Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Algorithm 5
Watermark verification.
Compute for (by using Algorithm 1) | Obtain from CA | Extract from | = Decrypt(, ) | For to length() Do | If = Then | match_count = match_count + 1 | End if | total_count = total_count + 1 | End For | = match_count/total_count * 100 | = 1 – | If ≠ 0 Then | Database Relation is tempered with distortion rate | End if |
|