Path:
Home >
GB/T >
Page206 > GB/T 45909-2025
Price & Delivery
US$509.00 · In stock · Download in 9 secondsGB/T 45909-2025: Cybersecurity technology - Implementation guideline of digital watermarking technology
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 45909-2025 | English | 509 |
Add to Cart
|
4 days [Need to translate]
|
Cybersecurity technology - Implementation guideline of digital watermarking technology
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 45909-2025 (GB/T45909-2025) |
| Description (Translated English) | Cybersecurity technology - Implementation guideline of digital watermarking technology |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.030 |
| Word Count Estimation | 25,278 |
| Date of Issue | 2025-06-30 |
| Date of Implementation | 2026-01-01 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 45909-2025: Cybersecurity technology - Implementation guideline of digital watermarking technology
---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT45909-2025
ICS 35.030
CCSL80
National Standard of the People's Republic of China
Network Security Technology Digital Watermarking Technology Implementation Guide
Released on June 30, 2025
Implementation on January 1, 2026
State Administration for Market Regulation
The National Standardization Administration issued
Table of Contents
Preface III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 Implementation Framework 2
6 Function 3
7 Process 4
7.1 Overview 4
7.2 Watermark Embedding Stage 4
7.3 Watermark Carrier Distribution Phase 6
7.4 Watermark Extraction Stage 6
8 Watermark Algorithm Selection 7
8.1 Overview 7
8.2 Documentation 7
8.3 Image 8
8.4 Audio 8
8.5 Video 9
8.6 Web Page 9
8.7 Database 10
9 Watermark service packaging format selection 11
9.1 SDK Package 11
9.2 SaaS Packaging 11
9.3 Product Packaging 11
Appendix A (Informative) Common Digital Watermarking Algorithms 12
A.1 Watermark Embedding/Extraction Algorithm 12
A.2 Watermark encoding/decoding algorithm 12
A.3 Compatibility of Common Watermarking Algorithms with Main Types of Watermark Carriers 13
Appendix B (Informative) Typical Security Scenarios 14
B.1 Data Copyright Protection14
B.2 Data Leakage Tracking and Origin 14
B.3 Watermarking of Generative AI-Generated Content 15
B.4 Network data classification, grading, identification and management 16
B.5 Data Integrity Protection 17
Appendix C (Informative) Method for evaluating the effectiveness of watermark technology functions 18
C.1 Basic Functions 18
C.2 Enhancement 18
C.3 Specific functions 18
Appendix D (Informative) Digital Watermark Security Model Reference 19
D.1 Overview 19
D.2 Security Threats 19
D.3 Safety Goal 19
D.4 Confidentiality Protection19
D.5 Integrity Assurance 19
D.6 Availability Guarantee 20
D.7 Testing and Evaluation 20
Preface
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents"
Drafting.
Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents.
This document is proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260).
This document was drafted by. Alibaba (Beijing) Software Services Co., Ltd., Alibaba Cloud Computing Co., Ltd., China Electronics Technology Standardization
Research Institute, Beijing Kuaishou Technology Co., Ltd., China Academy of Information and Communications Technology, Tsinghua University, AsiaInfo Technologies (Chengdu) Co., Ltd., Ant Technology
Group Co., Ltd., Sangfor Technologies Co., Ltd., Beijing Topsec Network Security Technology Co., Ltd., Huidun Information Security Technology
(Suzhou) Co., Ltd., Beijing Volcano Engine Technology Co., Ltd., China Information Security Evaluation Center, National Information Technology Security Research Center
Center, National Computer Network Emergency Response Technical Processing Coordination Center, Beijing Shuanxing Technology Co., Ltd., China Mobile Communications Group Co., Ltd.,
Hefei Gaowei Data Technology Co., Ltd., the Third Research Institute of the Ministry of Public Security, Venusstar Information Technology Group Co., Ltd., and Beijing Yuanjian Information Technology Co., Ltd.
Technology Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd., Qi'anxin Technology Group Co., Ltd., Hangzhou Meichuang Technology Co., Ltd.
Co., Ltd., Hangzhou Hikvision Digital Technology Co., Ltd., and Shenzhen Liansoft Technology Co., Ltd.
The main drafters of this document are. Zhu Hongru, Sun Yong, Sun Weiwei, Yang Rui, Zhou Chenwei, Xu Yujia, Zhu Xuefeng, Luo Hongwei, Chen Tian, Cao Jing, Jing Huiyun,
Jin Tao, Xu Ke, Liao Shuangxiao, Lin Guanchen, Song Botao, Bao Yingming, Meng Bin, Lian Yihan, Fan Hangyu, Sun Mingliang, Yang Tao, Zhang Xiaona, Liu Yuhong, Jiang Weiqiang,
Jingjing, Guo Yugang, Ding Zhiguo, Zhou Ruiqun, Zheng Rong, Tian Lidan, Ma Yong, Zhou Jie, Li Chaohao, Gong Xiaoqian, and Wang Yan.
Network Security Technology Digital Watermarking Technology Implementation Guide
1 Scope
This document provides the implementation framework, functions, processes, watermark algorithm selection, watermark service packaging selection and other aspects of digital watermark technology.
suggestions.
This document applies to the design, development, application and testing of digital watermarking technology.
2 Normative references
The contents of the following documents constitute the essential clauses of this document through normative references in this document.
For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to
This document.
GB/T 25069 Information Security Technical Terminology
3 Terms and Definitions
The terms and definitions defined in GB/T 25069 and the following apply to this document.
3.1
Identify or protect the copyright, source, or content security of digital media by embedding subtle specific information in digital content.
technology.
Note. Digital watermark is short for digital watermark. The "digital watermark" in this document refers to implicit watermark (also called "dark watermark", "invisible watermark", "implicit watermark", "invisible watermark").
The embedded information is hidden and unidentifiable to the data user.
3.2
watermark information
Specific information embedded in digital media through digital watermarking technology (3.1).
Note. Common watermark information includes but is not limited to copyright information, traceability information, link information, organization/employee identifier (ID), time information, etc.
3.3
watermark carrier watermarkcarrier
Digital content such as documents, images, audio, video, web pages, databases, etc. that are used to embed or carry watermark information (3.2).
Note. In this document, it is referred to as vector.
3.4
Watermark encoding
The watermark information (3.2) is converted into a form or format suitable for embedding into a watermark carrier (3.3).
3.5
Watermark decoding watermarkdecoding
The watermark information (3.2) extracted from the watermark carrier (3.3) is restored to its original form or format.
3.6
Watermark embedding
The process of embedding watermark information (3.2) into the watermark carrier (3.3).
...