Research Article
Graph Crypto-Stego System for Securing Graph Data Using Association Schemes
Figure 3
(a) Original directed graph with 5 nodes. (b) Cover image. (c) Encrypted graph. (d) Graph stego image. (e) Extracted image. (f) Correctly decrypted image.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |