{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T00:07:43Z","timestamp":1758586063327,"version":"3.44.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032061751","type":"print"},{"value":"9783032061768","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06176-8_2","type":"book-chapter","created":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T15:57:58Z","timestamp":1758470278000},"page":"30-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ZKP-StylePatch: Hybrid NFT Anti-counterfeit Framework"],"prefix":"10.1007","author":[{"given":"Tiantian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yixuan","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"You","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,22]]},"reference":[{"issue":"1","key":"2_CR1","first-page":"8","volume":"2","author":"O Wlasinsky","year":"2023","unstructured":"Wlasinsky, O.: Literature review on the most popular of NFTS types. Int. J. Educ. Technol. Artif. Intell. 2(1), 8\u201312 (2023)","journal-title":"Int. J. Educ. Technol. Artif. Intell."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Ante, L., Fiedler, I.: The new digital economy: how decentralized finance (DEFI) and non-fungible tokens (NFTS) are transforming value creation, ownership models, and economic systems (2024)","DOI":"10.1016\/j.digbus.2024.100094"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"2769","DOI":"10.1038\/s41598-022-05146-6","volume":"12","author":"K Vasan","year":"2022","unstructured":"Vasan, K., Janosov, M., Barab\u00e1si, A.-L.: Quantifying NFT-driven networks in crypto art. Sci. Rep. 12(1), 2769 (2022)","journal-title":"Sci. Rep."},{"key":"2_CR4","unstructured":"Wang, Q., Li, R., Wang, Q., Chen, S.: Non-fungible token (NFT): overview, evaluation, opportunities and challenges. arXiv preprint arXiv:2105.07447 (2021)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Ma, K., Huang, J., He, N., Wang, Z., Wang, H.: SoK: on the security of non-fungible tokens. Blockchain Res. Appl. 100268 (2025)","DOI":"10.1016\/j.bcra.2024.100268"},{"key":"2_CR6","unstructured":"OpenSea. Moonbirds collection (2023). https:\/\/opensea.io\/collection\/proofmoonbirds. Accessed 19 June 2025"},{"key":"2_CR7","unstructured":"Yuga Labs. Bored ape yacht club official website (2022). https:\/\/boredapeyachtclub.com\/. Accessed 19 June 2025"},{"issue":"2","key":"2_CR8","first-page":"1","volume":"21","author":"F Wang","year":"2024","unstructured":"Wang, F., Zhangjie, F., Zhang, X.: A self-defense copyright protection scheme for NFT image art based on information embedding. ACM Trans. Multimed. Comput. Commun. Appl. 21(2), 1\u201323 (2024)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Das, D., Bose, P., Ruaro, N., Kruegel, C., Vigna, G.: Understanding security issues in the NFT ecosystem. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 667\u2013681 (2022)","DOI":"10.1145\/3548606.3559342"},{"key":"2_CR10","unstructured":"OpenSea. What is opensea\u2019s copymint policy (2025). https:\/\/support.opensea.io\/en\/articles\/8867065-what-is-opensea-s-copymint-policy. Accessed 19 June 2025"},{"key":"2_CR11","unstructured":"OpenSea. An update on verification and copymint prevention (2025). https:\/\/opensea.io\/blog\/articles\/an-update-on-verification-and-copymint-prevention. Accessed 19 June 2025"},{"issue":"11","key":"2_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., et al.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Gal, R., Patashnik, O., Maron, H., Bermano, A.H., Chechik, G., Cohen-Or, D.: Stylegan-nada: clip-guided domain adaptation of image generators. ACM Trans. Graph. (TOG) 41(4), 1\u201313 (2022)","DOI":"10.1145\/3528223.3530164"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Huang, X., Belongie, S.: Arbitrary style transfer in real-time with adaptive instance normalization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1501\u20131510 (2017)","DOI":"10.1109\/ICCV.2017.167"},{"key":"2_CR15","unstructured":"Jeong, J., Kwon, M., Uh, Y.: Training-free style transfer emerges from H-space in diffusion models. arXiv preprint arXiv:2303.15403, vol. 3, no. 1 (2023)"},{"key":"2_CR16","first-page":"77771","volume":"36","author":"M Zhu","year":"2023","unstructured":"Zhu, M., et al.: Genimage: a million-scale benchmark for detecting AI-generated image. Adv. Neural. Inf. Process. Syst. 36, 77771\u201377782 (2023)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Kotzer, A., Naamneh, M., Rottenstreich, O., Reviriego, P.: Detection of NFT duplications with image hash functions. In: 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20137. IEEE (2024)","DOI":"10.1109\/ICBC59979.2024.10634437"},{"issue":"91\u2013110","key":"2_CR18","first-page":"2","volume":"2","author":"G Lowe","year":"2004","unstructured":"Lowe, G.: Sift-the scale invariant feature transform. Int. J. 2(91\u2013110), 2 (2004)","journal-title":"Int. J."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Roy, S.K., Harandi, M., Nock, R., Hartley, R.: Siamese networks: the tale of two manifolds. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 3046\u20133055 (2019)","DOI":"10.1109\/ICCV.2019.00314"},{"issue":"9","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3728633","volume":"57","author":"LG Foo","year":"2025","unstructured":"Foo, L.G., Rahmani, H., Liu, J.: AI-generated content (AIGC) for various data modalities: a survey. ACM Comput. Surv. 57(9), 1\u201366 (2025)","journal-title":"ACM Comput. Surv."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Zhang, R., Owens, A., Efros, A.A.: CNN-generated images are surprisingly easy to spot... for now. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8695\u20138704 (2020)","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Liu, B., Yang, F., Bi, X., Xiao, B., Li, W., Gao, X.: Detecting generated images by real images. In: European Conference on Computer Vision, pp. 95\u2013110. Springer (2022)","DOI":"10.1007\/978-3-031-19781-9_6"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Dire for diffusion-generated image detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22445\u201322455 (2023)","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"2_CR25","unstructured":"Touvron, H., Cord, M., Douze, M., Massa, F., Sablayrolles, A., J\u00e9gou, H.: Training data-efficient image transformers & distillation through attention. In: International Conference on Machine Learning, pp. 10347\u201310357. PMLR (2021)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10012\u201310022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Ju, Y., Jia, S., Ke, L., Xue, H., Nagano, K., Lyu, S.: Fusing global and local features for generalized AI-synthesized image detection. In: 2022 IEEE International Conference on Image Processing (ICIP), pp. 3465\u20133469. IEEE (2022)","DOI":"10.1109\/ICIP46576.2022.9897820"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Ojha, U., Li, Y., Lee, Y.J.: Towards universal fake image detectors that generalize across generative models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 24480\u201324489 (2023)","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"2_CR29","unstructured":"Yan, S., et al.: A sanity check for AI-generated image detection. arXiv preprint arXiv:2406.19435 (2024)"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, X., Karaman, S., Chang, S.-F.: Detecting and simulating artifacts in GAN fake images. In: 2019 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"2_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-58610-2_6","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Qian","year":"2020","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12357, pp. 86\u2013103. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58610-2_6"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Z., Qi, X., Torr, P.H.S.: Global texture enhancement for fake face detection in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8060\u20138069 (2020)","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"2_CR33","unstructured":"Nichol, A., et al.: Glide: towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741 (2021)"},{"key":"2_CR34","unstructured":"Zhong, N., Xu, Y., Li, S., Qian, Z., Zhang, X.: Patchcraft: exploring texture patch for efficient AI-generated image detection. arXiv preprint arXiv:2311.12397 (2023)"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Zhu, J.-Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV) (2017)","DOI":"10.1109\/ICCV.2017.244"},{"key":"2_CR36","unstructured":"Zhu, M., et al.: Gendet: towards good generalizations for AI-generated image detection. arXiv preprint arXiv:2312.08880 (2023)"}],"container-title":["Lecture Notes in Computer Science","Blockchain \u2013 ICBC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06176-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T22:03:53Z","timestamp":1758492233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06176-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,22]]},"ISBN":["9783032061751","9783032061768"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06176-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,22]]},"assertion":[{"value":"22 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICBC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/icbc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}