Research Article

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking

Figure 3

The process of the insider swapping algorithm.