Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Figure 5

Characterization of malicious insertion, deletion, and update attacks on length 3 of data values.
796726.fig.005