Research Article

A Larger Capacity Data Hiding Scheme Based on DNN

Figure 12

The resulting images of the attack experiment and the PSNR and SSIM between the extracted image and the secret image. The secret image is displayed in the size of the carrier image.