Research Article
Distortion-Free Watermarking Approach for Relational Database Integrity Checking
Algorithm 3
Watermark computation.
Input: Database , Secret key , and number of groups | Output: Watermark certificate | (1) Begin | (2) Database partitioning into groups // see Algorithm 1 | (3) Group watermarks computation // see Algorithm 2 | (4) //watermarks groups concatenation | (5) // Encrypt watermark | (6) // watermark certificate | (7) Return | (8) End |
|