Fig. 3From: Coverless image steganography based on DenseNet feature mappingThe process of generating hash sequenceBack to article page