Research Article
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking
Figure 8
Watermark detection performances for different schemes under varying network jitter. (a) Traffic A, (b) Traffic B.
(a) Traffic A: CAIDA |
(b) Traffic B: Google Chrome Remote Desktop |