
- Chinese Optics Letters
- Vol. 23, Issue 3, 030601 (2025)
Abstract
1. Introduction
With the advent of emerging technologies such as metaverse, 6G, virtual reality, and augmented reality, enhancing the network capacity of short-range fiber optic communication systems has become increasingly pressing. Compared to coherent optical communications, intensity modulation/direct detection (IM/DD) systems offer the advantages like low cost and power consumption, making them widely deployed in short-haul communications[1,2]. Additionally, carrierless amplitude and phase modulation (CAP) stands out for its high spectral efficiency, low error rate, robust resistance to nonlinear effects, low power consumption, and high system integration. Therefore, CAP is widely adopted in IM/DD systems[3,4].
To mitigate the impact of signal noise, geometric shaping (GS) has garnered research interest. By increasing the minimum Euclidean distance (MED) while maintaining constant power, the resilience of the signal to noise can be further enhanced[5,6]. However, the proposed GS methods may struggle to fully adapt to fluctuating real-world channel conditions. In recent years, a learning model known as the autoencoder (AE) has seen extensive applications in communication systems[7]. By minimizing reconstruction error, the AE can jointly train the encoder and decoder, thereby improving the performance of two-dimensional constellations in IM/DD systems[8]. However, the exploration of the AE’s performance in 3D-GS remains insufficient. Three-dimensional (3D) constellations require consideration of the spatial distribution of constellation points, significantly increasing complexity. Therefore, it is necessary to conduct in-depth research on AE’s optimization capabilities in 3D-GS to understand its potential in optimizing constellation point distribution and increasing channel capacity in high-dimensional space, thereby providing new technical support for future high-performance high-reliability communication systems. The issue of communication security has garnered significant research attention. Chaotic systems, known for their ergodicity, pseudo-randomness, and sensitivity to initial conditions, have become a popular choice for communication encryption. However, existing digital chaotic encryption techniques have inherent limitations[9]. Achieving signal encryption without compromising transmission performance remains a major challenge for optical fiber communication systems.
In this paper, a constellation optimization based on the AE is proposed, encompassing a four-level masking scheme for high-security 3D-CAP modulation. This scheme aims to optimize the geometrical distribution of the constellation points end-to-end based on the embedded channel model of the AE, thereby enhancing the transmission performance of the system. Subsequently, a chaotic sequence is generated by a 3D chaotic oscillator model[10]. Before transmission, chaotic selection mapping rules are constructed based on the chaotic sequence. The subcarriers are masked using the masking factors derived from the chaotic sequences, and the constellation maps are encrypted in conjunction with class-k order Fibonacci polynomials[11]. The four-stage masking scheme driven by class-k Fibonacci polynomials boasts a large key space of
Sign up for Chinese Optics Letters TOC. Get the latest issue of Chinese Optics Letters delivered right to you!Sign up now
2. Theoretical Analysis and Measurement
Figure 1 depicts the principle of high-security 3D-CAP employing four-level masking, where the encoder emulates the transmitter, the decoder emulates the receiver, and an additive white Gaussian noise (AWGN) fiber channel model is embedded between them. Through end-to-end optimization, a geometrically shaped constellation is obtained. Subsequently, chaotic selective mapping and k-order Fibonacci polynomial masking[11] of the constellation data are realized by leveraging chaotic selective mapping factors generated from a 3D chaotic oscillator model[10] and Fibonacci polynomial masking factors. Furthermore, constellation rotation and subcarrier masking are identified based on the rotation and subcarrier masking factors. Prior to transmission, the data-masked 3D-CAP signal undergoes oversampling, shaping, filtering, and summation. Conversely, the receiver performs the reverse process, demodulating and decrypting the received signal.
Figure 1.Principle of high-security 3D-CAP transmission based on four-level masking.
Now we examine the principle of end-to-end 3D constellation geometry shaping,
The whole model aims to reproduce the input
Since the constellation points must recur frequently within the training batches, specifying the training batch size as a multiple of M is more judicious. In this paper, M represents the modulation order, which is set to 16. Figure 2 illustrates the degree of loss convergence across different training batch sizes. Larger training batches result in slower initial convergence but yield better final outcomes, while smaller batches converge faster initially but lead to poorer final results. To strike an optimal balance among convergence speed, computational cost, and effectiveness, a smaller training batch can be employed initially, gradually increasing after the initial convergence. As the lines in Fig. 2 indicate, as the training batch size grows, the parameter estimates of the model statistics become more precise. By setting the training batch across 6 ranges (8M, 16M, 32M, 64M, 128M, and 256M), it can be observed that the reconstruction error loss (REL) is lowest when the batch size is 128M. However, when the batch size increases to 256M, the REL begins to rise again. This indicates that the model’s convergence performance is optimal at a batch size of 128M. The output of the constellation point coordinates and the constellation diagram are shown in Figs. 3(a) and 3(b).
Figure 2.Convergence of reconstruction error loss corresponding to different batch sizes.
Figure 3.(a) Constellation before GS. (b) Constellation after GS.
The chaotic sequences, generated by the 3D chaotic oscillator model, are represented by
Due to the system’s extreme sensitivity to initial conditions, when the parameters of the 3D chaotic oscillator model are set to
The above 3D chaotic oscillator can generate three independent chaotic sequences
After chaotic selection mapping, Fibonacci masking of the three messages in Message1 (M1) uses Fibonacci-like polynomials. First, the polynomial
For
As depicted in Fig. 4, in step 1, the chaotic sequence matrix has a dimension of
Figure 4.Principle of class k Fibonacci polynomial masking.
Figure 5.Key performance of Enc-GS-16 CAP.
The variable Num represents the number of terms in a chaotic sequence, with its maximum value reaching
This scheme employs a chaotic model with control parameters (
Figure 6.Experimental setup. AWG, arbitrary waveform generator; EA, electrical amplifier; MZM, Mach–Zehnder modulator; EDFA, erbium-doped fiber amplifier; MCF, multicore fiber; PS, power splitter; VOA, variable optical attenuator; PD, photodiode; MSO, mixed-signal oscilloscope; DSP, digital signal processing; OLT, optical line terminal; ONU, illegal receiver.
We compared a variational autoencoder (VAE) with 2144 parameters to an AE with 1299 parameters. The AE is more memory-efficient and faster, while the VAE increases memory usage and latency. We also evaluated a 3D chaotic oscillator, Chen’s attractor, and the logistic map. The 3D chaotic oscillator offers better security with low complexity and high efficiency.
3. Methods and Verifications
The IM/DD system depicted in Fig. 6 is used for validation purposes. At the transmitter, after data processing via digital signal processing (DSP), the digital signal is converted into an analog radio frequency (RF) signal by an arbitrary waveform generator (AWG, TekAWG70002A) at a sampling rate of 10 GSa/s. The RF signal is then amplified by an electrical amplifier (EA) and modulated by a Mach–Zehnder modulator (MZM) using a laser source with a linewidth of less than 100 kHz to generate a 1550 nm optical carrier. The modulated optical signal is subsequently amplified by an erbium-doped fiber amplifier (EDFA). At the receiver, a variable optical attenuator (VOA) is used to adjust the received optical power. The adjusted optical signal is detected and converted into an electrical signal by a photodetector (PD) and then sampled by a mixed-signal oscilloscope (MSO) at a rate of 50 GSa/s. After undergoing DSP, the bit sequence is retrieved at the receiver. By comparing this sequence with the original sequence, the BER performance of the constellation after GS can be deduced.
At the forward error correction (FEC) threshold of
Figure 7.(a) Comparison of the BER between the seven-core experiment and BTB experiment. (b) BER performance comparison of Enc-GS-16 CAP, W/O-Enc-GS-16 CAP, and illegal-GS-16 CAP.
The encrypted, unencrypted, and illegal GS constellations are denoted as Enc-GS-16 CAP, W/O-Enc-GS-16 CAP, and illegal-GS-16 CAP, respectively. The original constellation is denoted as 16 CAP. In order to validate the effect of the proposed encryption on the BER performance of the transmission system, Enc-GS-16 CAP, W/O-Enc-GS-16 CAP, and illegal-GS-16 CAP constellation diagrams after transmission over core 7, the performance curves of each BER are shown in Fig. 7(b). As illustrated in Fig. 7, if the encryption algorithm is intercepted illegally, the received BER is nearly 0.5. The obtained constellation diagram is entirely unresolved, and it is almost impossible for the eavesdropper to crack the message and recover the correct constellation diagram without the right key. In legitimate receiving ONUs, the performance of Enc-GS-16 CAP and W/O-Enc-GS-16 CAP is closely matched. This confirms that the proposed encryption scheme does not impact the performance of the system.
In addition, for CAP transmitted over core 7, we compared the BER performance of traditional 16 CAP with that of the proposed geometric shaped 16 CAP, disregarding the effect of the encryption method. Figure 8 presents the BER performance comparison between traditional 16 CAP and geometric shaped 16 CAP transmitted over core 7. It can be seen that, at a BER of
Figure 8.BER performance comparison of traditional 16 CAP versus the proposed 16 CAP.
4. Discussion and Conclusion
In this paper, a high-security 3D constellation GS scheme utilizing AE is introduced. By optimizing the geometric shape of high-dimensional constellations, AE enhances the transmission performance of the 3D GS communication system. The approach integrates chaotic oscillators with
References
[5] Q. Wang, X. Ji, L. P. Qian et al. MINE-based geometric constellation shaping in AWGN channel. IEEE/CIC International Conference on Communications in China (ICCC Workshops)(2023).
[7] M. Stark, F. A. Aoudia, J. Hoydis. Joint learning of geometric and probabilistic constellation shaping(2019).
[8] R. T. Jones, T. A. Eriksson, M. P. Yankov et al. Geometric constellation shaping for fiber optic communication systems via end-to-end learning(2018).
[9] V. Grishachev, Y. Kalinina, O. Kazarin. Fiber-optic channel of voice information leakage. IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)(2019).
[10] A. Ghaffari, F. Nazarimehr, S. Jafari et al. An image compression-encryption algorithm based on compressed sensing and chaotic oscillator. Cybersecurity. Studies in Big Data(2022).

Set citation alerts for the article
Please enter your email address