Fig. 1From: A coverless steganography method based on generative adversarial networkStructure of generative adversarial networkBack to article page