Research Article
Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network
Table 1
The recovery accuracy of the processed stego image generated from different image processing generation model under the condition of Gaussian noise interference.
|