Research Article

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking

Figure 7

The average rate of low-throughput periods for the original and watermarked flows with different parameters. (a) Traffic A, (b) Traffic B.
(a) Traffic A: CAIDA
(b) Traffic B: Google Chrome Remote Desktop