Active PAR

IEEE P3361

IEEE Draft Standard for Evaluation Method of Robustness of Digital Watermarking Implementation in Digital Contents

This standard describes an evaluation method to assess the robustness of watermarking implementations in unstructured digital contents including images, video, audio, and documents. This standard describes attacks and corruptions that may result in the compromise of the watermarking information embedded in digital contents. Furthermore, the standard specifies robustness requirements for implementations of digital watermarking in the digital contents. Moreover, the standard defines metrics used for evaluation and test cases for assessing the robustness against different corruptions or attacks. This standard does not specify the evaluation for the robustness of the watermarking implementations in structured contents, for example, database. The risks faced with watermarking implementations in structured contents are different from those of unstructured contents, and need different test cases.

Sponsor Committee
C/CPSC - Cybersecurity and Privacy Standards Committee
Learn More About C/CPSC - Cybersecurity and Privacy Standards Committee
Status
Active PAR
PAR Approval
2023-03-30

Working Group Details

Society
IEEE Computer Society
Learn More About IEEE Computer Society
Sponsor Committee
C/CPSC - Cybersecurity and Privacy Standards Committee
Learn More About C/CPSC - Cybersecurity and Privacy Standards Committee
Working Group
DLTWG - Data Leakage Tracing Working Group
IEEE Program Manager
Tom Thompson
Contact Tom Thompson
Working Group Chair
Shiqi Li

Other Activities From This Working Group

Current projects that have been authorized by the IEEE SA Standards Board to develop a standard.


P3477
Standard for Evaluation Method for Anonymization Effectiveness in Data Sharing

This standard specifies an evaluation methodology to assess the re-identification risk following the application of anonymization processes to data intended for sharing. Specifically, the elements contributing to re-identification risks are described, which encompass threats to processed data, security measures implemented for the processed data, and potential impacts on the data subject. Furthermore, this standard provides a method for evaluating the levels of re-identification risk based on these considerations, and a comprehensive evaluation procedure. The application of the methodology across common data sharing scenarios, such as internal data sharing, external data sharing, and data publishing, is also described.

Learn More About P3477

Standards approved by the IEEE SA Standards Board that are within the 10-year lifecycle.


No Active Standards

These standards have been replaced with a revised version of the standard, or by a compilation of the original active standard and all its existing amendments, corrigenda, and errata.


No Superseded Standards

These standards have been removed from active status through a ballot where the standard is made inactive as a consensus decision of a balloting group.


No Inactive-Withdrawn Standards

These standards are removed from active status through an administrative process for standards that have not undergone a revision process within 10 years.


No Inactive-Reserved Standards
Subscribe to our Newsletter

Sign up for our monthly newsletter to learn about new developments, including resources, insights and more.