Fig. 2From: Stego key recovery method for F5 steganography with matrix encodingExtraction procedure of F5 steganographyBack to article page