Home Cart Quotation Policy About-Us
www.ChineseStandard.net
Database: 221581 (27 Mar 2026)
SEARCH
Path: Home > GB/T > Page206 > GB/T 45909-2025

GB/T 45909-2025 PDF English

Price & Delivery

US$509.00 · In stock · Download in 9 seconds
GB/T 45909-2025: Cybersecurity technology - Implementation guideline of digital watermarking technology
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Std IDVersionUSDBuyDeliver [PDF] inTitle (Description)
GB/T 45909-2025English509 Add to Cart 4 days [Need to translate] Cybersecurity technology - Implementation guideline of digital watermarking technology

Click to Preview a similar PDF

Basic data

Standard ID GB/T 45909-2025 (GB/T45909-2025)
Description (Translated English) Cybersecurity technology - Implementation guideline of digital watermarking technology
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 25,278
Date of Issue 2025-06-30
Date of Implementation 2026-01-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 45909-2025: Cybersecurity technology - Implementation guideline of digital watermarking technology




---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT45909-2025
ICS 35.030 CCSL80 National Standard of the People's Republic of China Network Security Technology Digital Watermarking Technology Implementation Guide Released on June 30, 2025 Implementation on January 1, 2026 State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Implementation Framework 2 6 Function 3 7 Process 4 7.1 Overview 4 7.2 Watermark Embedding Stage 4 7.3 Watermark Carrier Distribution Phase 6 7.4 Watermark Extraction Stage 6 8 Watermark Algorithm Selection 7 8.1 Overview 7 8.2 Documentation 7 8.3 Image 8 8.4 Audio 8 8.5 Video 9 8.6 Web Page 9 8.7 Database 10 9 Watermark service packaging format selection 11 9.1 SDK Package 11 9.2 SaaS Packaging 11 9.3 Product Packaging 11 Appendix A (Informative) Common Digital Watermarking Algorithms 12 A.1 Watermark Embedding/Extraction Algorithm 12 A.2 Watermark encoding/decoding algorithm 12 A.3 Compatibility of Common Watermarking Algorithms with Main Types of Watermark Carriers 13 Appendix B (Informative) Typical Security Scenarios 14 B.1 Data Copyright Protection14 B.2 Data Leakage Tracking and Origin 14 B.3 Watermarking of Generative AI-Generated Content 15 B.4 Network data classification, grading, identification and management 16 B.5 Data Integrity Protection 17 Appendix C (Informative) Method for evaluating the effectiveness of watermark technology functions 18 C.1 Basic Functions 18 C.2 Enhancement 18 C.3 Specific functions 18 Appendix D (Informative) Digital Watermark Security Model Reference 19 D.1 Overview 19 D.2 Security Threats 19 D.3 Safety Goal 19 D.4 Confidentiality Protection19 D.5 Integrity Assurance 19 D.6 Availability Guarantee 20 D.7 Testing and Evaluation 20 Preface This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document is proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. Alibaba (Beijing) Software Services Co., Ltd., Alibaba Cloud Computing Co., Ltd., China Electronics Technology Standardization Research Institute, Beijing Kuaishou Technology Co., Ltd., China Academy of Information and Communications Technology, Tsinghua University, AsiaInfo Technologies (Chengdu) Co., Ltd., Ant Technology Group Co., Ltd., Sangfor Technologies Co., Ltd., Beijing Topsec Network Security Technology Co., Ltd., Huidun Information Security Technology (Suzhou) Co., Ltd., Beijing Volcano Engine Technology Co., Ltd., China Information Security Evaluation Center, National Information Technology Security Research Center Center, National Computer Network Emergency Response Technical Processing Coordination Center, Beijing Shuanxing Technology Co., Ltd., China Mobile Communications Group Co., Ltd., Hefei Gaowei Data Technology Co., Ltd., the Third Research Institute of the Ministry of Public Security, Venusstar Information Technology Group Co., Ltd., and Beijing Yuanjian Information Technology Co., Ltd. Technology Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd., Qi'anxin Technology Group Co., Ltd., Hangzhou Meichuang Technology Co., Ltd. Co., Ltd., Hangzhou Hikvision Digital Technology Co., Ltd., and Shenzhen Liansoft Technology Co., Ltd. The main drafters of this document are. Zhu Hongru, Sun Yong, Sun Weiwei, Yang Rui, Zhou Chenwei, Xu Yujia, Zhu Xuefeng, Luo Hongwei, Chen Tian, Cao Jing, Jing Huiyun, Jin Tao, Xu Ke, Liao Shuangxiao, Lin Guanchen, Song Botao, Bao Yingming, Meng Bin, Lian Yihan, Fan Hangyu, Sun Mingliang, Yang Tao, Zhang Xiaona, Liu Yuhong, Jiang Weiqiang, Jingjing, Guo Yugang, Ding Zhiguo, Zhou Ruiqun, Zheng Rong, Tian Lidan, Ma Yong, Zhou Jie, Li Chaohao, Gong Xiaoqian, and Wang Yan. Network Security Technology Digital Watermarking Technology Implementation Guide 1 Scope This document provides the implementation framework, functions, processes, watermark algorithm selection, watermark service packaging selection and other aspects of digital watermark technology. suggestions. This document applies to the design, development, application and testing of digital watermarking technology. 2 Normative references The contents of the following documents constitute the essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 25069 Information Security Technical Terminology 3 Terms and Definitions The terms and definitions defined in GB/T 25069 and the following apply to this document. 3.1 Identify or protect the copyright, source, or content security of digital media by embedding subtle specific information in digital content. technology. Note. Digital watermark is short for digital watermark. The "digital watermark" in this document refers to implicit watermark (also called "dark watermark", "invisible watermark", "implicit watermark", "invisible watermark"). The embedded information is hidden and unidentifiable to the data user. 3.2 watermark information Specific information embedded in digital media through digital watermarking technology (3.1). Note. Common watermark information includes but is not limited to copyright information, traceability information, link information, organization/employee identifier (ID), time information, etc. 3.3 watermark carrier watermarkcarrier Digital content such as documents, images, audio, video, web pages, databases, etc. that are used to embed or carry watermark information (3.2). Note. In this document, it is referred to as vector. 3.4 Watermark encoding The watermark information (3.2) is converted into a form or format suitable for embedding into a watermark carrier (3.3). 3.5 Watermark decoding watermarkdecoding The watermark information (3.2) extracted from the watermark carrier (3.3) is restored to its original form or format. 3.6 Watermark embedding The process of embedding watermark information (3.2) into the watermark carrier (3.3).
...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 45909-2025_English be delivered?


Answer: Upon your order, we will start to translate GB/T 45909-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 45909-2025_English with my colleagues?


Answer: Yes. The purchased PDF of GB/T 45909-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
Refund Policy Privacy Policy Terms of Service