Research Article

Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network

Figure 2

The structure of the extraction model.