
An evaluation method to assess the robustness of invisible watermarking implementations in unstructured digital content, including images, video, audio, documents, and webpages, is described in this standard. Also described are distortion inferences that may result in the compromise of the watermark information embedded in digital content. Furthermore, the metrics used for evaluation and test cases for assessing the robustness against different distortion inferences are specified. This standard does not specify the evaluation for the robustness of the watermarking implementations in structured content, for example, a database. The risks faced with watermarking implementations in structured content are different from those of unstructured content and need different test cases.
- Standard Committee
- C/CPSC - Cybersecurity and Privacy Standards Committee
- Status
- Active Standard
- PAR Approval
- 2023-03-30
- Board Approval
- 2025-05-28
- History
-
- Published:
- 2025-08-08
Working Group Details
- Society
- IEEE Computer Society
- Standard Committee
- C/CPSC - Cybersecurity and Privacy Standards Committee
- Working Group
-
DLTWG - Data Leakage Tracing Working Group
- IEEE Program Manager
- Malia Zaman
Contact Malia Zaman - Working Group Chair
- Shiqi Li
Other Activities From This Working Group
Current projects that have been authorized by the IEEE SA Standards Board to develop a standard.
P3477
Standard for Evaluation Method for Anonymization Effectiveness in Data Sharing
This standard specifies an evaluation methodology to assess the re-identification risk following the application of anonymization processes to data intended for sharing. Specifically, the elements contributing to re-identification risks are described, which encompass threats to processed data, security measures implemented for the processed data, and potential impacts on the data subject. Furthermore, this standard provides a method for evaluating the levels of re-identification risk based on these considerations, and a comprehensive evaluation procedure. The application of the methodology across common data sharing scenarios, such as internal data sharing, external data sharing, and data publishing, is also described.
Standards approved by the IEEE SA Standards Board that are within the 10-year lifecycle.
No Active Standards
These standards have been replaced with a revised version of the standard, or by a compilation of the original active standard and all its existing amendments, corrigenda, and errata.
No Superseded Standards
These standards have been removed from active status through a ballot where the standard is made inactive as a consensus decision of a balloting group.
No Inactive-Withdrawn Standards
These standards are removed from active status through an administrative process for standards that have not undergone a revision process within 10 years.
No Inactive-Reserved Standards