Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Algorithm 5

Watermark verification.
       Compute for (by using Algorithm 1)
       Obtain from CA
       Extract from
        = Decrypt( , )
       For     to length( ) Do
         If =   Then
          match_count = match_count + 1
         End if
         total_count = total_count + 1
  End For
   = match_count/total_count  *  100
   = 1 –
  If       0 Then
    Database Relation is tempered with distortion rate
  End if