The chirp function (a unit amplitude quadratic phase-only function with linear frequency modulation) is well known and is used in a wide range of applications including radar, digital communications, information coding and hiding and many other forms of signal and image processing. This is because the chirp provides an optimal solution to the problem of retrieving information from low energy signals with a low Signal-to-Noise Ratio (SNR). The chirp function also occurs in the solution to many mathematical models used to describe the propagation and scattering of waves (in the Fresnel zone), in quantum mechanics (the quantum shutter problem) and optical fiber communications to name but a few. In a ‘systems and signals' context, the chirp function is accepted to be unique in that no other function has properties which yield such an optimal solution to the problem of extracting information from noise. In this context, we revisit the chirp function, consider a theorem and conjecture that attempt to quantify its unique properties through an analysis of its Fourier transform and re-establish the principles associated with the chirplet transform for functions of compact support. We then consider the principles of chirplet modulation for the transmission and reconstruction of bit-streams from signals with a low SNRs and show how this approach can be used to secure chirplet modulated signals using the prime number factorisation of a semi-prime derived from the value of the bandwidth of a communications channel.
[1]
M. Moshinsky.
DIFFRACTION IN TIME
,
1952
.
[2]
G. Mitselmakher,et al.
Reconstruction of Chirp Mass in the Search of Compact Binaries
,
2015,
1510.02426.
[3]
Jonathan Blackledge,et al.
Cryptography Using Steganography: New Algorithms and Applications
,
2011
.
[4]
L. Bluestein.
A linear filtering approach to the computation of discrete Fourier transform
,
1970
.
[5]
Nasser Al-Ismaily.
Dynamic block encryption with self-authenticating key exchange
,
2005
.
[6]
Daniel J. Bernstein,et al.
Post-quantum RSA
,
2017,
PQCrypto.
[7]
A. Amir,et al.
Theory of chirped photonic crystals in biological broadband reflectors
,
2016,
1608.05831.
[8]
J. Klauder,et al.
The theory and design of chirp radars
,
1960
.
[9]
Simon Haykin,et al.
The chirplet transform: physical considerations
,
1995,
IEEE Trans. Signal Process..
[10]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[11]
Peter W. Shor,et al.
Polynominal time algorithms for discrete logarithms and factoring on a quantum computer
,
1994,
ANTS.
[12]
Jonathan Blackledge,et al.
Resilient Digital Image Watermarking for Document Authentication
,
2014
.