Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Algorithm 1

Watermark generation.
   = digit sub-watermark generation()
           //See Algorithm 2
   = length sub-watermark generation()
            See Algorithm 3
   = range sub-watermark generation()
            See Algorithm 4
  
   , )
  
  Register   to