Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
| Symbol | Description |
| | Database relation | PK | Primary key attribute | | The th tuple | | The th attribute | | Number of tuples in a database relation | | Number of attributes in a database relation | | Digit sub-watermark | | Length sub-watermark | | Range sub-watermark | | Watermark for database relation | | Watermark certificate | SK | Secret key | | The th digit | | The th length | | The th range | | Frequency for digit of data values | | Frequency for length of data values | | Frequency for range of data values | | Relative frequency for digit of data values | | Relative frequency for length of data values | | Relative frequency for range of data values | | Change in frequency of digit | | Change in frequency for length j | | Change in frequency for range k | | Fractional change in digit frequency for digit | | Fractional change in length frequency for length j | | Fractional change in range frequency for range | CA | Certification authority | WAR | Watermark accuracy rate | WDR | Watermark distortion rate |
|
|