Research Article
Graph Crypto-Stego System for Securing Graph Data Using Association Schemes
Figure 4
(a) Original complete graph K5. (b) Cover image. (c) Encrypted graph. (d) Graph stego image. (e) Extracted image. (f) Correctly decrypted image.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |