Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 13
Characterization of malicious modifications on length of data values.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The detailed experiments for this set of attacks are presented in the Appendix (Tables 19(a)–19(f)). |