Research Article
[Retracted] Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks
Figure 3
Pictured from left to right are the Laplacian operators with different parameter settings. (a). (b). (c). (d). (e).
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |