Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Figure 6

Characterization of malicious insertion, deletion, and update attacks on range 1 (100–999) of data values.
796726.fig.006