Research Article
Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network
Figure 6
Recovery accuracy of secret information corresponding to different image processing models. (a) Recovery accuracy of secret information of image processing generation model based on DCGAN. (b) Recovery accuracy of secret information of image processing generation model based on WGAN-GP.
(a) |
(b) |