Fig. 25From: A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC systemA description of the residual image computation that can be achieved in case the container image substation during the original image leakage, as it shown in column 3, 4 and 5 then enhancement output can be seen in 3rd, 4th and 5th rows with enhancement rate of 5x, 10x and 15x of residual imageBack to article page