Research Article
Distortion-Free Watermarking Approach for Relational Database Integrity Checking
Table 2
Comparison with Khan’s approach.
| | | Our approach | Khan and Husain et al. approach |
| Insertion, deletion, alteration attacks | Detect and localize the tampering at group level and may detect the tampered tuples | Detect and characterize malicious modification made to the database and characterize the tamper attack |
| Database partitioning | Partition based technique | No partitioning |
|
Multifaceted attack | Tuples insertion-deletion attacks | Resilient to such kind of attack | Resilient to such kind of attack | Attributes substitution attacks | Resilient to such kind of attack | Not resilient to such kind of attack |
| Security | Secret key based technique | Secret key based technique |
|
|