Research Article

A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

Table 9

Characterization of malicious modifications on digit frequency.

Insertion attackDeletion attackUpdate attack
Attack rate10%90%10%90%10%90%
% % % % % %

0+9.51+90.77%−9.63%−89.65%+0.41+0.45
1+10.51+94.47%−10.11%−89.05%+0.80+15.91
2+10.49+90.14%−10.67%−90.20%−0.57−3.72
3+9.63+94.72%−9.87%−90.30%−2.12+3.39
4+9.47+83.78%−10.07%−90.82%−0.28−7.34
5+9.01+82.00%−9.43%−91.26%+0.40−11.43
6+9.08+81.84%−9.48%−91.01%+0.13−7.78
7+10.17+88.20%−9.95%−89.83%+0.05+1.46
8+10.23+88.86%−10.06%−89.89%−0.22+2.16
9+10.25+88.36%−10.37%−90.66%−0.96−2.62

The detailed experiments for this set of attacks are presented in the Appendix (Tables 18(a)–18(f)).