Research Article

Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network

Figure 5

The loss curve of training extraction model. (a) Training loss of extraction model of image processing generation model based on DCGAN. (b) Training loss of extraction model of image processing generation model based on WGAN-GP.
(a)
(b)