

Steganalysis of Digital Images Using a Deep Fractal Network Approach
Abstract
This paper presents the design of an automated system for detecting and cleaning dust on photovoltaic (PV) modules. Dust accumulation significantly reduces the efficiency of PV systems by blocking sunlight from reaching the panel surface. The proposed system monitors the voltage and current output from the PV module to calculate power, helping identify any drop in performance due to dust.
The circuit design and simulation were carried out using Proteus 8 Professional. The simulation results confirmed that the system could detect a decrease in power output caused by dust buildup. In response, the motor-driven cleaning mechanism was automatically activated. Development is ongoing, and a working prototype is planned to validate the system’s functionality in real-world conditions.
References
Boroumand, M., Chen, M., & Fridrich, J. (2019). Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 14(5), 1181–1193. https://doi.org/10.1109/TIFS.2018.2871749
Larsson, G., Maire, M., & Shakhnarovich, G. (2017, April). FractalNet: Ultra-deep neural networks without residuals. In Proceedings of the 5th International Conference on Learning Representations (ICLR). Toulon, France. Retrieved from https://openreview.net/forum?id=S1VaB4cex
Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, 1(3), 32–44. https://doi.org/10.1109/MSECP.2003.1203220
Mielikainen, J. (2006). LSB matching revisited. IEEE Signal Processing Letters, 13(5), 285–287. https://doi.org/10.1109/LSP.2006.870421
Sedighi, V., Cogranne, R., & Fridrich, J. (2016). Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security, 11(2), 221–234. https://doi.org/10.1109/TIFS.2015.2499861
Holub, V., & Fridrich, J. (2012, December). Designing steganographic distortion using directional filters. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 234–239). https://doi.org/10.1109/WIFS.2012.6412630
Pevný, T., Filler, T., & Bas, P. (2010). Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding (pp. 161–177). Springer. https://doi.org/10.1007/978-3-642-16435-4_12
Li, B., Wang, M., Huang, J., & Li, X. (2014, October). A new cost function for spatial image steganography. In Proceedings of the IEEE International Conference on Image Processing (ICIP) (pp. 4206–4210). https://doi.org/10.1109/ICIP.2014.7025796
Ker, A. D. (2005). Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6), 441–444. https://doi.org/10.1109/LSP.2005.847889
Vapnik, V. (2013). The nature of statistical learning theory (2nd ed.). Springer. https://doi.org/10.1007/978-1-4757-3264-1
Refbacks
- There are currently no refbacks.