Research Article

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking

Figure 10

Watermark detection performances for different schemes with the real channel interference. (a) Traffic A, (b) Traffic B.
(a) Traffic A: CAIDA
(b) Traffic B: Google Chrome Remote Desktop