Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 14
Characterization of malicious insertion attacks on range of data values.
| Range | | | | | | Δ | Δ | Characteristic |
| 0 | 0–99 | 25.59 | 1436986 | 23.60 | 1436986 | 0 | 0 | No change | 1 | 100–999 | 48.73 | 2736731 | 52.72 | 3210988 | +474257 | +17.33% | Low to High | 2 | 1000–9999 | 25.68 | 1442223 | 23.68 | 1442223 | 0 | 0 | No change |
|
|