Abstract

Cryptography has recently become a critical area to research and advance in order to transmit information safely and securely among various entities, especially when the transmitted data is classified as crucial or important. This is due to the increase in the use of the Internet and other novel communication technology. Many businesses now outsource sensitive data to a third party because of the rise of cloud computing and storage. Currently, the key problem is to encrypt the data such that it may be stored on an unreliable server without sacrificing the ability to use it effectively. In this paper, we propose a graph encryption scheme by using cryptography and steganography. Data is encrypted using association schemes over finite abelian groups and then hiding the encrypted data behind randomly chosen cover image. We implemented and evaluated the efficiency of our constructions experimentally. We provide experimental results, statistical analysis, error analysis, and key analysis that demonstrates the appropriateness and efficiency of the proposed technique.

1. Introduction

Massive-scale database applications that may be represented as graph problems have recently attracted more attention to graph databases, which store, manage, and query large graphs. Large web graphs, online social networks, biological networks, RDF databases, and communication networks are a few examples of applications. As a result, numerous systems have been developed in both academia (such as [16]) and industry to maintain, query, and analyse huge graphs (e.g., Neo4j, Titan, DEX, and GraphBase). In paper [1], Han et al. proposed a general, disk-based graph engine called TurboGraph to process billion-scale graphs very efficiently by using modern hardware on a single PC. Kyrola and Guestrin [2] developed a new data structure, parallel adjacency lists (PAL), for efficiently managing graphs with billions of edges on disk. In paper [7], a two-layer image encryption scheme is proposed which involves bit-level encryption in the time-frequency domain. In paper [8], logistics, tent maps, and adaptive key generation modules are used to store encrypted image in cloud storage. Additionally, with the introduction of cloud computing, businesses and startups have a natural urge to outsource the storage and management of their databases to a cloud provider. Many database owners, however, are less enthusiastic about storing their databases in the cloud due to growing worries about data security and privacy.

In this paper, we propose a graph encryption method by using cryptography and steganography. We first encrypt the graph database using association schemes and then hide the encrypted data behind a cover image so that there is no suspicion to the data. With the help of cryptography, we can encrypt the original data before communicating it, rendering it unintelligible to outsiders until it is decrypted at the receiving end. Meng et al. [9] developed graph encryption techniques that effectively allow approximative shortest-distance queries on huge encrypted graphs. By creating a number of indexes to store the data required to respond to queries, Liu et al. [10] investigated a graph encryption approach for a crucial graph query type known as top-k Nearest Keyword (kNK) searches. For graph data that supports all-path searches, Xu et al. [11] presented a searchable symmetric encryption system. Zhang et al. [12] presented the Privacy-preserving Graph encryption for Accurate constrained Shortest distance queries (PGAS) that is capable of delivering accurate constrained shortest distance (CSD) queries and ensuring the privacy of the graph data. Wang et al. [13] developed a Secure Graph DataBase (SecGDB) encryption system to encrypt graph structures and enforce private graph queries across the encrypted graph database and to support the shortest distance queries with the least amount of time and storage complexity, and their design specifically makes strategic use of effective additively homomorphic encryption and jumbled circuits.

In cryptography, no matter how impossible they are to crack, plainly visible encrypted messages draw interest. In order to prevent an intruder from discovering the secret data, we can use steganography to hide it in a multimedia file. Different file types can be deployed, but because digital photographs are so common on the Internet, they are preferable. Text, video, image, and even audio data can all be concealed with steganography. In past, cryptography and steganography have been applied to many two-dimensional data files such as images, videos, audio, text, and pdf [1417]. Till now, only cryptographic methods are applied to graph data. In this paper, we use steganography to hide the encrypted graph behind a cover image. Enhanced imperceptibility is achieved by concealing the original information in the cover image’s margins [18, 19].

2. Preliminaries and Notations

2.1. Association Scheme

The study of algebraic combinatorics relies on association schemes (AS), which Bose and Shimamoto established in 1952 [20]. It has significance in design theory, group theory, coding theory, and graph theory. These days, information security is a top priority. Therefore, we study the implications of association schemes in cryptography. For a finite set , let the partition of be denoted by and let . Below is some basic fundamental literature to association scheme.

Definition 1. Let be a partition of , where is a finite set, and let be binary relations on . Then, forms -class association scheme if the subsequent conditions hold: (1)Identity relation: (2) for any relation (3)If then and , where is a constant independent of and for all integers is called symmetric association scheme, if for every relation in and commutative association scheme, if . Here, are called intersection numbers or parameters of . Let the set for and . The elements and in are called th associates if with . It can be easily proved that every symmetric association scheme is commutative. We cite [21] for results of more elementary association schemes.
Sabharwal et al. [22, 23] have constructed nonsymmetric commutative AS for symmetric groups, dihedral groups, and several abelian groups. In [22], nonsymmetric AS has also been constructed for the group in particular.

Theorem 1. Let , where and . For each , the relations in defined by form a nonsymmetric commutative AS, and its intersection numbers are given by where Further, can be determined by solving the following equations: where and .

Proof. Refer [22].

3. Proposed Approach

In the proposed method, we first use association schemes over to encrypt graph data and then use LSB method to hide the graph data behind a cover image. In Theorem 1, each relation is considered as a function from . Thus, the association scheme on (as defined in the previous theorem) represents Vigenère cipher (VC).

3.1. Graph Encryption/Decryption

In our graph encryption technique, a graph is represented by the notation , where denote the set of vertices and denote the set of edges. Here, we consider both directed and undirected graphs. In an undirected graph, each edge is formed by two vertices, represented by , where and , and in a directed graph, the edges have orientations and each edge is represented as an ordered pair of vertices.

The graph data with nodes is first converted in adjacency matrix of order . Let be the encryption key and . Then, we apply AS over on (as defined in Theorem 1). That is, th relation, is applied on to obtain encrypted graph data . Further, this encrypted data is written in binary form and is merged with a cover image by storing them at the LSB of the cover image, which results in a stego image as shown in Figure 1. This stego image is then ready for secure transmission without any suspicion of the data. The steps for producing a graph stego image using this method are covered in Algorithm 1.

Similar strategies have been adopted to recover the data from the graph stego image that is provided in Algorithm 2. For decryption, we first determine decryption key from (by solving sets of equations in Theorem 1). Then, we apply AS over on the encrypted graph data to obtain matrix which is the same as adjacency matrix of original graph data as shown in Figure 2.

Encryption of data alone does not provide appropriate security. Applying steganography will hide the secret information in a multimedia file, allowing unnoticed secure transmission of the secret data in an insecure network.

1: Input: Secret Graph data(G), Cover Image(CI), AS key(k)
2: Output: Graph Stego Image
3: procedure Encryption
   1. Write the adjacency matrix of the given graph data which is of order .
   2. Find such that
   3. Apply relation of AS over (as defined in Theorem 1) on to obtain the cipher graph data .
   4. Store the number of nodes at the first bits of .
   5. Store the bits of the encrypted data at the remaining LSB of the RGB components of the .
4: end procedure
1: Input: Graph Stego Image(GSI), AS key(k)
2: Output: Secret Data retrieved
3: procedure Decryption
   1. Obtain the hidden data and number of nodes from RGB components of the GSI.
   2. Find decryption key as discussed in Theorem 1 from key .
   3. Find such that .
   4. Apply relation of AS over (as defined in Theorem 1) on to obtain decrypted graph data.
4: end procedure

4. Experimental Results

By statistically analysing the suggested approach, this part investigates the numerical simulations and analytical results for secure graph data transmission. A laptop with the features 12th Gen Intel(R) Core (TM) i7-1255U CPU at 1.70 GHz is used to execute this technique. MATLAB R2021b is used for this purpose. We have selected two graphs: a directed graph with 5 nodes (Figure 3(a)) and a complete graph K5 (Figure 4(a)) and two cover images (Figures 3(b) and 4(b)). Using an association scheme, the secret graph data is first encrypted (Figures 3(c) and 4(c)). After concealing this encrypted data in the LSB of the cover image, we are left with the graph stego image as displayed in Figures 3(d) and 4(d). Figures 3(e) and 4(e) show the extracted image. We note that there was no distortion in the retrieved data (see Figures 3(f) and 4(f)). It can be seen that there is an accurate recovery of the original graph data without any loss or error of information. In order to assess the resilience of the cryptosystem, the examination of cover image and graph stego image has been described in terms of their change rate of number of pixels (NPCR), unified average changing intensity (UACI), mean square error (MSE), peak noise-to-signal ratio (PNSR), correlation coefficient (CC), histogram analysis, and pixel intensity correlation graphs.

4.1. Histogram Analysis

The histogram is a graphical representation of the frequency and pixel intensity value of an image. The cryptosystem’s robustness depends on the histogram. In a pixel intensity correlation graph of an image, the -axis represents the pixel values (ranging from 0 to 255) and the -axis represents the corresponding number of pixels in the image. This graph gives an overall idea about the intensity distribution of an image. The histograms and pixel intensity correlation graphs for the RGB components of the cover image and the graph stego image are given in Figures 58, respectively, from which we can deduce that the histogram of the image which is used to hide the data is similar to the histogram of the image in which data is hidden. This indicates that no one can predict that any information is encoded in the graph stego image.

4.2. Error Analysis

The analysis of the cover image and the graph stego image, along with its NPCR, UACI, MSE, PNSR, and CC values, is covered in this part. These values are listed in Tables 1 and 2.

4.2.1. Mean Square Error

According to the following formula, the MSE, a measure of peak error for the RGB components of two images, is calculated as follows: where and are the pixels and and are the pixel sizes of the image.

The values of MSE depict that the graph stego image with embedded encrypted graph data resembles with the cover image.

4.2.2. Peak Noise-to-Signal Ratio

According to the following formula, the PNSR, which reflects a measure of peak error in both the images, is calculated as follows: where is the maximum possible value of pixels of the image.

The high PNSR values of graph stego image and cover image as shown represent the similarity of these images.

4.2.3. Correlation Coefficient

The following formula is used to determine the CC between cover image and graph stego image. where and are mean of the two images.

CC can range from to between two images. When the value of CC is , there is a strong positive linear correlation between these images, and when it is , there is a negative correlation. If the value is near to , it means there is no connection between these images.

4.2.4. Number of Pixel Change Rate

The NPCR counts the variations in pixel counts between two images. If the cover image and the graph stego image are denoted by and , respectively, then the following formula can be used to determine NPCR between the two images: where

4.2.5. Unified Average Changing Intensity

The UACI value measures the average of variations in pixel intensity values between two images. The following is the formula for computing UACI between graph stego image and cover image:

4.3. Key Space Analysis

Key space is a term used in cryptography to describe the largest key that can be used; therefore, key space is a function of key length. Individual analysis was conducted in this work to confirm the robustness of the cryptosystem in the event of an attack. Data is encrypted using an encryption key in cryptography over AS. The encryption key cannot be used directly on the original data, even if the attacker knows it. The proposed approach is used to calculate the subkey from the encryption key.

4.3.1. Key Sensitivity Analysis

The key sensitivity is one of the most important elements that determines a security system’s robustness. Greater cryptosystem security is ensured by high key sensitivity, which prevents sensitive data from being taken without the precise key. In the suggested method, if any mismatch is found during the decryption stage, the original data cannot be restored. Even if the decryption key slightly alters, the output will be corrupted and damaged. When the key used for decryption and encryption is identical, the original data can be retrieved. Communication requirements often increase because the ciphertexts in these ciphers are substantially larger than the plaintexts.

5. Comparison

The methods described in [1013, 24] mostly employ cryptographic techniques to render security. Liu et al. [10] developed a graph encryption strategy for an important graph query type known as top-k Nearest Keyword (kNK) searches by building a number of indexes to store the data needed to answer to queries. When performing kNK queries on an encrypted graph, privacy information would be leaked from both the graph and the queries. Xie and Eric introduced CryptGraph in [24], which uses ring-based homomorphic encryption techniques to encrypt graphs. Typically, homomorphic ciphers do not offer verified computing on their own. Communication requirements often increase because the ciphertexts in these ciphers are substantially larger than the plaintexts. The proposed graph crypto-stego methodology makes use of both cryptographic and steganographic methods to secure graph data. This technique uses association schemes over finite abelian group for encryption which is a new technique and has not been employed in graph encryption before. According to Tables 1 and 2, the embedding rate of the suggested technique is 0.99 using the PSNR value, and the data retrieval is lossless.

6. Conclusion

In this article, we present an association scheme-based cryptography method along with steganography for the secure transfer of graph data. Till now, only cryptographic methods are applied to graph data. Here, we use steganography to hide the encrypted graph behind a cover image. This method enables the safe and secure delivery of critical information over an insecure network. The bits of the secret data are preserved at the LSB of the cover image after being initially encrypted with a private key and an association scheme over an abelian group. The receiver uses the association scheme with a decryption key that is derived from the encryption key in order to recover the original information. Since the extracted data and the original data are same, there has apparently been no information loss. We have presented experimental data, statistical analysis, and error analysis for directed graph and complete graph that demonstrate the viability of our method for delivering data securely over any open network. This method can be used to secure any type of graphs and is likely to be crucial in developing new steganography and cryptography methods. Finding more uses of association schemes to conceal two-dimensional data in the form of video and audio in another multimedia file would be a worthwhile research endeavour.

Data Availability

The data used to support the findings of this study are available from the corresponding authors upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.