Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Table 13

Characterization of malicious modifications on length of data values.

Insertion attackDeletion attackUpdate attack
Attack rate10%90%10%90%10%90%
% % % % % %

1+9.55100.58−8.94−91.25−3.65−38.67
2+10.2089.64−10.21−89.281.896.13
3+10.3589.91−9.98−88.921.5711.03
4+9.4187.71−10.16−91.93−2.94−12.33

The detailed experiments for this set of attacks are presented in the Appendix (Tables 19(a)–19(f)).