Fig. 3From: Geolocation of covert communication entity on the Internet for post-steganalysisMethod frame diagramBack to article page