Research Article

Graph Crypto-Stego System for Securing Graph Data Using Association Schemes

Figure 4

(a) Original complete graph K5. (b) Cover image. (c) Encrypted graph. (d) Graph stego image. (e) Extracted image. (f) Correctly decrypted image.
(a)
(b)
(c)
(d)
(e)
(f)