Research Article
Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training
Figure 4
The architecture of the decoder. The first five convolutional blocks utilize LeakyReLU activation function while the last one utilizes sigmoid activation function.