Research Article

Distortion-Free Watermarking Approach for Relational Database Integrity Checking

Algorithm 5

Localization of the altered data.
Input: Group Watermark , and
Output: tamper area
   (1)  for  each
  (2)  if  
  (3)  for   to  
  (4)  if  
  (5)  return  “the tampered data in th column or  th attribute”
  (6)  end if
  (7)  continue
  (8)  end if
  (9)  end for
(10)  end for
 (11)  end