Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Algorithm 1
Watermark generation.
= digit sub-watermark generation() | //See Algorithm 2 | = length sub-watermark generation() | See Algorithm 3 | = range sub-watermark generation() | See Algorithm 4 | | , ) | | Register to |
|