Research Article

Distortion-Free Watermarking Approach for Relational Database Integrity Checking

Table 2

Comparison with Khan’s approach.

Our approachKhan and Husain et al. approach

Insertion, deletion, alteration attacksDetect and localize the
tampering at group
level and may detect the tampered tuples
Detect and characterize
malicious modification
made to the database
and characterize the
tamper attack

Database partitioningPartition based techniqueNo partitioning

Multifaceted attackTuples insertion-deletion attacksResilient to such kind of attackResilient to such kind of attack
Attributes substitution attacksResilient to such kind of attackNot resilient to such kind of attack

SecuritySecret key based techniqueSecret key based technique