Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Algorithm 2

Digit sub-watermark generation.
       For Each  tuple        relation   Do
       For Each  attribute        relation     Do
      length = Len
          For     to length – 1  Do
    = Mid ( , , 1)
   digit_frequency ++
   total_digit_count++
           End For
        End For
  End For
  For Each        digit  Do
digit_frequency total_digit_count) * 100
  End For
   total_digit_count
  Return