Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 6
Characterization of malicious insertion attacks on digit frequency.
| | | | | | | | Characteristic |
| 0 | 8.63 | 1435163 | 10.28 | 1785659 | +350496 | +24.42% | Low to High | 1 | 18.02 | 2995771 | 17.24 | 2995771 | 0 | 0 | No change | 2 | 19.48 | 3238818 | 18.64 | 3238818 | 0 | 0 | No change | 3 | 11.70 | 1945572 | 11.20 | 1945572 | 0 | 0 | No change | 4 | 8.22 | 1366062 | 7.86 | 1366062 | 0 | 0 | No change | 5 | 7.48 | 1244089 | 7.16 | 1244089 | 0 | 0 | No change | 6 | 6.65 | 1105210 | 6.36 | 1105210 | 0 | 0 | No change | 7 | 6.45 | 1072363 | 6.17 | 1072363 | 0 | 0 | No change | 8 | 6.60 | 1097669 | 6.32 | 1097669 | 0 | 0 | No change | 9 | 6.76 | 1123819 | 8.78 | 1526545 | +402726 | +35.84% | ↑Low to High |
|
|