Fig. 10From: Coverless image steganography using morphed face recognition based on convolutional neural networkAn example of proposed data hiding scheme. Illustration of the overall process of secret messages embedding, sending, receiving and extraction using the proposed methodBack to article page