Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Algorithm 6
Characterization of malicious data modifications.
For Each digit do | Extract from | (3) = /total_digit_count | (4) Generate from (by using Algorithm 2) | Δ = − |
| (7) End For | For Each length do | Extract from | /total_length_count | Generate from (by using Algorithm 3) | = − | = * 100 | End For | For Each range do | Extract from | = /total_range_count | Generate from (by using Algorithm 4) | (19) |
| End For |
|