Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 12
Characterization of malicious update attacks on length of data values.
| | | | | | | | Characteristic |
| 1 | 5.74 | 325894 | 6.31 | 358142 | +32248 | +9.90% | ↑Low to High | 2 | 20.19 | 1146469 | 27.57 | 1565462 | +418993 | +36.55% | ↑Low to High | 3 | 48.66 | 2762791 | 34.27 | 1945657 | −817134 | −29.58% | ↓High to Low | 4 | 25.41 | 1442906 | 31.86 | 1808799 | +365893 | +25.36% | ↑Low to High |
|
|