2016
DOI: 10.14257/ijsia.2016.10.3.12
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Review of Network Flow Watermarking In Anonymity Systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Traic analysis is an efective method to analyze network traic behavior, and network traic watermarking is an active traic analysis approach that embeds watermark data with speciic patterns into the traic low to realize traic tracking [16]. Up to now, varieties of network traic watermarking, such as inter-packet delay-based watermarking and interval-based watermarking, have been used to attack anonymous systems like Tor [20].…”
Section: Trafic Analysismentioning
confidence: 99%
“…Traic analysis is an efective method to analyze network traic behavior, and network traic watermarking is an active traic analysis approach that embeds watermark data with speciic patterns into the traic low to realize traic tracking [16]. Up to now, varieties of network traic watermarking, such as inter-packet delay-based watermarking and interval-based watermarking, have been used to attack anonymous systems like Tor [20].…”
Section: Trafic Analysismentioning
confidence: 99%
“…Therefore, it cannot handle time analysis attack, multi stream attack, and mean square autocorrelation attack. Lu et al [ 25 ] introduced some different schemes of watermarking in anonymity systems and discussed some attacks against it, putting forward some ideas for improving watermarking.…”
Section: Related Workmentioning
confidence: 99%
“…Both ICBW and DIBCW embed watermarks use the combined interval centroid difference value in the A and B groups [37], [38]. The ICBFW watermarking scheme proposed by Zhang et al uses only one set of intervals to embed the watermark [14], [39].…”
Section: Analysis Of the Invisibility Of Common Interval Centroid Based Watermarking Schemementioning
confidence: 99%