Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 10
Characterization of malicious insertion attacks on length of data values.
| | | | | | | | Characteristic |
| 1 | 5.74 | 325894 | 5.27 | 325894 | 0 | 0 | No change | 2 | 20.19 | 1146469 | 18.54 | 1146469 | 0 | 0 | No change | 3 | 48.66 | 2762791 | 52.85 | 3267609 | +504818 | +18.27% | ↑Low to High | 4 | 25.41 | 1442906 | 23.34 | 1442906 | 0 | 0 | No change |
|
|