Research Article
Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training
Table 4
The decoding accuracy under different JPEG compression attacks where HRJS is, respectively, implemented without and with attack module. “—” denotes no JPEG compression.
|