Figure 2From: Progressive Exponential Clustering-Based Steganography An example of the working of the Progressive Exponential Clustering (PEC) algorithm. Back to article page