244
Views
2
CrossRef citations to date
0
Altmetric
Articles

Numerical method for inverse scattering in two-layered background in near-field optics

&
Pages 130-154 | Received 23 Apr 2013, Accepted 26 Jan 2014, Published online: 28 Feb 2014

Abstract

The inverse scattering problem in two-layered background that arises in near-field optics is discussed. The reconstruction of the scatterer from inhomogeneous medium deposited on a homogeneous substrate is presented, where the measured data only lies on a limited aperture. An error bound of the Born approximation is given. A moment method with truncated SVD is developed to handle the exponentially ill-posed problem with noisy measured data. Numerical experiments are presented to illustrate the resolution of the method, which are satisfying even under the perturbed data.

1 Introduction

We can obtain images with subwavelength resolution via evanescent wave field in near-field optics.[Citation1] There are three important modalities in near-field optics : near-field scanning optical microscopy (NSOM),[Citation2] total internal reflection microscopy (TIRM)[Citation3, Citation4] and photon scanning tunnelling microscopy (PSTM).[Citation5, Citation6] The two principal genres of NSOM are illumination mode and collection mode. In illumination mode NSOM, a probe is scanned over the scatterer in the near zone and the scattering field is measured in the far zone of scatterer. In collection mode NSOM, the scatterer is illuminated by a source located in the far zone of the scatterer and the total field is collected in the near zone of the scatterer through the small aperture in the probe as the probe is scanned over the scatterer. In TIRM, the scatterer is illuminated by an evanescent wave that is generated by total internal reflection, and the scattering field is measured in the far zone of the scatterer. In the PSTM, the scatterer is illuminated by an evanescent wave and the scattering field is measured in the near zone.

Figure 1. The geometry of the model problem. The scatterer q(x) is in a compact support in D, the measurements are taken on Γ and Ω is a compact set containing D and Γ.

Figure 1. The geometry of the model problem. The scatterer q(x) is in a compact support in D, the measurements are taken on Γ and Ω is a compact set containing D and Γ.

In all of the three modalities, reconstruction of the scatterer from the measured data is desirable. In [Citation1], within the framework of weak scattering, the authors give some numerical experiments to recover the scatterer. Bao and Li developed a recursive linearization method from an initial guess based on weak scattering. In [Citation7], the model problem employs the first-order boundary condition, and requires the boundary measurements of scattering waves, but it only needs single-frequency incident wave. In [Citation8], the radiation condition is employed, and it requires multi-frequency incident waves. The model in [Citation8] uses a limited aperture data.

In this paper, we adopt the model with radiation condition, single-frequency incident wave and a limited aperture data. We will give an error estimate of the inverse problem. In [Citation9], the authors deal with an optical diffusion problem, and give an inversion of the linear problem, but the computation is limited by the numerical precision, for its ill-posedness. Due to the ill-posedness of the inverse problem, we develop an effective numerical method: moment method with truncated SVD (singular value decomposition).

This paper is organized as follows. In Section 2, we give a mathematical model of the scattering problem. Next, based on the work of Schotland [Citation10, Citation11], etc., the inverse problem is discussed. In Section 3, we discuss the regularization of the linearized problem. We present the moment method with truncated SVD, in order to handle the severely ill-posed problem with noisy measured data. Numerical examples are presented in Section 5 and some remarks are concluded in the final section.

2 Scattering and inverse scattering problem

2.1 Scattering problem

We describe the scattering model mathematically as follows. Assume that the materials are nonmagnetic in the problem considered in this paper. Throughout, we only consider the problem which can be reduced to a two-dimensional model in the case of transverse electric polarization. The index of refraction in the lower half-space has a constant value n0. The index of refraction in the upper half-space varies within the domain of the sample but otherwise has a value of unity.[Citation1, Citation8] That is, the background media consists of two layers with the index of refractionn(x)=1,forx2>0,n0,forx2<0,where x=(x1,x2) and n0>1.

We denote the scatterer by q(x) within a compact support in DR+2:={x=(x1,x2):x2>0}, with q(x)/4π the susceptibility of the scatterer.[Citation1] The incident wave comes from the lower half-space, which is a time-harmonic plane waveui=eiαx1+iβx2,whereα=n0k0sinθ,β=n0k0cosθ,and θ(-π/2,π/2),k0 is the free space wavenumber. The geometry of the model problem is shown in Figure . The measurements are taken on Γ:={x=(x1,x2):x2=b>0,-L<x1<L}, and ΩR+2 is a compact set containing D and Γ.

Figure 2. Direct discretization method and Tikhonov regularization of problem (Equation4.1).

Figure 2. Direct discretization method and Tikhonov regularization of problem (Equation4.14.1 g(t)=∫01e-tsf(s)ds,t∈[0,1],4.1 ).

Figure 3. Moment method and moment method with truncated SVD for problem (Equation4.1).

Figure 3. Moment method and moment method with truncated SVD for problem (Equation4.14.1 g(t)=∫01e-tsf(s)ds,t∈[0,1],4.1 ).

Figure 4. Computing model.

Figure 4. Computing model.

Figure 5. 2c=λ/2, b=λ/2, σ=0, Λ=10-8.

Figure 5. 2c=λ/2, b=λ/2, σ=0, Λ=10-8.

Figure 6. 2c=λ/2, b=λ/2, σ=0, Λ=10-6.

Figure 6. 2c=λ/2, b=λ/2, σ=0, Λ=10-6.

Figure 7. 2c=λ/2, b=λ/2, σ=10-6, Λ=10-6.

Figure 7. 2c=λ/2, b=λ/2, σ=10-6, Λ=10-6.

Figure 8. 2c=λ/2, b=λ/2, σ=10-6, Λ=10-3.

Figure 8. 2c=λ/2, b=λ/2, σ=10-6, Λ=10-3.

It is easy to check that the total field u satisfies the Helmholtz equation2.1 Δu+n2k02(1+q)u=0,inR2.2.1 Let uref be the reference field, which satisfies the Helmholtz equation without the scatterer:2.2 Δuref+n2k02uref=0,inR2.2.2 From Equation (Equation2.2) and the continuity condition on the interface we can analytically obtain thaturef=ut,forx2>0,ui+ur,forx2<0,whereut=CTeiαx1+iγx2andur=CReiαx1-iβx2are the transmitted and reflected waves, respectively, [Citation8, Citation12, Citation13], andCT=2ββ+γ,CR=β-γβ+γ,γ(α)=k02-α2,fork0>|α|,iα2-k02,fork0<|α|.It can be readily seen that the transmitted wave ut becomes evanescent wave when |α|>k0. That is, ut decays exponentially in the x2 direction.

Figure 9. 2c=λ/2, b=λ/2, σ=10-3, Λ=10-6.

Figure 9. 2c=λ/2, b=λ/2, σ=10-3, Λ=10-6.

Figure 10. 2c=λ/2, b=λ/2, σ=10-3, Λ=10-3.

Figure 10. 2c=λ/2, b=λ/2, σ=10-3, Λ=10-3.

Define the scattering field us=u-uref. Then from (Equation2.1) and (Equation2.2), we have2.3 Δus+n2k02(1+q)us=-k02qut,inR+2.2.3 And we require the radiation condition [Citation8, Citation14]2.4 limRΣRusν-ink0usdS=0,2.4 where ΣR is the sphere centred in the origin with radius R, and ν is the unit outward normal to ΣR.

Now we introduce the fundamental solution G(x,y) of the Helmholtz equation in a two-layered medium in R2, which satisfies2.5 ΔG(x,y)+n2(x)k02G(x,y)=-δ(x-y),2.5 with radiation condition, and the continuity conditions2.6 G(x,y)|x2=0+=G(x,y)|x2=0-,2.6 2.7 G(x,y)x2x2=0+=G(x,y)x2x2=0-.2.7 By use of fundamental solution, we can give the formula2.8 us(x)=k02DG(x,y)q(y)(ut(y)+us(y))dy,2.8 which is well known as Lipmann-Schwinger equation.

Furthermore, if we define β1(ξ) and β2(ξ) by2.9 β1(ξ)=k02-ξ2,for|k0|>ξ,iξ2-k02,for|k0|<ξ,2.9 and2.10 β2(ξ)=(n0k0)2-ξ2,for|n0k0|>ξ,iξ2-(n0k0)2,for|n0k0|<ξ,2.10 respectively, then we have that2.11 G(x,y)=i4π-1β1β1-β2β1+β2eiβ1(x2+y2)+eiβ1|x2-y2|eiξ(x1-y1)dξ,2.11 when x2>0 and y2>0.(see [Citation8])

We rewrite (Equation2.8) in an operator form:2.12 I-k02Tus=k02Tut,2.12 where the operator T is defined as follows:2.13 Tf(x)=DG(x,y)q(y)f(y)dy.2.13 If k02T2<1, (I-k02T)-1 exists and is bounded in L2 norm. We can express us by the Neumann series2.14 us=j=1(k02T)jut.2.14

Remark 1

In fact, G(x,y) here can be split into two parts:G(x,y)=Ψ(x,y)+i4H0(1)(k0|x-y|),whereΨ(x,y)=i4π-1β1β1-β2β1+β2eiβ1(x2+y2)eiξ(x1-y1)dξ.It is easy to see that Ψ(x,y)C(R+2×R+2).[Citation15]

In [Citation16], the authors proved that, forKΩf(x):=Ωi4H0(1)(k0|x-y|)f(y)dy,xR2,KΩ is a bounded operator from L2(Ω) to L2(Ω).

So, the operator T is also bounded from L2(Ω) to L2(Ω). And when k0 and qL2(D) are sufficiently small, the assumption k02T1 is valid.

2.2 Inverse scattering problem

The inverse scattering problem considered in this paper is from some model of near-field optics. In these problems, the measurements of scattering wave us are given on Γ:={x=(x1,x2):x2=b>0,-L<x1<L}. The inverse problem is to determine q. In particular, the shape of support of q is easy to be seen after that q is determined.

Because the operator T is linearly in q, our inverse problem can be written as: finding q to satisfy2.15 ϕ=K1q+K2qq+K3qqq+,2.15 where ϕ=us|Γ and Kj:L2(D)××L2(D)L2(Γ) defined byK1q=[k02Tut]|Γ,K2qq=[(k02T)2ut]|Γ,and so on.

For qL2(D), we have that2.16 Kj2ν2μ2j-1,2.16 where2.17 μ2=k02supxΓG(x,·)L2(D)2.17 and2.18 ν2=k02utL(D)supxΓG(x,·)L2(D).2.18 By Denoting K1+ as the regularized pseudo-inverse of the operator K1, we have the following result from [Citation11] and [Citation17]:

Theorem 2.1

Suppose that K1+2<1/(μ2+ν2),K1+ϕL2(D)<1/(μ2+ν2). Let M=max{qLp(D),K1+K1qLp(D)} and assume that M<1/(μ2+ν2). Then the norm of the difference between the true scatterer and the linearized inverse solution obeys the estimate2.19 q-K1+ϕL2(D)C[(μ2+ν2)K1+ϕ2]21-(μ2+ν2)K1+ϕ2+C~(I-K1+K1)qL2(D),2.19 where C and C~ are independent of ϕ.

Theorem 2.1 gives the error estimate of the inverse problem concerning Born approximation. The first error term in (Equation2.19) relates much to the the norm of K1+ϕ. And the second term describes the error between the exact solution and the regularized solution of the linearized problem with K1q being the measured data.

So the construction of K1+ is very important to the inverse scattering problem. However, the equation K1q=ϕ is difficult to solve, for its severe ill-posedness. Few work has been done for the detailed numerical methods of this severely ill-posed problem and its error estimate, which we will discuss in the next section.

Figure 11. 2c=λ/2, b=λ, σ=0, Λ=10-6.

Figure 11. 2c=λ/2, b=λ, σ=0, Λ=10-6.

Figure 12. 2c=λ/2, b=λ, σ=10-6, Λ=10-6.

Figure 12. 2c=λ/2, b=λ, σ=10-6, Λ=10-6.

Figure 13. 2c=λ/2, b=λ, σ=10-3, Λ=10-3.

Figure 13. 2c=λ/2, b=λ, σ=10-3, Λ=10-3.

Figure 14. 2c=λ/4, b=λ/2, σ=0, Λ=10-6.

Figure 14. 2c=λ/4, b=λ/2, σ=0, Λ=10-6.

Remark 2

When k0, supp(q) and qL2(D) are sufficiently small, the assumption k02T1 is valid, and μ2,ν2 are also sufficiently small.

We checked numerically that (μ2+ν2)K1+2, (μ2+ν2)K1+ϕ2 are very small. Therefore, the assumptions in Theorem 2.1 could be satisfied, and the first term in (Equation2.19) would also be small.

3 Numerical method for the linearized inverse problem

The linearized inverse problem, as discussed in pervious section, is3.1 us=k02Tut,3.1 more explicitly,3.2 us(x)=k02DG(x,y)q(y)ut(y)dy.3.2 Note that the only known data lie on the segment Γ={x:x2=b,-L<x1<L}, so we extend us on Γ to the whole line {x:x2=b,-<x1<} by defining us=0 on the remaining interval of Γ. We assume that the error between the expanded data us and the “exact” data is small when L is sufficiently large. Namely, we assume that us-uexacts<δ1, where δ1 depends on L. The scattering data us depends on α, and we need several different incident waves, i.e. we need [α1,,αn][-n0k0,n0k0] to reconstruct the scatterer q(x).

Thus, we have3.3 us(x1,b)=k02-0bG(x1,b;y1,y2)q(y1,y2)ut(y1,y2)dy2dy1.3.3 Substituting the fundamental solution G(x,y) and ut into (Equation3.3) and realizing the dependence of us on α, we rewrite (Equation3.3) as3.4 us(x1,b;α)=ik02CT4π-0bq(y1,y2)eiαy1+iγy2×-1β1β1-β2β1+β2eiβ1(b+y2)+eiβ1(b-y2)eiξ(x1-y1)dξdy2dy1.3.4 Multiplying both sides of (Equation3.4) by e-iωx1 and integrating from - to with respect to x1,3.5 u^s(ω,b;α)=ik02CT4π-0bq(y1,y2)eiαy1+iγy2×-1β1β1-β2β1+β2eiβ1(b+y2)+eiβ1(b-y2)e-iξy1-ei(ξ-ω)x1dx1dξdy2dy1,3.5 and noting that-ei(ξ-ω)x1dx1=2πδ(ξ-ω),(Equation3.5) can be rewritten as3.6 u^s(ω,b;α)=ik02CT2-0bq(y1,y2)eiαy1+iγy2·1β1(ω)β1(ω)-β2(ω)β1(ω)+β2(ω)eiβ1(ω)(b+y2)+eiβ1(ω)(b-y2)e-iωy1dy2dy1.3.6 Realizing that-q(y1,y2)eiαy1e-iωy1dy1=q^(ω-α,y2),(Equation3.6) can be reduced to3.7 u^s(ω,b;α)=ik02CT20beiβ1(ω)bβ1(ω)β1(ω)-β2(ω)β1(ω)+β2(ω)eiβ1(ω)y2+e-iβ1(ω)y2eiγy2q^(ω-α,y2)dy2.3.7 When |ω|<k0 and |α|<k0, both β1 and γ are real; and for k0<|α|<n0k, γ is pure imaginary, and so is β1 with |ω|>k0. It is obvious that the inversion of (Equation3.7) involves both inverse Fourier transform and inverse Laplace transform. In fact, both inverse Fourier transform and inverse Laplace transform defined on finite interval are ill-posed, especially the inverse Laplace transform is exponentially ill-posed.[Citation18]

In [Citation9], the authors used a method that is essentially the moment method to handle the inversion of an optical diffusion problem. They simulated their problem in the two-dimensional case, but the resolution is limited by numerical precisions.

Here, we split the two-dimensional problem (Equation3.7) into two one-dimensional problems. So, the computation runs much faster and uses less memory. Moreover, we apply the moment method with truncated SVD to get a better resolution where the limitation of numerical precisions is circumvented in a certain extent.

Figure 15. 2c=λ/4, b=λ/2, σ=10-3, Λ=10-3.

Figure 15. 2c=λ/4, b=λ/2, σ=10-3, Λ=10-3.

We need two steps to solve (Equation3.7).

Step 1

For ω-α=c(k),k=1,2,, obtain q^(c(k),y2) from a one-dimensional integral equation for every k;

So for every calculation of q^(c(k),y2),k=1,2,, we need special choices of ω. That is, if we have n incident angles, then we set ωj=αj+c(k),j=1,,n, for k=1,2,. We suppose all the ωj’s lie in [-W,W].
Step 2

Obtain q(y1,y2) from q^(c(k),y2) by inverse Fourier transform on finite intervals.

After the two steps, an approximate solution of the linearized inverse problem (Equation3.1) is obtained. Obviously, the computation of step 1 is quite difficult for its severe ill-posedness, especially on a finite data-set. As is discussed above, we treat it as a kind of perturbation of the measured data.

Figure 16. 2c=λ/4, b=λ, σ=0, Λ=10-6.

Figure 16. 2c=λ/4, b=λ, σ=0, Λ=10-6.

Figure 17. 2c=λ/4, b=λ, σ=10-3, Λ=10-3.

Figure 17. 2c=λ/4, b=λ, σ=10-3, Λ=10-3.

The first step is to solve the operator equation for every specified k,k=1,2,.3.8 (Kq^)(ω)=u^s(ω,α)2ik02CTβ1(ω),3.8 where3.9 (Kq^)(ω):=0beiβ1(ω)bβ1(ω)-β2(ω)β1(ω)+β2(ω)eiβ1(ω)y2+e-iβ1(ω)y2eiγ(ω-c(k))y2q^(c(k),y2)dy2.3.9 Denotek(ω,y2)=eiβ1(ω)bβ1(ω)-β2(ω)β1(ω)+β2(ω)eiβ1(ω)y2+e-iβ1(ω)y2eiγ(ω-c(k))y2,then K:L2[0,b]L2[-W,W] is a compact operator since k(ω,y2)L2([-W,W]×[0,b]).

Let XnL2[0,b] be finite-dimensional subspaces with dimXn=n, and 0ω1<<ωnb be the collocation points, which are chosen as ωj=αj+c(k),j=1,,n. Then the collocation equation is3.10 (Kq^n)(ωi)=y(ωi),i=1,...,n,3.10 wherey(ωi)=u^s(ωi,α)2ik02CTβ1(ωi),then q^nXn is a collocation solution of (Equation3.10).

Choosing a basis {ϕj,j=1,,n} of Xn, then q^n(c(k),y2) can be represented asq^n(c(k),y2)=j=1najϕj(y2),where the coefficients aj’s are the solution of the system3.11 Aa=β3.11 withAi,j=Kϕj(ωi),βi=y(ωi).For ill-posed problems such as (Equation3.11), even small perturbation of data β can change the solution a lot. Recall that we can only obtain the scattering data on Γ, and we have assumed that us-uexacts<δ1. Now we denote the perturbed data, or the measured data, by βδ, and let |β-βδ|<δ, where δ takes in the influence of the error bound δ1, and |·| denotes Euclidean norm in Cn.

Remark 3

In fact, there is no need that the number of measurements points coincides that of the collocation points. In [Citation19], a proper interpolation method can be made to obtain all the y(ωj)’s ,j=1,,n, from the measurements points sj,j=1,,m.

Solving (Equation3.10) in L2[0,b] cannot specify the solution q^n uniquely. There are several choices of the basis ϕj’s. In this section, we will give an easy choice of the basis, and under this choice, we can obtain a unique solution.

We will find a moment solution of (Equation3.10), which means thatxnL2=min{znL2:znL2[0,b],znsatisfies(3.10)}with respect to the collocation points {ωj}j=1n.

Recall Riesz theorem that there exists kjL2[0,b], such that, Kz(tj)=(z,kj), for all zL2[0,b], and j=1,,n. In particular for the integral operator K, kj is explicitly given bykj(y2)=k(ωj,y2),j=1,,n.If kj’s are linearly independent, i.e. the determinant of the collocation matrix Ai,j=(ki,kj) is not equal to 0, by choosing ϕj=kj , there exists one and only one moment solution q^n of (Equation3.10) (see [Citation20]).

However, the system of (Equation3.11) is severely ill-posed, so it is difficult to find a stable moment solution. We will apply the truncated SVD method to improve the stability of problem (Equation3.10).

Using SVD, we can writeA=UΣV,where U and V are unitary, andU=[u1,,un],V=[v1,,vn],Σ=diag(λ1,,λn).Thus,Avj=λjuj,Auj=λjvj.We assume that λ1λn0, and let ΛλK for some K,1Kn. And denote Σ~=diag(λ1,,λK,0,,0). Let A~=UΣ~V, we have the following estimate.

Theorem 3.1

Let {ω1(n),ω2(n),,ωn(n)}[0,b],nN, be a sequence of collocation points andXn:=span{kj(n),j=1,,n}.And assume that there exist zCn such that a=Az. If q^~nδ=j=1na~jδkj(n), where a~δCn solves A~a~δ=βδ with |βδ-β|δ, then the following error estimate holds:3.12 q^~nδ-q^pnδΛ+Λ|z|+cmin{q^-znL2:znXn},3.12 wherepn=maxj=1nρjkj(n)L2:j=1n|ρj|2=1.

Proof

We write q^~nδ-q^q^~nδ-q^n+q^n-q^, and the second term is estimated in [Citation20]. All we have to do in this proof is to estimate q^~nδ-q^n.3.13 q^~nδ-q^n=j=1na~jδkj(n)-j=1najkj(n)pn|a~δ-a|=pn|A~-1βδ-A-1β|=pn|A~-1βδ-A~-1β+A~-1β-A-1β|pn(|A~-1(βδ-β)|+|(A~-1-A-1)β|),3.13 the first term in (Equation3.16) is|A~-1(βδ-β)|λK-1δδΛ,and the second term in (Equation3.16) is3.14 |(A~-1-A-1)β|=j=K+1n1λj(β,uj)vj=j=K+1n1λj(Aa,uj)vj=j=K+1n(a,vj)vj.3.14 If a=Az, then(a,vj)=(Az,vj)=(z,Avj)=(z,λjuj)=λj(a,uj).Thus, (Equation3.19) can be written asj=K+1nλj(a,uj)vjΛ|z|.And the proof ends.

Without the truncation, (Equation3.12) isq^nδ-q^pnδλn+cmin{q^-znL2:znXn},as in [Citation20], and it is the error bound of the moment method.

Generally, we need the dimension of Xn large enough to make the second term in (Equation3.12) to be small, but if λj’s decay rapidly, especially for exponentially ill-posed problems as in this paper, λje-j, and δλn as n for a certain δ. Numerically, λn would be even less than the computing precision when n is large, which means that even without noise in measurements, the result would become inaccurate.

By our truncated SVD method, an appropriate Λ could be chosen so that δΛ is bounded. In practice, we choose Λ=δα,0<α<1, then δΛ+Λ|z|δ1-α+c~δα is independent of n.

Here, it is obvious that q^~nδ-q^L2(D)=2πq~nδ-qL2(D) is nothing but 2πK1+ϕδ-qL2(D) in (Equation2.19) with ϕδ the perturbed data of measurements ϕ. Thus we have obtained a more detailed error estimate of the numerical method of the linearized inverse problem.

4 Numerical experiments

In this section, we give some numerical examples to illustrate the effectiveness of moment method with truncated SVD. In the first subsection, we give an example that is simple but really difficult to handle by ordinary methods, for its severe ill-posedness. And in the second subsection, we apply the moment method with truncated SVD to the inverse scattering problem we discussed above.

4.1 Numerical example involving inverse Laplace transform

In this subsection, we give some numerical examples of a much simpler inverse Laplace transform problem, where we only know a few discretization data. Our purpose is to show the readers how ill-posed the problem is when evanescent waves are involved.

Figure 18. 2c=λ/8, b=λ/2, σ=0, Λ=10-6.

Figure 18. 2c=λ/8, b=λ/2, σ=0, Λ=10-6.

Figure 19. 2c=λ/8, b=λ, σ=0, Λ=10-6.

Figure 19. 2c=λ/8, b=λ, σ=0, Λ=10-6.

Consider4.1 g(t)=01e-tsf(s)ds,t[0,1],4.1 where we should reconstruct f(t),t[0,1] from n observations of g(ti),i=1,,n. Moreover, the observations g(ti)’s are perturbed by noise, i.e. g(ti):=g(ti)+σrand,i=1,,n, where rand gives uniformly distributed numbers in [0,1].

In the numerical experiment, we set g(t)=1-e-tt, so that f(t)=1 is the true solution. And we set that n=8,σ=10-4.

Firstly, we show the direct discretization method and Tikhonov regularization of the direct discretization method in Figure . In the direct discretization method, we use the trapezoidal rule; and in Tikhonov regularization, we choose the regularization parameter to be 10-2. The solution of the direct discretization method has nothing to do with the true solution, while the Tikhonov regularization method seems better, but not satisfying, either.

Next, we use moment method to reconstruct f(t). Figure (a) uses just moment method, which is also a regularization method, but the result is much worse than what we expect. Figure (b) uses moment method with truncated SVD, and we get a satisfactory result. The truncated number is chosen as Λ=10-4. We will apply the moment method with truncated SVD to the inverse scattering problem in the next subsection.

4.2 Numerical examples of inverse scattering problem

In this subsection, we give the numerical examples of the reconstruction of the scatterer in the linearized problem.

The computing model contains the domain of [-λ,λ]×[-λ,λ], where λ is the wavelength of the incident wave. The index of refraction n(x)=1 in the upper half plane and n0 in the lower one. Two scatterers are presented on the surface of the substrate, in the domain [-d,-c]×[0,d-c] and [c,d]×[0,d-c], respectively, where d-c=λ/16,q(x)=1/2, as is shown in Figure . The measurements of scattering field us are collected on the segment Γ:={x:x2=b,-L<x1<L}. Here, we set L=λ. And the measurements data are perturbed by a noise level σ, i.e.us|Γ:=us|Γ(1+σrand),where rand gives uniformly distributed numbers in [0,1]. Thus, |β-βδ|<cσ=δ.

Note that though we may set σ=0 in some experiments, it does not mean that there is no noise, but that the machine precision plays the role of noise up to 2×10-16 which is not negligible in severely ill-posed problems.

Figure 20. n0=1.5,2c=λ/8, b=λ/2, σ=0, Λ=10-6.

Figure 20. n0=1.5,2c=λ/8, b=λ/2, σ=0, Λ=10-6.

Figure 21. n0=1.5,2c=λ/8, b=λ, σ=0, Λ=10-6.

Figure 21. n0=1.5,2c=λ/8, b=λ, σ=0, Λ=10-6.

Figure 22. θ[-π/2,-θcr][θcr,π/2],2c=λ/8, σ=0, Λ=10-6.

Figure 22. θ∈[-π/2,-θcr]∪[θcr,π/2],2c=λ/8, σ=0, Λ=10-6.

Example 1

In this example, we mainly show how to choose the truncated number Λ depending on the noise level σ, and investigate the influence of the measurements height b. In this example, we set n0=1.2 and use scattering data by incident angles from -π/2 to -π/2, and do several experiments to reconstruct the scatterer by scattering field from b=λ/2 and b=λ, with the scatterers being apart by 2c=λ2,λ4,λ8, respectively.

Figures show where the two scatterers lie apart by λ2, and the scattering field is detected on the segment Γ with b=λ2. Figures and show the results when σ=0, and taking the truncated number Λ=10-8 and 10-6, respectively. It is readily seen that a truncated number should be small when noise level is low.

Next, we turn to the examples when the noise level increases. Figures and show the reconstruction result when the noise level is σ=10-6, and the truncated numbers are Λ=10-6 and Λ=10-3, respectively.

Figures and show the reconstruction results when the noise level is σ=10-3, and the truncated numbers are Λ=10-6 and Λ=10-3, respectively. It is clear in Figure that the noise fails the reconstruction of the scatterer, but an appropriate truncated number in Figure retrieves the resolution.

Now we continue the experiments when b=λ, with all the other data the same as before. Figures show (σ,Λ)=(0,10-6), (σ,Λ)=(10-6,10-6) and (σ,Λ)=(10-3,10-3), respectively. Compared to those when b=λ/2, the reconstructions seem to be poor, but they can also give an acceptable resolution.

Next, we reduce the distance between the two scatterers to λ/4. Figures and show the results when noise levels are σ=0 and σ=10-3, with measurements height b=λ/2. Figures and show the results when noise levels are σ=0 and σ=10-3, with measurements height b=λ.

In the end of this example, when the distance between the two scatterers is reduced to λ/8, the reconstruction results only show the relative position of the scatterers but unable to clearly distinguish them, as is shown in Figures and .

Example 2

In this example, we show how the index of fraction in the lower half-space n0 influences the reconstruction. Here, the distance between the two scatters is still λ/8, which cannot distinguish the scatterers in the previous example. But when we set n0=1.5 instead of 1.2, the reconstruction is much better. The results are shown in Figures and , with measurements height λ/2 and λ, respectively. Especially, when the measurements height is λ/2, the two scatters can be distinguished clearly.

Figure 23. θ[-θcr,θcr], 2c=λ/8, σ=0, Λ=10-6.

Figure 23. θ∈[-θcr,θcr], 2c=λ/8, σ=0, Λ=10-6.

Example 3

In this example, we show how the incident angle influences the reconstruction. Here, we use all the parameters in Example 2 when the measurements height is λ/2. The critical angle when ut becomes evanescent wave is θcr=arcsin(1/n0). So, we test the reconstruction when the incident angle varies between [-π/2,-θcr][θcr,π/2] in Figure , and when the incident angle varies between [-θcr,θcr] in Figure . The results tell us that fewer incident angles make the reconstruction poorer, but if we only use the evanescent waves, the results would also be acceptable.

The experiments show that the close measurements can lead to better resolution, and the truncated number plays a very important role in the reconstruction. In practice, we can get a good resolution when the truncated number is chosen close to the noise level. Besides, the larger refraction index of the lower half-space can improve the resolution of the reconstruction. More incident angles make the reconstruction better, but if we only use the evanescent waves, the results would also be acceptable for small scatterers. So, we can conclude that the evanescent waves play a very important role in near-field optics. But the exponentially ill-posedness generated by evanescent waves should be handled carefully by special regularization method, for example, the truncated SVD combined with moment method in this paper.

5 Conclusion

The inverse scattering problem in two-layered background is common and important in near-field optics. Based on the model of PSTM, we give an error bound of the inverse problem. We discuss inverse linear problem in detail and give the moment method with truncated SVD to handle the severely ill-posed problem with noisy data. Numerical experiments show that the method can give a resolution much better than λ/2.

There are two important future directions of the present study. The first concerns the more complicated three-dimensional model, where the three-dimensional Fredholm integral equation of the first kind should be solved. Another research direction is concerned with a finer error estimate of the Born approximation theoretically in our model.

Acknowledgments

The authors would like to thank the referees for their careful reading and valuable comments which led to improvement of the quality of our manuscript.

Notes

1 The research was supported by the National Natural Science Foundation of China (NSFC) [grant number 10971083], [grant number 11371172].

References

  • Carney PS, Schotland JC. Near-field tomography. Inside Out: Inverse Prob. Appl. 2003;47:133–168.
  • Carney PS, Schotland JC. Inverse scattering for near-field microscopy. Appl. Phys. Lett. 2000;77:2798–2800.
  • Carney PS, Schotland JC. Three-dimensional total internal reflection microscopy. Opt. Lett. 2001;26:1072–1074.
  • Carney PS, Schotland JC. Theory of total-internal-reflection tomography. J. Opt. Soc. Am. A. 2003;20:542–547.
  • Carney PS, Schotland JC. Determination of three-dimensional structure in photon scanning tunnelling microscopy. J. Opt. A: Pure Appl. Opt. 2002;4:S140.
  • Courjon D, Sarayeddine K, Spajer M. Scanning tunneling optical microscopy. Opt. Commun. 1989;71:23–28.
  • Bao G, Li P. Inverse medium scattering for the Helmholtz equation at fixed frequency. Inverse Prob. 2005;21:1621–1641.
  • Bao G, Li P. Inverse medium scattering problems in near-field optics. Int. J. Comput. Math. 2007;25:252–265.
  • Markel VA, Mital V, Schotland JC. Inverse problem in optical diffusion tomography. iii. inversion formulas and singular-value decomposition. J. Opt. Soc. Am. A. 2003;20:890–902.
  • Schotland JC, Markel VA. Inverse scattering with diffusing waves. J. Opt. Soc. Am. A. 2001;18:2767–2777.
  • Moskow S, Schotland JC. Convergence and stability of the inverse scattering series for diffuse waves. Inverse Prob. 2008;24:065005, 16.
  • Akduman I, Alkumru A. A generalized art algorithm for inverse scattering problems related to buried cylindrical bodies. Inverse Prob. 1999;11:1125–1135.
  • Idemen M, Akduman I. Two-dimensional inverse scattering problems connected with bodies buried in a slab. Inverse Prob. 1999;6:749–766.
  • Xu Y. Radiation condition and scattering problem for time-harmonic acoustic waves in a stratified medium with a nonstratified inhomogeneity. IMA J. Appl. Math. 1995;54:9–29.
  • Li P. Coupling of finite element and boundary integral methods for electromagnetic scattering in a two-layered medium. J. Comput. Phys. 2010;229:481–497.
  • Bao G, Chen Y, Ma F. Regularity and stability for the scattering map of a linearized inverse medium problem. J. Math. Anal. Appl. 2000;247:255–271.
  • Arridge S, Moskow S, Schotland JC. Inverse Born series for the Calderon problem. Inverse Prob. 2012;28: 035003, 16.
  • Epstein CL, Schotland J. The bad truth about laplace’s transform. SIAM Rev. 2008;50:504–520.
  • Thamban Nair M, Pereverzev SV. Regularized collocation method for fredholm integral equations of the first kind. J. Complexity. 2007;23:454–467.
  • Kirsch A. An introduction to the mathematical theory of inverse problems. Vol. 120, Applied Mathematical Sciences. New York (NY): Springer-Verlag; 1996.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.