Research Article

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking

Figure 2

The framework of the proposed NFW scheme.