Research Article

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking

Figure 8

Watermark detection performances for different schemes under varying network jitter. (a) Traffic A, (b) Traffic B.
(a) Traffic A: CAIDA
(b) Traffic B: Google Chrome Remote Desktop