Chinese Optics Letters, Volume. 23, Issue 3, 030601(2025)

High-security three-dimensional CAP modulation technique integrating end-to-end constellation optimization and four-level masking

Juntao Zhang1,2,3, Bo Liu1,2,3、*, Jianxin Ren1,2,3, Yaya Mao1,2,3, Xiangyu Wu1,2,3, Rahat Ullah1,2,3, Jie Cui1,2,3, Yilan Ma1,2,3, Jianye Zhao4, Dongdong Xu1,2,3, Shuaidong Chen1,2,3, and Shuyu Zhou1,2,3
Author Affiliations
  • 1Institute of Optics and Electronics, Nanjing University of Information Science & Technology, Nanjing 210044, China
  • 2Jiangsu Key Laboratory for Optoelectronic Detection of Atmoand Sphere and Ocean, Nanjing University of Information Science & Technology, Nanjing 210044, China
  • 3Jiangsu International Joint Laboratory on Meteorological Photonics and Optoelectronic Detection, Nanjing University of Information Science & Technology, Nanjing 210044, China
  • 4Institute of Electronics and Information, Sun Yat-sen University, Guangzhou 510275, China
  • show less

    In this paper, a high-security three-dimensional carrierless amplitude and phase (3D-CAP) modulation technique is proposed, integrating deep learning with four-level masking. The 3D constellation geometry is optimized using an autoencoder (AE) with an additive white Gaussian noise (AWGN) channel model, reducing complexity by 40% compared to a variational autoencoder (VAE). Experimental validation on a 2 km seven-core fiber intensity modulation/direct detection (IM/DD) system shows a 1 dB improvement in receiver sensitivity. A 3D chaotic oscillator model is used for chaotic selective mapping, polynomial-like masking, constellation rotation, and subcarrier masking. The encrypted 3D-CAP signal achieves a key space of up to 10103, with strong anti-noise and confidentiality performance.

    Keywords

    1. Introduction

    With the advent of emerging technologies such as metaverse, 6G, virtual reality, and augmented reality, enhancing the network capacity of short-range fiber optic communication systems has become increasingly pressing. Compared to coherent optical communications, intensity modulation/direct detection (IM/DD) systems offer the advantages like low cost and power consumption, making them widely deployed in short-haul communications[1,2]. Additionally, carrierless amplitude and phase modulation (CAP) stands out for its high spectral efficiency, low error rate, robust resistance to nonlinear effects, low power consumption, and high system integration. Therefore, CAP is widely adopted in IM/DD systems[3,4].

    To mitigate the impact of signal noise, geometric shaping (GS) has garnered research interest. By increasing the minimum Euclidean distance (MED) while maintaining constant power, the resilience of the signal to noise can be further enhanced[5,6]. However, the proposed GS methods may struggle to fully adapt to fluctuating real-world channel conditions. In recent years, a learning model known as the autoencoder (AE) has seen extensive applications in communication systems[7]. By minimizing reconstruction error, the AE can jointly train the encoder and decoder, thereby improving the performance of two-dimensional constellations in IM/DD systems[8]. However, the exploration of the AE’s performance in 3D-GS remains insufficient. Three-dimensional (3D) constellations require consideration of the spatial distribution of constellation points, significantly increasing complexity. Therefore, it is necessary to conduct in-depth research on AE’s optimization capabilities in 3D-GS to understand its potential in optimizing constellation point distribution and increasing channel capacity in high-dimensional space, thereby providing new technical support for future high-performance high-reliability communication systems. The issue of communication security has garnered significant research attention. Chaotic systems, known for their ergodicity, pseudo-randomness, and sensitivity to initial conditions, have become a popular choice for communication encryption. However, existing digital chaotic encryption techniques have inherent limitations[9]. Achieving signal encryption without compromising transmission performance remains a major challenge for optical fiber communication systems.

    In this paper, a constellation optimization based on the AE is proposed, encompassing a four-level masking scheme for high-security 3D-CAP modulation. This scheme aims to optimize the geometrical distribution of the constellation points end-to-end based on the embedded channel model of the AE, thereby enhancing the transmission performance of the system. Subsequently, a chaotic sequence is generated by a 3D chaotic oscillator model[10]. Before transmission, chaotic selection mapping rules are constructed based on the chaotic sequence. The subcarriers are masked using the masking factors derived from the chaotic sequences, and the constellation maps are encrypted in conjunction with class-k order Fibonacci polynomials[11]. The four-stage masking scheme driven by class-k Fibonacci polynomials boasts a large key space of 10103 and is experimentally verified on a 2 km seven-core fiber transmission system, achieving a receiver sensitivity gain of 1.0 dB compared to the original face-centered cubic constellation, thereby confirming the feasibility of the proposed scheme.

    2. Theoretical Analysis and Measurement

    Figure 1 depicts the principle of high-security 3D-CAP employing four-level masking, where the encoder emulates the transmitter, the decoder emulates the receiver, and an additive white Gaussian noise (AWGN) fiber channel model is embedded between them. Through end-to-end optimization, a geometrically shaped constellation is obtained. Subsequently, chaotic selective mapping and k-order Fibonacci polynomial masking[11] of the constellation data are realized by leveraging chaotic selective mapping factors generated from a 3D chaotic oscillator model[10] and Fibonacci polynomial masking factors. Furthermore, constellation rotation and subcarrier masking are identified based on the rotation and subcarrier masking factors. Prior to transmission, the data-masked 3D-CAP signal undergoes oversampling, shaping, filtering, and summation. Conversely, the receiver performs the reverse process, demodulating and decrypting the received signal.

    Principle of high-security 3D-CAP transmission based on four-level masking.

    Figure 1.Principle of high-security 3D-CAP transmission based on four-level masking.

    Now we examine the principle of end-to-end 3D constellation geometry shaping, Y=G{C[F(X)]}, where F(·) denotes the encoder function and G(·) denotes the decoder function. Since the AWGN channel model exhibits a channel response akin to the seven-core channel, we opt to utilize the AWGN channel as the function C(·). The mathematical model of the AWGN channel can be expressed as C(x)=x+n, where C(x) represents the signal received at the receiver end, x is the signal transmitted by the sender, and n denotes the Gaussian white noise, comprising independent and identically distributed Gaussian random variables with a mean of 0 and a variance of N0/2. N0 is the noise power spectral density.

    The whole model aims to reproduce the input X at the output Y through the latent variable F(X). L(·) is the loss function as shown in Eq. (3), and the parameter vector θ=(θ,θ) contains all the trainable variables. The AE aims to minimize the cross-entropy loss function L(·) by iteratively updating the parameter θ through stochastic gradient descent (SGD), thereby enhancing the learning process on the geometric structure of the 3D constellations. This iterative process continues until the training parameter θ converges to a value that brings the variables Xi and Yi as close as possible, L(θ)=1jjkXjklogYjk,where j is the size of the training batch. We calculate the average value of the loss function for all samples and update the parameter θ to minimize the loss during fine-tuned training using SGD. This enhances the learning process of the autoencoder features, and the θ is updated as follows: θ(step+1)=θ(step)ηθL[θ(step)].

    Since the constellation points must recur frequently within the training batches, specifying the training batch size as a multiple of M is more judicious. In this paper, M represents the modulation order, which is set to 16. Figure 2 illustrates the degree of loss convergence across different training batch sizes. Larger training batches result in slower initial convergence but yield better final outcomes, while smaller batches converge faster initially but lead to poorer final results. To strike an optimal balance among convergence speed, computational cost, and effectiveness, a smaller training batch can be employed initially, gradually increasing after the initial convergence. As the lines in Fig. 2 indicate, as the training batch size grows, the parameter estimates of the model statistics become more precise. By setting the training batch across 6 ranges (8M, 16M, 32M, 64M, 128M, and 256M), it can be observed that the reconstruction error loss (REL) is lowest when the batch size is 128M. However, when the batch size increases to 256M, the REL begins to rise again. This indicates that the model’s convergence performance is optimal at a batch size of 128M. The output of the constellation point coordinates and the constellation diagram are shown in Figs. 3(a) and 3(b).

    Convergence of reconstruction error loss corresponding to different batch sizes.

    Figure 2.Convergence of reconstruction error loss corresponding to different batch sizes.

    (a) Constellation before GS. (b) Constellation after GS.

    Figure 3.(a) Constellation before GS. (b) Constellation after GS.

    The chaotic sequences, generated by the 3D chaotic oscillator model, are represented by {x=zy=zyz=ηy+z+0.3x21.5xy+0.6xz.

    Due to the system’s extreme sensitivity to initial conditions, when the parameters of the 3D chaotic oscillator model are set to η=1 and (x,y,z)=[40,2.85,3.22], it generates significantly different complex chaotic trajectories. In the event of illegal reception, if the correct key is not available, the message cannot be decrypted correctly.

    The above 3D chaotic oscillator can generate three independent chaotic sequences (x,y,z). Taking this chaotic sequence x, the 3D-CAP constellation chaotic selection mapping sequence B1 is set as B1=mod(x×1020,5) so that B1[i] denotes the element in B1 and different B1[i] values correspond to distinct mapping rules.

    After chaotic selection mapping, Fibonacci masking of the three messages in Message1 (M1) uses Fibonacci-like polynomials. First, the polynomial fn(x) investigated by the Belgian mathematician Catalan is defined by the following recursive relation[11]: fn(x)=xfn1(x)+fn2(x).

    For n3 and x=1, the resulting Fibonacci polynomial is f0(x)=0, f1(x)=1, and f2(x)=x. Under the condition n3, we transform the aforementioned recursive relation and Fibonacci polynomial, resulting in Eq. (5): {fn(xn)=xn1fn1(xn1)+xnfn2(xn2)f0(x0)=x02+1f1(x1)=x13+2x0f2(x2)=x14+x0(2x1+x2)+x2.

    As depicted in Fig. 4, in step 1, the chaotic sequence matrix has a dimension of 3×N. N represents the number of columns in the chaotic sequence matrix. Initially, we use the column selection function from Eq. (7) to obtain a new 3×i matrix (where i<N). In step 2, taking Column i as an example, the three initial chaotic factors a, b, and c within Column i are calculated by Mod(, 1000) to obtain x0, x1, and x2, respectively, after which f0, f1, and f2 are derived from Eq. (6). In step 3, f0, f1, and f2 are vertically arranged to form a new F column i. These new columns, collectively denoted as F, constitute the matrix F. The matrix M1 shares the same 3×i dimensional structure as matrix F. The principle of reverse cross multiplication is akin to step 4. We define the sum of the column index values in matrix F and matrix M1 as i+1 and then perform operations on the corresponding elements within these two columns. Taking F Column i and M1 Column 1 as examples, f0 multiplies m0 to obtain n0, f1 multiplies m1 to obtain n1, and f2 operates with m2 to obtain n2, collectively forming a new column, designated as matrix Message2 (M2) Column i. Using the same method, we calculate the remaining columns, then combine all the computed columns to obtain the encrypted matrix M2, thus achieving a constellation masking resembling Fibonacci sequences. The computation method for i is depicted in Eq. (6): i=randi(Num),Num(1,N).

    Principle of class k Fibonacci polynomial masking.

    Figure 4.Principle of class k Fibonacci polynomial masking.

    Key performance of Enc-GS-16 CAP.

    Figure 5.Key performance of Enc-GS-16 CAP.

    The variable Num represents the number of terms in a chaotic sequence, with its maximum value reaching N. Constellation rotation and subcarrier masking are then performed on the constellation-transformed message M2. The rules for generating the carrier masking factor A and constellation rotation factor B are as Eq. (7): {A={Tra{mod(y,1)×[1/sort(y)]}}TRotation_X=mod(x,1)×360Rotation_Y=mod(y,1)×360Rotation_Z=mod(z,1)×360B=Vertact(Rotation_X,Rotation_Y,Rotation_Z).

    Tra(.) is the transpose function in a matrix, mod is the remainder operation function, sort is the ascending sorting function, and T is the matrix transform function. The function T is to reassign the target matrix to 0 or 1 by discriminating the difference between the elements of the target matrix and 1, and finally transform it to form a primitive matrix A (each row has only one 1, and the rest of the elements are 0). A is then used to displace the subcarrier perturbations with M2. Using three independent chaotic sequences (x,y,z), each sequence element is processed according to the above equation to generate the constellation rotation factors Rotation_X, Rotation_Y, and Rotation_Z, which are spliced to form a constellation rotation matrix.

    This scheme employs a chaotic model with control parameters (x, y, z, η) and initial values of (40, 2.85, 3.22, 1). As shown in Fig. 5, when the variation in parameter x exceeds 10−16, the bit error rate (BER) significantly increases to 0.3095, making it impossible to correctly obtain the constellation diagram. Consequently, the illegal receiver (ONU) cannot correctly intercept the data. The conservative key space size is (1015)5×(1014)2=10103, which is sufficiently large to withstand data interception attempts by illegal receivers.

    Experimental setup. AWG, arbitrary waveform generator; EA, electrical amplifier; MZM, Mach–Zehnder modulator; EDFA, erbium-doped fiber amplifier; MCF, multicore fiber; PS, power splitter; VOA, variable optical attenuator; PD, photodiode; MSO, mixed-signal oscilloscope; DSP, digital signal processing; OLT, optical line terminal; ONU, illegal receiver.

    Figure 6.Experimental setup. AWG, arbitrary waveform generator; EA, electrical amplifier; MZM, Mach–Zehnder modulator; EDFA, erbium-doped fiber amplifier; MCF, multicore fiber; PS, power splitter; VOA, variable optical attenuator; PD, photodiode; MSO, mixed-signal oscilloscope; DSP, digital signal processing; OLT, optical line terminal; ONU, illegal receiver.

    We compared a variational autoencoder (VAE) with 2144 parameters to an AE with 1299 parameters. The AE is more memory-efficient and faster, while the VAE increases memory usage and latency. We also evaluated a 3D chaotic oscillator, Chen’s attractor, and the logistic map. The 3D chaotic oscillator offers better security with low complexity and high efficiency.

    3. Methods and Verifications

    The IM/DD system depicted in Fig. 6 is used for validation purposes. At the transmitter, after data processing via digital signal processing (DSP), the digital signal is converted into an analog radio frequency (RF) signal by an arbitrary waveform generator (AWG, TekAWG70002A) at a sampling rate of 10 GSa/s. The RF signal is then amplified by an electrical amplifier (EA) and modulated by a Mach–Zehnder modulator (MZM) using a laser source with a linewidth of less than 100 kHz to generate a 1550 nm optical carrier. The modulated optical signal is subsequently amplified by an erbium-doped fiber amplifier (EDFA). At the receiver, a variable optical attenuator (VOA) is used to adjust the received optical power. The adjusted optical signal is detected and converted into an electrical signal by a photodetector (PD) and then sampled by a mixed-signal oscilloscope (MSO) at a rate of 50 GSa/s. After undergoing DSP, the bit sequence is retrieved at the receiver. By comparing this sequence with the original sequence, the BER performance of the constellation after GS can be deduced.

    At the forward error correction (FEC) threshold of 3.8×103, the received optical power of core 7 and BTB is about 16.8dBm, as can be seen in Fig. 7(a). The gain of the best fiber core compared to the worst fiber core is less than 0.6 dB, indicating that the seven-core optical fiber transmission system used in the experiment has a good uniformity within the range of 2 km. In addition, when the received optical power is more significant than 16.5dBm, the BER performance of the seven cores is within the FEC threshold, the BER of the seven cores gradually decreases with the increase of the optical power value, and the proposed chaotic selection 3D-CAP transmission scheme has good transmission performance. It can be seen that the BER performance of core 7 is the closest to that of BTB, so core 7 is chosen as the experimental channel.

    (a) Comparison of the BER between the seven-core experiment and BTB experiment. (b) BER performance comparison of Enc-GS-16 CAP, W/O-Enc-GS-16 CAP, and illegal-GS-16 CAP.

    Figure 7.(a) Comparison of the BER between the seven-core experiment and BTB experiment. (b) BER performance comparison of Enc-GS-16 CAP, W/O-Enc-GS-16 CAP, and illegal-GS-16 CAP.

    The encrypted, unencrypted, and illegal GS constellations are denoted as Enc-GS-16 CAP, W/O-Enc-GS-16 CAP, and illegal-GS-16 CAP, respectively. The original constellation is denoted as 16 CAP. In order to validate the effect of the proposed encryption on the BER performance of the transmission system, Enc-GS-16 CAP, W/O-Enc-GS-16 CAP, and illegal-GS-16 CAP constellation diagrams after transmission over core 7, the performance curves of each BER are shown in Fig. 7(b). As illustrated in Fig. 7, if the encryption algorithm is intercepted illegally, the received BER is nearly 0.5. The obtained constellation diagram is entirely unresolved, and it is almost impossible for the eavesdropper to crack the message and recover the correct constellation diagram without the right key. In legitimate receiving ONUs, the performance of Enc-GS-16 CAP and W/O-Enc-GS-16 CAP is closely matched. This confirms that the proposed encryption scheme does not impact the performance of the system.

    In addition, for CAP transmitted over core 7, we compared the BER performance of traditional 16 CAP with that of the proposed geometric shaped 16 CAP, disregarding the effect of the encryption method. Figure 8 presents the BER performance comparison between traditional 16 CAP and geometric shaped 16 CAP transmitted over core 7. It can be seen that, at a BER of 3.8×103, the received optical power for traditional 16 CAP is 15.95dBm, whereas for the proposed 16 CAP, it is 16.97dBm. Therefore, the geometrically shaped 16 CAP demonstrates an improvement of approximately 1 dB compared to the traditional 16 CAP.

    BER performance comparison of traditional 16 CAP versus the proposed 16 CAP.

    Figure 8.BER performance comparison of traditional 16 CAP versus the proposed 16 CAP.

    4. Discussion and Conclusion

    In this paper, a high-security 3D constellation GS scheme utilizing AE is introduced. By optimizing the geometric shape of high-dimensional constellations, AE enhances the transmission performance of the 3D GS communication system. The approach integrates chaotic oscillators with k-order Fibonacci polynomials to apply chaotic selective mapping and multi-level masking to the 3D constellation data. This method features a key space size of 10103, which significantly boosts the communication system’s security. Experiments conducted over a 2 km seven-core fiber and a BTB system demonstrate that the receiver sensitivity of the geometrically shaped constellation signal can be improved by up to 1 dB compared to the original constellation. Compared to a VAE with a similar structure, AE offers reduced complexity, with a 40% decrease in parameters. Additionally, the chaotic system used has lower computational complexity. The results confirm that this scheme effectively enhances both security and BER performance. However, to further advance the system, future work should focus on exploring dynamic masking parameters and pruning techniques to improve dynamic adaptability and further reduce AE complexity.

    [5] Q. Wang, X. Ji, L. P. Qian et al. MINE-based geometric constellation shaping in AWGN channel. IEEE/CIC International Conference on Communications in China (ICCC Workshops)(2023).

    [7] M. Stark, F. A. Aoudia, J. Hoydis. Joint learning of geometric and probabilistic constellation shaping(2019).

    [8] R. T. Jones, T. A. Eriksson, M. P. Yankov et al. Geometric constellation shaping for fiber optic communication systems via end-to-end learning(2018).

    [9] V. Grishachev, Y. Kalinina, O. Kazarin. Fiber-optic channel of voice information leakage. IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)(2019).

    [10] A. Ghaffari, F. Nazarimehr, S. Jafari et al. An image compression-encryption algorithm based on compressed sensing and chaotic oscillator. Cybersecurity. Studies in Big Data(2022).

    Tools

    Get Citation

    Copy Citation Text

    Juntao Zhang, Bo Liu, Jianxin Ren, Yaya Mao, Xiangyu Wu, Rahat Ullah, Jie Cui, Yilan Ma, Jianye Zhao, Dongdong Xu, Shuaidong Chen, Shuyu Zhou, "High-security three-dimensional CAP modulation technique integrating end-to-end constellation optimization and four-level masking," Chin. Opt. Lett. 23, 030601 (2025)

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Fiber Optics and Optical Communications

    Received: Jun. 17, 2024

    Accepted: Aug. 28, 2024

    Posted: Aug. 30, 2024

    Published Online: Apr. 1, 2025

    The Author Email: Bo Liu (bo@nuist.edu.cn)

    DOI:10.3788/COL202523.030601

    CSTR:32184.14.COL202523.030601

    Topics