Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 17
Characterization of malicious data modifications on range of data values.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The detailed experiments for this set of attacks are presented in the Appendix (Tables 20(a)–20(f)). |