Fig. 1From: Defeating data hiding in social networks using generative adversarial networkThe framework of the proposed methodBack to article page