Research Article
[Retracted] Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks
Figure 17
Security analysis in terms of semantic and statistical secrecy. Top row: resultant images at different stages. Bottom row: corresponding image histograms. (a) Cover image. (b) Encrypted image. (c) Encrypted stego image. (d) Stego image. (e) Cover image. (f) Encrypted image. (g) Encrypted stego image. (h) Stego image.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |
| (g) |
| (h) |