Research Article
[Retracted] Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks
Figure 3
Pictured from left to right are the Laplacian operators with different parameter settings. (a). (b). (c). (d). (e).
(a) |
(b) |
(c) |
(d) |
(e) |