A coherent Radon transform for small target detection
Ouchi et al. Statistical analysis of azimuth streaks observed in digitally processed CASSIE imagery of the sea surface
CN116027288A (en) Method and device for generating data, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination