Fig. 4From: A coverless steganography method based on generative adversarial networkThe process of information hidingBack to article page