Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Algorithm 6

Characterization of malicious data modifications.
       For Each        digit  do
         Extract from
(3)          = /total_digit_count
(4)         Generate     from   (by using Algorithm 2)
         Δ =
         
(7)       End For
       For Each        length  do
         Extract from
      /total_length_count
     Generate from (by using Algorithm 3)
      =
      =   *  100
  End For
  For Each        range  do
     Extract from
      = /total_range_count
     Generate from (by using Algorithm 4)
(19)      
     
  End For