Research Article

Distortion-Free Watermarking Approach for Relational Database Integrity Checking

Algorithm 3

Watermark computation.
Input: Database , Secret key , and number of groups  
Output: Watermark certificate
 (1) Begin
(2) Database partitioning into groups  // see Algorithm 1
(3) Group watermarks computation  // see Algorithm 2
(4)   //watermarks groups concatenation
(5)     // Encrypt watermark
(6)     // watermark certificate
(7) Return
(8) End