Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 15
Characterization of malicious deletion attacks on range of data values.
| Range | | | | | | Δ | Δ | Characteristic |
| 0 | 0–99 | 25.59 | 1436986 | 29.12 | 1436986 | 0 | 0 | No change | 1 | 100–999 | 48.73 | 2736731 | 41.65 | 2054875 | −681856 | −24.92% | High to Low | 2 | 1000–9999 | 25.68 | 1442223 | 29.23 | 1442223 | 0 | 0 | No change |
|
|