Research Article
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking
Figure 7
The average rate of low-throughput periods for the original and watermarked flows with different parameters. (a) Traffic A, (b) Traffic B.
(a) Traffic A: CAIDA |
(b) Traffic B: Google Chrome Remote Desktop |