Fig. 10From: A coverless steganography method based on generative adversarial networkSafety verification of experimentBack to article page