2016
DOI: 10.1109/jstars.2016.2543961
|View full text |Cite
|
Sign up to set email alerts
|

Inverse Omega-K Algorithm for the Electromagnetic Deception of Synthetic Aperture Radar

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 14 publications
1
19
0
Order By: Relevance
“…In this way, radar kinematic error is represented by a four-element vector ζ = ζ r , ζ x ,ζ r ,ζ x , where ζ r and ζ x denote constant shift along range and azimuth respectively,ζ r andζ x denote velocity bias along range and azimuth respectively. The model given by (11) is consistent with the idea of jamming algorithms such as [7], [22]. It indicates that the estimated trajectory of radar antenna phase center is viewed by jammer as an arbitrary straight line that may be rotated and shifted compared with the real motion.…”
Section: B Jamming With Radar Kinematic Errorssupporting
confidence: 67%
See 1 more Smart Citation
“…In this way, radar kinematic error is represented by a four-element vector ζ = ζ r , ζ x ,ζ r ,ζ x , where ζ r and ζ x denote constant shift along range and azimuth respectively,ζ r andζ x denote velocity bias along range and azimuth respectively. The model given by (11) is consistent with the idea of jamming algorithms such as [7], [22]. It indicates that the estimated trajectory of radar antenna phase center is viewed by jammer as an arbitrary straight line that may be rotated and shifted compared with the real motion.…”
Section: B Jamming With Radar Kinematic Errorssupporting
confidence: 67%
“…As a response to the threat, electronic counter measures (ECM) techniques against SAR receive intensive study interests. A variety of methods have been designed to achieve jamming effects such as suppression, deception, or disturbance [2]- [7], by either active repeater or passive reflector [8], [9]. Nowadays, opponents of jamming have extended from traditional image formation processing of SAR to polarimetric SAR (PolSAR) [10], [11], interferometric SAR (InSAR) [12], [13], ground moving target indication (GMTI) [14], bi-or multi-static SAR [15]- [17], etc.…”
Section: Introductionmentioning
confidence: 99%
“…The principle of SAR deceptive jamming based on modulation-retransmission is presented in Figure 1 [17]. The jammer performs a serious of operations including the amplification, down-conversion, analog-to-digital conversion (A/D), and fast Fourier transform (FFT) on the intercepted radar radio frequency (RF) signal to obtain the frequency domain representation of the baseband, while the JSF is calculated based on the template and the SAR parameters including kinematic parameters (platform position, velocity, etc.…”
Section: Principles Of Deceptive Jamming Against Sarmentioning
confidence: 99%
“…denotes the instantaneous slant distance between and the jammer. In order to generate the fake point target P in the SAR image, the JSF at azimuth time t a is [17] H…”
Section: Principles Of Deceptive Jamming Against Sarmentioning
confidence: 99%
See 1 more Smart Citation