Fig. 3From: A coverless steganography method based on generative adversarial networkThe WGAN-GP model used in this paperBack to article page