Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 5
Detection of malicious data modifications with different attack rates (
).
| Insertion attack rate | Deletion attack rate | Update attack rate | WAR | WDR | Temper detection |
| 10% | 10% | 10% | 15.85 | 84.15 | Yes (High) | 30% | 30% | 30% | 10.98 | 89.02 | Yes (High) | 50% | 50% | 50% | 10.28 | 89.72 | Yes (High) | 70% | 70% | 70% | 13.33 | 86.67 | Yes (High) | 90% | 90% | 90% | 10.98 | 89.02 | Yes (High) |
|
|