Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 8
Characterization of malicious update attacks on digit frequency.
| | | | | | | | Characteristic |
| 0 | 8.63 | 1435163 | 5.71 | 948993 | −486170 | −33.88% | ↓High to Low | 1 | 18.02 | 2995771 | 19.01 | 3159784 | +164013 | +5.47% | ↑Low to High | 2 | 19.48 | 3238818 | 20.97 | 3485451 | +246633 | +7.61% | ↑Low to High | 3 | 11.70 | 1945572 | 11.91 | 1980325 | +34753 | +1.79% | ↑Low to High | 4 | 8.22 | 1366062 | 8.52 | 1416889 | +50827 | +3.72% | ↑Low to High | 5 | 7.48 | 1244089 | 8.22 | 1365803 | +121714 | +9.78% | ↑Low to High | 6 | 6.65 | 1105210 | 6.90 | 1146565 | +41355 | +3.74% | ↑Low to High | 7 | 6.45 | 1072363 | 7.14 | 1187586 | +115223 | +10.74% | ↑Low to High | 8 | 6.60 | 1097669 | 6.78 | 1127651 | +29982 | +2.73% | ↑Low to High | 9 | 6.76 | 1123819 | 4.85 | 805489 | −318330 | −28.33% | ↓High to Low |
|
|