Research Article

[Retracted] Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks

Figure 17

Security analysis in terms of semantic and statistical secrecy. Top row: resultant images at different stages. Bottom row: corresponding image histograms. (a) Cover image. (b) Encrypted image. (c) Encrypted stego image. (d) Stego image. (e) Cover image. (f) Encrypted image. (g) Encrypted stego image. (h) Stego image.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)