Research Article
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Table 9
Characterization of malicious modifications on digit frequency.
| | Insertion attack | Deletion attack | Update attack | Attack rate | 10% | 90% | 10% | 90% | 10% | 90% | | % | % | % | % | % | % |
| 0 | +9.51 | +90.77% | −9.63% | −89.65% | +0.41 | +0.45 | 1 | +10.51 | +94.47% | −10.11% | −89.05% | +0.80 | +15.91 | 2 | +10.49 | +90.14% | −10.67% | −90.20% | −0.57 | −3.72 | 3 | +9.63 | +94.72% | −9.87% | −90.30% | −2.12 | +3.39 | 4 | +9.47 | +83.78% | −10.07% | −90.82% | −0.28 | −7.34 | 5 | +9.01 | +82.00% | −9.43% | −91.26% | +0.40 | −11.43 | 6 | +9.08 | +81.84% | −9.48% | −91.01% | +0.13 | −7.78 | 7 | +10.17 | +88.20% | −9.95% | −89.83% | +0.05 | +1.46 | 8 | +10.23 | +88.86% | −10.06% | −89.89% | −0.22 | +2.16 | 9 | +10.25 | +88.36% | −10.37% | −90.66% | −0.96 | −2.62 |
|
|
The detailed experiments for this set of attacks are presented in the Appendix (Tables 18(a)–18(f)).
|