Fig. 2From: Geolocation of covert communication entity on the Internet for post-steganalysisSchematic diagram of TNN methodBack to article page