Research Article

[Retracted] Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks

Figure 3

Pictured from left to right are the Laplacian operators with different parameter settings. (a). (b). (c). (d). (e).
(a)
(b)
(c)
(d)
(e)