Research Article
Graph Crypto-Stego System for Securing Graph Data Using Association Schemes
Figure 4
(a) Original complete graph K5. (b) Cover image. (c) Encrypted graph. (d) Graph stego image. (e) Extracted image. (f) Correctly decrypted image.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |