Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 7
Characterization of malicious deletion attacks on digit frequency.
| | | | | | | | Characteristic |
| 0 | 8.63 | 1435163 | 7.72 | 1256568 | −178595 | −12.44% | High to Low | 1 | 18.02 | 2995771 | 18.40 | 2995771 | 0 | 0 | No change | 2 | 19.48 | 3238818 | 19.89 | 3238818 | 0 | 0 | No change | 3 | 11.70 | 1945572 | 11.95 | 1945572 | 0 | 0 | No change | 4 | 8.22 | 1366062 | 8.39 | 1366062 | 0 | 0 | No change | 5 | 7.48 | 1244089 | 7.64 | 1244089 | 0 | 0 | No change | 6 | 6.65 | 1105210 | 6.79 | 1105210 | 0 | 0 | No change | 7 | 6.45 | 1072363 | 6.59 | 1072363 | 0 | 0 | No change | 8 | 6.60 | 1097669 | 6.74 | 1097669 | 0 | 0 | No change | 9 | 6.76 | 1123819 | 5.89 | 958569 | −165250 | −14.70% | High to Low |
|
|