Research Article

Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network

Figure 6

Recovery accuracy of secret information corresponding to different image processing models. (a) Recovery accuracy of secret information of image processing generation model based on DCGAN. (b) Recovery accuracy of secret information of image processing generation model based on WGAN-GP.
(a)
(b)