Figure 5From: Edge-based image steganography The proposed steganography technique. Back to article page