IET Signal Processing
Publishing Collaboration
More info
IET logo
 Journal metrics
See full report
Acceptance rate8%
Submission to final decision84 days
Acceptance to publication34 days
CiteScore3.700
Journal Citation Indicator0.370
Impact Factor1.7

Submit your research today

IET Signal Processing is an open access journal, and articles will be immediately available to read and reuse upon publication.

Read our author guidelines

 Journal profile

IET Signal Processing publishes research on a diverse range of signal processing and machine learning topics, covering a variety of applications, disciplines, modalities, and techniques in detection, estimation, inference, and classification problems.

 Editor spotlight

Chief Editor Dr James Hopgood is a Lecturer in the Institute for Digital Communications at the University of Edinburgh, Scotland. His research interests include acoustic sensing, image processing and statistical signal processing.

 Abstracting and Indexing

This journal's articles appear in a wide range of abstracting and indexing databases, and are covered by numerous other services that aid discovery and access. Find out more about where and how the content of this journal is available.

Latest Articles

More articles
Research Article

CFA-Based Splicing Forgery Localization Method via Statistical Analysis

The color filter array of the camera is an effective fingerprint for digital forensics. Most previous color filter array (CFA)-based forgery localization methods perform under the assumption that the interpolation algorithm is linear. However, interpolation algorithms commonly used in digital cameras are nonlinear, and their coefficients vary with content to enhance edge information. To avoid the impact of this impractical assumption, a CFA-based forgery localization method independent of linear assumption is proposed. The probability of an interpolated pixel value falling within the range of its neighboring acquired pixel values is computed. This probability serves as a means of discerning the presence and absence of CFA artifacts, as well as distinguishing between various interpolation techniques. Subsequently, curvature is employed in the analysis to select suitable features for generating the tampering probability map. Experimental results on the Columbia and Korus datasets indicate that the proposed method outperforms the state-of-the-art methods and is also more robust to various attacks, such as noise addition, Gaussian filtering, and JPEG compression with a quality factor of 90.

Research Article

A Robust Sidelobe Cancellation Algorithm Based on Beamforming Vector Norm Constraint

Sidelobe cancellation (SLC) is a well-established beamforming technique for mitigating interference, particularly in the context of satellite communication (SATCOM). However, traditional SLC suffers from the issue of partially canceling the desired signal at high signal-to-noise ratio (SNR), primarily due to unconstrained beamforming processing. Extensive research has been conducted to address this problem; however, existing algorithms have limitations such as dependence on knowledge of signal array vectors or number of interferers and involve high computational complexity. In this paper, we propose a robust SLC algorithm based on beamforming vector norm constraint. Our proposal offers a practical solution by only requiring knowledge of the earth station antenna gain and maximum auxiliary array gain to the desired signal, both of which are fully known. Furthermore, compared to traditional SLC, our proposed method introduces additional computational complexity that only scales linearly with the size of the auxiliary array. Simulation results demonstrate comparable performance between our proposed method and existing techniques such as diagonal loading and spatial degrees-of-freedom control-based algorithms.

Research Article

Critical Design Considerations on Continuous Frequency Modulation Localization Systems

Real-time locating systems (RTLSs) suffer from clock synchronization inaccuracy among their distributed reference nodes. Conventional systems require periodic time synchronization and typically necessitate a two-way ranging (TWR) clock synchronization protocol to eliminate their measurement errors. Particularly, frequency-modulated continuous-wave (FMCW) time-based location systems pose unique design considerations on the TWR that have a significant impact on the quality of their measurements. In this paper, a valid operation design diagram is proposed for the case of an FMCW time-based TWR synchronization protocol. The proposed diagram represents an intersection area of two boundary curves that indicate the functionality of the system at a given frequency bandwidth, spectral length, and clock synchronization ambiguity. It presents an intuitive illustration of the measurement’s expected accuracy by indicating a larger intersection area for relaxed design conditions and vice versa. Furthermore, the absence of a working condition can easily be detected before proceeding with the actual system development. To demonstrate the feasibility of the proposed diagram, four scenarios with different design constraints were evaluated in a Monte-Carlo model of a basic TWR system. Moreover, an experimental measurement setup demonstrated the validity of the proposed diagram. Both the simulation and experimental outcomes show that the indicated valid conditions and the distribution of the measurements’ accuracy are in very good agreement.

Research Article

Enhancing Industrial Wireless Communication Security Using Deep Learning Architecture-Based Channel Frequency Response

Wireless communication plays a crucial role in the automation process in the industrial environment. However, the open nature of wireless communication renders industrial wireless sensor networks susceptible to malicious attacks that impersonate authorized nodes. The heterogeneity of the wireless transmission channel, coupled with hardware and software limitations, further complicates the issue of secure authentication. This form of communication urgently requires a lightweight authentication technique characterized by low complexity and high security, as inadequately secure communication could jeopardize the evolution of industrial devices. These requirements are met through the introduction of physical layer authentication. This article proposes novel deep learning (DL) models designed to enhance physical layer authentication by autonomously learning from the frequency domain without relying on expert features. Experimental results demonstrate the effectiveness of the proposed models, showcasing a significant enhancement in authentication accuracy. Furthermore, the study explores the efficacy of various DL architecture settings and traditional machine learning approaches through a comprehensive comparative analysis.

Research Article

Deep Learning-Based Active Jamming Suppression for Radar Main Lobe

Due to the development of digital radio frequency memory (DRFM), active jamming against the main lobe of the radar has become mainstream in electronic warfare. The jamming infiltrates the radar receiver via the main lobe, covering up the target echo information. This greatly affects the detection, tracking, and localization of targets by radar. In this study, we consider jamming suppression based on the independence of RF features. First, two stacked sparse auto-encoders (SSAEs) are built to extract the RF characteristics and signal features carried out by the actual radar signal for subsequent jamming suppression. This method can effectively separate RF features from signal features, making the extracted RF features more efficient and accurate. Then, an SSAE-based jamming suppression auto-encoder (JSAE) is proposed; the mixed signal, including the radar signal, jamming signal, and noise, is input to JSAE for dimensionality reduction. Therefore, the radar signal and RF features, extracted by the two SSAEs in the previous step, are used to constrain the features of the reduced mixed signal. Moreover, we integrate the feature level and signal level to jointly achieve jamming suppression. The original radar signal is used to assist the radar signal reconstructed by the decoder. By first filtering out interference-related features and then reconstructing the signal, we can achieve better jamming suppression performance. Finally, the effectiveness of the proposed method is verified by simulating the actual collected data.

Research Article

Improved Complex Convolutional Neural Network Based on SPIRiT and Dense Connection for Parallel MRI Reconstruction

To accelerate the data acquisition speed of magnetic resonance imaging (MRI) and improve the reconstructed MR images’ quality, we propose a parallel MRI reconstruction model (SPIRiT-Net), which combines the iterative self-consistent parallel imaging reconstruction model (SPIRiT) with the cascaded complex convolutional neural networks (CCNNs). More specifically, this model adopts the SPIRiT model for reconstruction in the k-space domain and the cascaded CCNNs with dense connection for reconstruction in the image domain. Meanwhile, this model introduces the data consistency layers for better reconstruction in both the image domain and the k-space domain. The experimental results on two clinical knee datasets as well as the fastMRI brain dataset under different undersampling patterns show that the SPIRiT-Net model achieves better reconstruction performance in terms of visual effect, peak signal-to-noise ratio, and structural similarity over SPIRiT, Deepcomplex, and DONet. It will be beneficial to the diagnosis of clinical medicine.

IET Signal Processing
Publishing Collaboration
More info
IET logo
 Journal metrics
See full report
Acceptance rate8%
Submission to final decision84 days
Acceptance to publication34 days
CiteScore3.700
Journal Citation Indicator0.370
Impact Factor1.7
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.