Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Figure 3

Watermark distortion rate for malicious insertion, deletion, and update of tuples with different attack rates .
796726.fig.003