Research Article
Distortion-Free Watermarking Approach for Relational Database Integrity Checking
Algorithm 4
Integrity checking.
Input: Suspicious database , Secret key K, | number of groups and | Output: Verification report | (1) Begin | (2) extract from | (3) compute | (4) database partitioning into groups // see Algorithm 1 | (5) for to do | (6) compute // th suspicious group watermark | (7) if then // watermarks comparison | (8) return non-altered group | (9) else | (10) return altered group | (11) end if | (12) end for | (13) end |
|