{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:47:22Z","timestamp":1760316442582,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032078834","type":"print"},{"value":"9783032078841","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07884-1_21","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:22:50Z","timestamp":1760286170000},"page":"410-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SecureT2I: No More Unauthorized Manipulation on\u00a0AI Generated Images from\u00a0Prompts"],"prefix":"10.1007","author":[{"given":"Xiaodong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiangman","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianbing","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Avrahami, O., Lischinski, D., Fried, O.: Blended diffusion for text-driven editing of natural images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18208\u201318218 (2022)","DOI":"10.1109\/CVPR52688.2022.01767"},{"key":"21_CR2","unstructured":"Basu, S., Zhao, N., Morariu, V.I., Feizi, S., Manjunatha, V.: Localizing and editing knowledge in text-to-image generative models. In: The Twelfth International Conference on Learning Representations (2023)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Bourtoule, L., et al.: Machine unlearning. In: 2021 IEEE Symposium on Security and Privacy, pp. 141\u2013159. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00019"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Brooks, T., Holynski, A., Efros, A.A.: Instructpix2pix: learning to follow image editing instructions. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 18392\u201318402 (2023)","DOI":"10.1109\/CVPR52729.2023.01764"},{"key":"21_CR5","unstructured":"Fuchi, M., Takagi, T.: Erasing concepts from text-to-image diffusion models with few-shot unlearning. arXiv preprint arXiv:2405.07288 (2024)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Grafakos, L., et\u00a0al.: Classical fourier analysis, vol.\u00a02. Springer (2008)","DOI":"10.1007\/978-0-387-09432-8"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Graves, L., Nagisetty, V., Ganesh, V.: Amnesiac machine learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035, pp. 11516\u201311524 (2021)","DOI":"10.1609\/aaai.v35i13.17371"},{"key":"21_CR8","unstructured":"Halimi, A., Kadhe, S., Rawat, A., Baracaldo, N.: Federated unlearning: How to efficiently erase a client in FL? arXiv preprint arXiv:2207.05521 (2022)"},{"key":"21_CR9","unstructured":"Heng, A., Soh, H.: Selective amnesia: A continual learning approach to forgetting in deep generative models. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"},{"key":"21_CR10","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"21_CR11","unstructured":"Huang, Y., et al.: Diffusion model-based image editing: a survey. arXiv preprint arXiv:2402.17525 (2024)"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cag.2023.03.007","volume":"112","author":"MH Khojasteh","year":"2023","unstructured":"Khojasteh, M.H., Farid, N.M., Nickabadi, A.: GMFIM: a generative mask-guided facial image manipulation model for privacy preservation. Comput. Graphics 112, 81\u201391 (2023)","journal-title":"Comput. Graphics"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Kim, G., Kwon, T., Ye, J.C.: Diffusionclip: text-guided diffusion models for robust image manipulation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2426\u20132435 (2022)","DOI":"10.1109\/CVPR52688.2022.00246"},{"key":"21_CR14","unstructured":"Kim, S., Jung, S., Kim, B., Choi, M., Shin, J., Lee, J.: Towards safe self-distillation of internet-scale text-to-image diffusion models. arXiv preprint arXiv:2307.05977 (2023)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Kong, Z., Chaudhuri, K.: Data redaction from conditional generative models. In: 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), pp. 569\u2013591. IEEE (2024)","DOI":"10.1109\/SaTML59370.2024.00035"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Kumari, N., Zhang, B., Wang, S.Y., Shechtman, E., Zhang, R., Zhu, J.Y.: Ablating concepts in text-to-image diffusion models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22691\u201322702 (2023)","DOI":"10.1109\/ICCV51070.2023.02074"},{"key":"21_CR17","unstructured":"Kwon, M., Jeong, J., Uh, Y.: Diffusion models already have a semantic latent space. arXiv preprint arXiv:2210.10960 (2022)"},{"key":"21_CR18","unstructured":"Li, G., Hsu, H., Marculescu, R., et\u00a0al.: Machine unlearning for image-to-image generative models. arXiv preprint arXiv:2402.00351 (2024)"},{"key":"21_CR19","unstructured":"Li, X., et al.: Diffusion models for image restoration and enhancement\u2013a comprehensive survey. arXiv preprint arXiv:2308.09388 (2023)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Liang, R., et al.: Photorealistic object insertion with diffusion-guided inverse rendering. In: European Conference on Computer Vision, pp. 446\u2013465. Springer (2024)","DOI":"10.1007\/978-3-031-73030-6_25"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Lu, S., Wang, Z., Li, L., Liu, Y., Kong, A.W.K.: Mace: mass concept erasure in diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6430\u20136440 (2024)","DOI":"10.1109\/CVPR52733.2024.00615"},{"key":"21_CR22","unstructured":"Meng, C., et al.: SDEDIT: guided image synthesis and editing with stochastic differential equations. arXiv preprint arXiv:2108.01073 (2021)"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Monteiro, K., Wu, Y., Das, S.: Manipulate to obfuscate: a privacy-focused intelligent image manipulation tool for end-users. In: Adjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology, pp.\u00a01\u20133 (2024)","DOI":"10.1145\/3672539.3686778"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Moser, B.B., Shanbhag, A.S., Raue, F., Frolov, S., Palacio, S., Dengel, A.: Diffusion models, image super-resolution, and everything: a survey. IEEE Trans. Neural Networks Learn. Syst. (2024)","DOI":"10.1109\/TNNLS.2024.3476671"},{"key":"21_CR25","unstructured":"Park, Y.H., et al.: Direct unlearning optimization for robust and safe text-to-image models. arXiv preprint arXiv:2407.21035 (2024)"},{"key":"21_CR26","unstructured":"Radford, A., et\u00a0al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning, pp. 8748\u20138763. PmLR (2021)"},{"key":"21_CR27","unstructured":"Raginsky, M., Rakhlin, A., Telgarsky, M.: Non-convex learning via stochastic gradient langevin dynamics: a nonasymptotic analysis. In: Conference on Learning Theory, pp. 1674\u20131703. PMLR (2017)"},{"key":"21_CR28","unstructured":"Ravi, H., Kelkar, S., Harikumar, M., Kale, A.: PReditOR: text guided image editing with diffusion prior. arXiv preprint arXiv:2302.07979 (2023)"},{"key":"21_CR29","unstructured":"Sablayrolles, A., Douze, M., Schmid, C., J\u00e9gou, H.: Radioactive data: tracing through training. In: International Conference on Machine Learning, pp. 8326\u20138335. PMLR (2020)"},{"key":"21_CR30","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X.: Improved techniques for training GANs. In: Advances in Neural Information Processing Systems, vol. 29 (2016)"},{"key":"21_CR31","unstructured":"Starodubcev, N., Baranchuk, D., Khrulkov, V., Babenko, A.: Towards real-time text-driven image manipulation with unconditional diffusion models. arXiv preprint arXiv:2304.04344 (2023)"},{"issue":"8","key":"21_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3721479","volume":"57","author":"VT Truong","year":"2025","unstructured":"Truong, V.T., Dang, L.B., Le, L.B.: Attacks and defenses for generative diffusion models: a comprehensive survey. ACM Comput. Surv. 57(8), 1\u201344 (2025)","journal-title":"ACM Comput. Surv."},{"key":"21_CR33","unstructured":"Valevski, D., Kalman, M., Matias, Y., Leviathan, Y.: Unitune: text-driven image editing by fine tuning an image generation model on a single image. arXiv preprint arXiv:2210.094772(3), 5 (2022)"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhao, L., Xing, W.: Stylediffusion: controllable disentangled style transfer via diffusion models. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7677\u20137689 (2023)","DOI":"10.1109\/ICCV51070.2023.00706"},{"issue":"2","key":"21_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3503488","volume":"13","author":"K Werder","year":"2022","unstructured":"Werder, K., Ramesh, B., Zhang, R.: Establishing data provenance for responsible artificial intelligence systems. ACM Trans. Manag. Inf. Syst. (TMIS) 13(2), 1\u201323 (2022)","journal-title":"ACM Trans. Manag. Inf. Syst. (TMIS)"},{"key":"21_CR36","unstructured":"Xie, S., et al.: Dreaminpainter: text-guided subject-driven image inpainting with diffusion models. arXiv preprint arXiv:2312.03771 (2023)"},{"issue":"2","key":"21_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3696415","volume":"57","author":"Z Xing","year":"2024","unstructured":"Xing, Z., et al.: A survey on video diffusion models. ACM Comput. Surv. 57(2), 1\u201342 (2024)","journal-title":"ACM Comput. Surv."},{"issue":"12","key":"21_CR38","doi-asserted-by":"publisher","first-page":"3769","DOI":"10.3390\/s25123769","volume":"25","author":"H Xu","year":"2025","unstructured":"Xu, H., Song, Y., Xu, G., Wu, K., Wen, J.: HETMCL: high-frequency enhancement transformer and multi-layer context learning network for remote sensing scene classification. Sensors 25(12), 3769 (2025)","journal-title":"Sensors"},{"key":"21_CR39","doi-asserted-by":"crossref","unstructured":"Yang, B., et al.: Paint by example: exemplar-based image editing with diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18381\u201318391 (2023)","DOI":"10.1109\/CVPR52729.2023.01763"},{"issue":"4","key":"21_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3626235","volume":"56","author":"L Yang","year":"2023","unstructured":"Yang, L., et al.: Diffusion models: a comprehensive survey of methods and applications. ACM Comput. Surv. 56(4), 1\u201339 (2023)","journal-title":"ACM Comput. Surv."},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, S., et\u00a0al.: Hive: Harnessing human feedback for instructional visual editing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9026\u20139036 (2024)","DOI":"10.1109\/CVPR52733.2024.00862"},{"key":"21_CR42","unstructured":"Zhao, M., Zhang, L., Zheng, T., Kong, Y., Yin, B.: Separable multi-concept erasure from diffusion models. arXiv preprint arXiv:2402.05947 (2024)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07884-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:23:04Z","timestamp":1760286184000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07884-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032078834","9783032078841"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07884-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}