Research Article
Distortion-Free Watermarking Approach for Relational Database Integrity Checking
Algorithm 5
Localization of the altered data.
Input: Group Watermark , and | Output: tamper area | (1) for each | (2) if | (3) for to | (4) if | (5) return “the tampered data in th column or th attribute” | (6) end if | (7) continue | (8) end if | (9) end for | (10) end for | (11) end |
|