{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:53:29Z","timestamp":1767117209676},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11554-024-01508-7","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T09:04:42Z","timestamp":1720602282000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content"],"prefix":"10.1007","volume":"21","author":[{"given":"Xiao","family":"Feng","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"1508_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s11554-023-01400-w","volume":"21","author":"S Wang","year":"2024","unstructured":"Wang, S., Deng, Y., Hu, L., et al.: Edge-computing-assisted intelligent processing of AI-generated image content. J. Real-Time Image Proc. 21, 39 (2024)","journal-title":"J. Real-Time Image Proc."},{"key":"1508_CR2","unstructured":"Xu, M. et al., Unleashing the power of edge-cloud generative AI in mobile networks: a survey of AIGC services. Comput Sci. arXiv:2303.16129 (2023)"},{"issue":"1","key":"1508_CR3","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TIV.2023.3304852","volume":"9","author":"Qu Zhiguo","year":"2024","unstructured":"Zhiguo, Qu., Chen, Z., Ning, X., Tiwari, P.: QEPP: a quantum efficient privacy protection protocol in 6g-quantum internet of vehicles. IEEE Trans Intell Veh 9(1), 905\u2013916 (2024)","journal-title":"IEEE Trans Intell Veh"},{"key":"1508_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3370398","author":"Qu Zhiguo","year":"2024","unstructured":"Zhiguo, Qu., Chen, Z., Dehdashti, S., Tiwari, P.: QFSM: a novel quantum federated learning algorithm for speech emotion recognition with minimal gated unit in 5G IoV. IEEE Trans Intell Veh (2024). https:\/\/doi.org\/10.1109\/TIV.2024.3370398","journal-title":"IEEE Trans Intell Veh"},{"key":"1508_CR5","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/OJCS.2023.3315835","volume":"4","author":"C Chen","year":"2023","unstructured":"Chen, C., Li, Y., Wu, Z., Xu, M., Wang, R., Zheng, Z.: Towards reliable utilization of aigc: blockchain-empowered ownership verification mechanism. IEEE. Open. J. Comput. Soc. 4, 326\u2013337 (2023)","journal-title":"IEEE. Open. J. Comput. Soc."},{"issue":"102172","key":"1508_CR6","first-page":"1","volume":"104","author":"Qu Zhiguo","year":"2024","unstructured":"Zhiguo, Qu., Meng, Y., Muhammad, G., Tiwari, P.: QMFND: a quantum multimodal fusion-based fake news detection model for social media. Inf. Fus. 104(102172), 1\u201311 (2024)","journal-title":"Inf. Fus."},{"issue":"1","key":"1508_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2023.3331985","volume":"11","author":"Qu Zhiguo","year":"2024","unstructured":"Zhiguo, Qu., Meng, Y., Liu, Bo., Muhammad, G., Tiwari, P.: QB-IMD: a secure medical data processing system with privacy protection based on quantum blockchain for IoMT. IEEE Internet Things J. 11(1), 1\u201310 (2024)","journal-title":"IEEE Internet Things J."},{"key":"1508_CR8","first-page":"118","volume":"30","author":"EM El Blanchard","year":"2017","unstructured":"El Blanchard, E.M., Mhamdi, R.G., Stainer, J.: Machine learning with adversaries: byzantine tolerant gradient descent. Proc. Adv. Neural. Inf. Process. Syst. 30, 118\u2013128 (2017)","journal-title":"Proc. Adv. Neural. Inf. Process. Syst."},{"key":"1508_CR9","unstructured":"Guerraoui, R. et al.: The hidden vulnerability of distributed learning in Byzantium. Proc. Int. Conf. Mach. Learn. arXiv:1802.07927 (2018)"},{"key":"1508_CR10","doi-asserted-by":"crossref","unstructured":"X. Cao, M. Fang, J. Liu, and N. Z. Gong. Fltrust 2020. Byzantine-robust federated learning via trust bootstrapping. arXiv:2012.13995.","DOI":"10.14722\/ndss.2021.24434"},{"key":"1508_CR11","unstructured":"N. Dong, J. Sun, Z. Wang, S. Zhang, and S. Zheng.: Flock: Defending malicious behaviors in federated learning with blockchain,\u201d 2022, arXiv:2211.04344."},{"issue":"1","key":"1508_CR12","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/MNET.011.2000263","volume":"35","author":"Y Li","year":"2021","unstructured":"Li, Y., Chen, C., Liu, N., Huang, H., Zheng, Z., Yan, Q.: A blockchain-based decentralized federated learning framework with committee consensus. IEEE Netw. 35(1), 234\u2013241 (2021)","journal-title":"IEEE Netw."},{"key":"1508_CR13","doi-asserted-by":"crossref","unstructured":"T. Nguyen, P. Thai, T. R. Jeter, T. N. Dinh, M. T (2022). Tha,: Blockchain-based secure client selection in federated learning. Proc. IEEE Int. Conf. Blockchain Cryptocurrency. 1\u20139","DOI":"10.1109\/ICBC54727.2022.9805521"},{"key":"1508_CR14","unstructured":"Q. Zhen, Y. Xueqiang, Z. Mengchu, Z. Peng, and D. Shuiguang (2022). Blockdfl: a blockchain-based fully decentralized federated learning framework. ,arXiv:2205.10568"},{"issue":"4","key":"1508_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM. Comput. Surveys. (Csur). 51(4), 1\u201335 (2018)","journal-title":"ACM. Comput. Surveys. (Csur)."},{"issue":"2","key":"1508_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"4","key":"1508_CR17","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1508_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) Advances in Cryptology \u2014 EUROCRYPT \u201999, pp. 223\u2013238. Springer, Berlin Heidelberg (1999)"},{"key":"1508_CR19","unstructured":"C. Zhang, S. Li, J. Xia, W. Wang, F. Yan, Y. Liu (2020) BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning. Proc. USENIX Annu. Tech. Conf. 493\u2013506."},{"key":"1508_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107192","volume":"178","author":"APG Lopes","year":"2020","unstructured":"Lopes, A.P.G., Gondim, P.R.L.: Group authentication protocol based on aggregated signatures for D2D communication. Comput. Netw. 178, 107192 (2020)","journal-title":"Comput. Netw."},{"issue":"14","key":"1508_CR21","doi-asserted-by":"publisher","first-page":"2482","DOI":"10.1016\/j.comnet.2010.04.008","volume":"54","author":"ZLBQ Ft","year":"2010","unstructured":"Ft, Z.L.B.Q.: Efficient many-to-one authentication with certificateless aggregate signatures. Comput. Netw. 54(14), 2482\u20132491 (2010)","journal-title":"Comput. Netw."},{"issue":"20","key":"1508_CR22","doi-asserted-by":"publisher","first-page":"18082","DOI":"10.1109\/JIOT.2023.3279847","volume":"10","author":"S Yoon","year":"2023","unstructured":"Yoon, S., Han, S., Hwang, E.: Joint heterogeneous PUF-based security-enhanced IoT authentication. IEEE Internet Things J. 10(20), 18082\u201318096 (2023)","journal-title":"IEEE Internet Things J."},{"key":"1508_CR23","doi-asserted-by":"publisher","first-page":"100937","DOI":"10.1016\/j.iot.2023.100937","volume":"24","author":"B Zahednejad","year":"2023","unstructured":"Zahednejad, B., Gao, C.-Z.: A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics. Internet. Things 24, 100937 (2023)","journal-title":"Internet. Things"},{"issue":"5","key":"1508_CR24","doi-asserted-by":"publisher","first-page":"198","DOI":"10.23919\/JCC.2023.00.010","volume":"20","author":"L Chen","year":"2023","unstructured":"Chen, L., et al.: A provably secure and PUF-based authentication key agreement scheme for cloud-edge IoT. China. Commun. 20(5), 198\u2013216 (2023)","journal-title":"China. Commun."},{"key":"1508_CR25","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1109\/TIFS.2023.3266624","volume":"18","author":"O Millwood","year":"2023","unstructured":"Millwood, O., et al.: PUF-phenotype: a robust and noise-resilient approach to aid group-based authentication with DRAM-PUFs using machine learning. IEEE Trans. Inf. Forensics Secur. 18, 2451\u20132465 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1508_CR26","doi-asserted-by":"crossref","unstructured":"Z L, B Q, F T (2010).Effcient many-to-one authentication with certificateless aggregate signatures. Computer Networks. 54, 14, 2482\u20132491","DOI":"10.1016\/j.comnet.2010.04.008"},{"key":"1508_CR27","unstructured":"Caldas et al. (2018) LEAF: A Benchmark for Federated Settings. CoRR. 1812, 01097."},{"key":"1508_CR28","unstructured":"B. McMahan et al.: Communication-Efficient Learning of Deep Networks from Decentralized Data. Proc. 20th Int\u2019l. Conf. Artificial Intelligence and Statistics. AISTATS , 20\u201322 (2017),"},{"key":"1508_CR29","unstructured":"D. Yin et al.: Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. Proc. 35th Int\u2019l. Conf. Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stock holm, Sweden, July 10\u201315, 2018, ser. Proc. Machine Learn ing Research, J. G. Dy and A. Krause, Eds., vol. 80, PMLR, 2018, pp. 5636\u201345, available: http:\/\/proceedings.mlr.press\/v80\/yin18a.html."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01508-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-024-01508-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01508-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T16:31:15Z","timestamp":1724776275000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-024-01508-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1508"],"URL":"https:\/\/doi.org\/10.1007\/s11554-024-01508-7","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"21 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"130"}}