Fig. 3From: Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a surveyAn example from (Chen et al. 2016) showing why structural artifacts matter. T1,T2, and T3 are balanced BSTs. a Tree T1, b Tree T2, and c Tree T3Back to article page