Fig. 9From: A coverless steganography method based on generative adversarial networkTwo examples on the ImageNet datasetBack to article page