Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Algorithm 3

Length sub-watermark generation.
(1)        For Each  tuple        relation   do
(2)       For Each  attribute        relation     do
(3)         length = Len( )
(4)         length_frequency length ++
(5)         total_length_count++
(6)       EndFor
(7)       End For
(8)       For Each        length  do
(9)      = (length_frequency /total_length_count) * 100
(10)  
  End For
   total_length_count
  Return