Fig. 1From: Geolocation of covert communication entity on the Internet for post-steganalysisSchematic diagram of SLG methodBack to article page