Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Table 17

Characterization of malicious data modifications on range of data values.

Insertion attackDeletion attackUpdate attack
Attack rate10%90%10%90%10%
Range Δ %Δ %Δ %Δ % Δ %Δ %

00–99+9.97+92.33−9.84−89.760.39−5.91
1100–999+10.34+89.86−9.99−88.901.4810.46
21000–9999+9.41+87.71−10.16−91.93−2.94−12.41

The detailed experiments for this set of attacks are presented in the Appendix (Tables 20(a)–20(f)).