Fig. 2From: Robust steganography in practical communication: a comparative studyUse case of robust steganographyBack to article page