Research Article
Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training
Figure 6
Example of embedding secret messages with different payloads. “Message 1,” “message 2,” and “message 3” are binary secret images selected from NMIST dataset, and when each of them is embedded, the embedding capacity is increased by 1/3 bpc.