Research Article

Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training

Figure 6

Example of embedding secret messages with different payloads. “Message 1,” “message 2,” and “message 3” are binary secret images selected from NMIST dataset, and when each of them is embedded, the embedding capacity is increased by 1/3 bpc.