Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 11
Characterization of malicious deletion attacks on length of data values.
| | | | | | | | Characteristic |
| 1 | 5.74 | 325894 | 6.52 | 325894 | 0 | 0.00 | No change | 2 | 20.19 | 1146469 | 22.92 | 1146469 | 0 | 0.00 | No change | 3 | 48.66 | 2762791 | 41.71 | 2085761 | −677030 | −24.51% | ↓High to Low | 4 | 25.41 | 1442906 | 28.85 | 1442906 | 0 | 0.00 | No change |
|
|