Fig. 3From: An adaptive steganography insertion technique based on wavelet transformUnprocessed samples of the customized databaseBack to article page