Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Algorithm 3
Length sub-watermark generation.
(1) For Each tuple relation do | (2) For Each attribute relation do | (3) length = Len() | (4) length_frequencylength++ | (5) total_length_count++ | (6) EndFor | (7) End For | (8) For Each length do | (9) = (length_frequency/total_length_count) * 100 | (10) | End For | total_length_count | Return |
|