Fig. 7From: Coverless image steganography based on DenseNet feature mappingRobustness curves on ImageNet with respect to different geometric attacks: a center cropping, b edge cropping, c rotation, and d translationBack to article page