Research Article

Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training

Figure 4

The architecture of the decoder. The first five convolutional blocks utilize LeakyReLU activation function while the last one utilizes sigmoid activation function.