This standard describes an evaluation method to assess the robustness of watermarking implementations in unstructured digital contents including images, video, audio, and documents. This standard describes attacks and corruptions that may result in the compromise of the watermarking information embedded in digital contents. Furthermore, the standard specifies robustness requirements for implementations of digital watermarking in the digital contents. Moreover, the standard defines metrics used for evaluation and test cases for assessing the robustness against different corruptions or attacks. This standard does not specify the evaluation for the robustness of the watermarking implementations in structured contents, for example, database. The risks faced with watermarking implementations in structured contents are different from those of unstructured contents, and need different test cases.
- Sponsor Committee
- C/CPSC - Cybersecurity and Privacy Standards Committee
Learn More About C/CPSC - Cybersecurity and Privacy Standards Committee - Status
- Active PAR
- PAR Approval
- 2023-03-30
Working Group Details
- Society
- IEEE Computer Society
Learn More About IEEE Computer Society - Sponsor Committee
- C/CPSC - Cybersecurity and Privacy Standards Committee
Learn More About C/CPSC - Cybersecurity and Privacy Standards Committee - Working Group
-
DLTWG - Data Leakage Tracing Working Group
- IEEE Program Manager
- Tom Thompson
Contact Tom Thompson - Working Group Chair
- Shiqi Li
Other Activities From This Working Group
Current projects that have been authorized by the IEEE SA Standards Board to develop a standard.
P3477
Standard for Evaluation Method for Anonymization Effectiveness in Data Sharing
This standard specifies an evaluation methodology to assess the re-identification risk following the application of anonymization processes to data intended for sharing. Specifically, the elements contributing to re-identification risks are described, which encompass threats to processed data, security measures implemented for the processed data, and potential impacts on the data subject. Furthermore, this standard provides a method for evaluating the levels of re-identification risk based on these considerations, and a comprehensive evaluation procedure. The application of the methodology across common data sharing scenarios, such as internal data sharing, external data sharing, and data publishing, is also described.
Standards approved by the IEEE SA Standards Board that are within the 10-year lifecycle.
No Active Standards
These standards have been replaced with a revised version of the standard, or by a compilation of the original active standard and all its existing amendments, corrigenda, and errata.
No Superseded Standards
These standards have been removed from active status through a ballot where the standard is made inactive as a consensus decision of a balloting group.
No Inactive-Withdrawn Standards
These standards are removed from active status through an administrative process for standards that have not undergone a revision process within 10 years.
No Inactive-Reserved Standards