Open Access Open Access  Restricted Access Subscription Access

Steganalysis of Digital Images Using a Deep Fractal Network Approach

Prof. A.R. Mate, Mayur Shinde, Danish Shaikh, Pratiksha Raut

Abstract


This paper presents the design of an automated system for detecting and cleaning dust on photovoltaic (PV) modules. Dust accumulation significantly reduces the efficiency of PV systems by blocking sunlight from reaching the panel surface. The proposed system monitors the voltage and current output from the PV module to calculate power, helping identify any drop in performance due to dust.

The circuit design and simulation were carried out using Proteus 8 Professional. The simulation results confirmed that the system could detect a decrease in power output caused by dust buildup. In response, the motor-driven cleaning mechanism was automatically activated. Development is ongoing, and a working prototype is planned to validate the system’s functionality in real-world conditions.

 


Full Text:

PDF

References


Boroumand, M., Chen, M., & Fridrich, J. (2019). Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 14(5), 1181–1193. https://doi.org/10.1109/TIFS.2018.2871749

Larsson, G., Maire, M., & Shakhnarovich, G. (2017, April). FractalNet: Ultra-deep neural networks without residuals. In Proceedings of the 5th International Conference on Learning Representations (ICLR). Toulon, France. Retrieved from https://openreview.net/forum?id=S1VaB4cex

Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, 1(3), 32–44. https://doi.org/10.1109/MSECP.2003.1203220

Mielikainen, J. (2006). LSB matching revisited. IEEE Signal Processing Letters, 13(5), 285–287. https://doi.org/10.1109/LSP.2006.870421

Sedighi, V., Cogranne, R., & Fridrich, J. (2016). Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security, 11(2), 221–234. https://doi.org/10.1109/TIFS.2015.2499861

Holub, V., & Fridrich, J. (2012, December). Designing steganographic distortion using directional filters. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 234–239). https://doi.org/10.1109/WIFS.2012.6412630

Pevný, T., Filler, T., & Bas, P. (2010). Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding (pp. 161–177). Springer. https://doi.org/10.1007/978-3-642-16435-4_12

Li, B., Wang, M., Huang, J., & Li, X. (2014, October). A new cost function for spatial image steganography. In Proceedings of the IEEE International Conference on Image Processing (ICIP) (pp. 4206–4210). https://doi.org/10.1109/ICIP.2014.7025796

Ker, A. D. (2005). Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6), 441–444. https://doi.org/10.1109/LSP.2005.847889

Vapnik, V. (2013). The nature of statistical learning theory (2nd ed.). Springer. https://doi.org/10.1007/978-1-4757-3264-1


Refbacks

  • There are currently no refbacks.