Fig. 6From: A coverless steganography method based on generative adversarial networkExperimental results after the model is stableBack to article page