Rajesh wants to infiltrate the target organization's network. To achieve this, he used a technique that encodes packets with Unicode characters. The target company's IDS fails to recognize these packets, but the target web server successfully decodes them. Which of the following techniques did Rajesh use to evade the IDS system?