Fig. 7From: A coverless steganography method based on generative adversarial networkSeveral examples on the LFW datasetBack to article page