Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Table 18

Characterization of malicious attacks on digit frequency (deterministic).
(a) Characterization of malicious insertion attacks on digit frequency ( , attack rate = 10%)

Δ Δ Characteristic

08.442473458.4027085823513+9.51%↑Low to High
116.2847736216.3752753550173+10.51%↑Low to High
219.8858261619.9764374561129+10.49%↑Low to High
311.3733337811.3436547132093+9.63%↑Low to High
48.832587488.7928325124503+9.47%↑Low to High
58.312435548.2426551021956+9.01%↑Low to High
67.142093997.0922841819019+9.08%↑Low to High
76.401875866.4120665919073+10.17%↑Low to High
86.491902686.5120973719469+10.23%↑Low to High
96.862010506.8822165320603+10.25%↑Low to High

(b) Characterization of malicious insertion attacks on digit frequency ( , attack rate = 90%)

Δ Δ Characteristic

08.442473458.51471852224507+90.77%↑Low to High
116.2847736216.73928331450969+94.47%↑Low to High
219.8858261619.971107797525181+90.14%↑Low to High
311.3733337811.70649150315772+94.72%↑Low to High
48.832587488.57475532216784+83.78%↑Low to High
58.312435547.99443279199725+82.00%↑Low to High
67.142093996.86380768171369+81.84%↑Low to High
76.401875866.36353031165445+88.20%↑Low to High
86.491902686.48359339169071+88.86%↑Low to High
96.862010506.83378696177646+88.36%↑Low to High

(c) Characterization of malicious deletion attacks on digit frequency ( , attack rate = 10%)

Δ Δ Characteristic

08.442473458.48223528−23817−9.63%High to Low
116.2847736216.27429114−48248−10.11%High to Low
219.8858261619.74520475−62141−10.67%High to Low
311.3733337811.40300483−32895−9.87%High to Low
48.832587488.83232703−26045−10.07%High to Low
58.312435548.37220577−22977−9.43%High to Low
67.142093997.19189555−19844−9.48%High to Low
76.401875866.41168921−18665−9.95%High to Low
86.491902686.49171131−19137−10.06%High to Low
96.862010506.83180196−20854−10.37%High to Low

(d) Characterization of malicious deletion attacks on digit frequency ( , attack rate = 90%)

Δ Δ Characteristic

08.442473458.8925612−221733−89.65%High to Low
116.2847736218.1452276−425086−89.05%High to Low
219.8858261619.8057072−525544−90.20%High to Low
311.3733337811.2232342−301036−90.30%High to Low
48.832587488.2423758−234990−90.82%High to Low
58.312435547.3821281−222273−91.26%High to Low
67.142093996.5318815−190584−91.01%High to Low
76.401875866.6219071−168515−89.83%High to Low
86.491902686.6719239−171029−89.89%High to Low
96.862010506.5218780−182270−90.66%High to Low

(e) Characterization of malicious update attacks on digit frequency ( , attack rate = 10%)

Δ Δ Characteristic

08.4380482473458.492483571012+0.41%↑Low to High
116.2849647736216.464811863824+0.80%↑Low to High
219.8756558261619.81579315−3301−0.57%High to Low
311.3730233337811.16326311−7067−2.12%High to Low
48.8270552587488.82258020−728−0.28%High to Low
58.308722435548.36244519965+0.40%↑Low to High
67.1435392093997.17209680281+0.13%↑Low to High
76.39941875866.4218767892+0.05%↑Low to High
86.4908951902686.49189845−423−0.22%High to Low
96.8587182010506.81199111−1939−0.96%High to Low

(f) Characterization of malicious update attacks on digit frequency ( , attack rate = 90%)

Δ Δ Characteristic

08.4380482473458.462484621117+0.45%↑Low to High
116.2849647736218.8455333475972+15.91%↑Low to High
219.8756558261619.10560965−21651−3.72%High to Low
311.3730233337811.7434466511287+3.39%↑Low to High
48.8270552587488.16239767−18981−7.34%High to Low
58.308722435547.35215727−27827−11.43%High to Low
67.1435392093996.58193116−16283−7.78%High to Low
76.39941875866.481903302744+1.46%↑Low to High
86.4908951902686.621943844116+2.16%↑Low to High
96.8587182010506.67195785−5265−2.62%High to Low