Research Article
[Retracted] Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks
Figure 17
Security analysis in terms of semantic and statistical secrecy. Top row: resultant images at different stages. Bottom row: corresponding image histograms. (a) Cover image. (b) Encrypted image. (c) Encrypted stego image. (d) Stego image. (e) Cover image. (f) Encrypted image. (g) Encrypted stego image. (h) Stego image.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |