Research Article

Graph Crypto-Stego System for Securing Graph Data Using Association Schemes

Figure 3

(a) Original directed graph with 5 nodes. (b) Cover image. (c) Encrypted graph. (d) Graph stego image. (e) Extracted image. (f) Correctly decrypted image.
(a)
(b)
(c)
(d)
(e)
(f)