Research Article

Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training

Figure 2

The architecture of the HRJS. The encoder is used to generate the DCT coefficients of the stego image, while the decoder is used to reconstruct the original secret message. The attack module simulates JPEG compression. The IDCT module and DCT module convert the image into spatial domain and JPEG domain, respectively. The discriminator is used to identify whether a given image conceals the secret message.