Research Article
Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network
Table 4
The testing error of the processed stego image generated from different image processing generation models with different steganalyzers.
|