Research Article
Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network
Figure 5
The loss curve of training extraction model. (a) Training loss of extraction model of image processing generation model based on DCGAN. (b) Training loss of extraction model of image processing generation model based on WGAN-GP.
(a) |
(b) |