{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T12:51:02Z","timestamp":1774702262305,"version":"3.50.1"},"reference-count":55,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003459","name":"Guizhou University","doi-asserted-by":"publisher","award":["[2022]21"],"award-info":[{"award-number":["[2022]21"]}],"id":[{"id":"10.13039\/501100003459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100015789","name":"Dalian High-Level Talent Innovation Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015789","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018555","name":"Science and Technology Program of Guizhou Province","doi-asserted-by":"publisher","award":["[2020]5017"],"award-info":[{"award-number":["[2020]5017"]}],"id":[{"id":"10.13039\/501100018555","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018555","name":"Science and Technology Program of Guizhou Province","doi-asserted-by":"publisher","award":["[2023]371"],"award-info":[{"award-number":["[2023]371"]}],"id":[{"id":"10.13039\/501100018555","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018555","name":"Science and Technology Program of Guizhou Province","doi-asserted-by":"publisher","award":["[2022]065"],"award-info":[{"award-number":["[2022]065"]}],"id":[{"id":"10.13039\/501100018555","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005329","name":"Natural Science Foundation of Guizhou Province","doi-asserted-by":"publisher","award":["[2026]461"],"award-info":[{"award-number":["[2026]461"]}],"id":[{"id":"10.13039\/501100005329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2025YFB3109800"],"award-info":[{"award-number":["2025YFB3109800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272123"],"award-info":[{"award-number":["62272123"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.knosys.2026.115714","type":"journal-article","created":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:32:23Z","timestamp":1772847143000},"page":"115714","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Galio: Defending ownership of AI-generated images against content-preserving tampering"],"prefix":"10.1016","volume":"340","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7672-6420","authenticated-orcid":false,"given":"Jiangdi","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5974-1570","authenticated-orcid":false,"given":"Youliang","family":"Tian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5990-6007","authenticated-orcid":false,"given":"Shuangli","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6488-7796","authenticated-orcid":false,"given":"Kedi","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.knosys.2026.115714_bib0001","unstructured":"J. Achiam, S. Adler, S. Agarwal, L. Ahmad, I. Akkaya, F. L. Aleman, D. Almeida, J. Altenschmidt, S. Altman, S. Anadkat, et al., Gpt-4 technical report, (2023). arXiv preprint arXiv: 2303.08774."},{"key":"10.1016\/j.knosys.2026.115714_bib0002","unstructured":"Y. Liu, K. Zhang, Y. Li, Z. Yan, C. Gao, R. Chen, Z. Yuan, Y. Huang, H. Sun, J. Gao, et al., Sora: A review on background, technology, limitations, and opportunities of large vision models, (2024). arXiv preprint arXiv: 2402.17177."},{"key":"10.1016\/j.knosys.2026.115714_bib0003","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/OJCS.2023.3300321","article-title":"A survey on chatGPT: AI\u2013generated contents, challenges, and solutions","volume":"4","author":"Wang","year":"2023","journal-title":"IEEE Open J. Comput. Soc."},{"issue":"10","key":"10.1016\/j.knosys.2026.115714_bib0004","doi-asserted-by":"crossref","first-page":"13559","DOI":"10.1109\/TVT.2023.3278467","article-title":"Economics of semantic communication system: an auction approach","volume":"72","author":"Liew","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.knosys.2026.115714_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3475799","article-title":"Understanding and creating art with AI: review and outlook","volume":"18","author":"Cetinic","year":"2022","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl. (TOMM)"},{"key":"10.1016\/j.knosys.2026.115714_bib0006","unstructured":"L.-H. Lee, Z. Lin, R. Hu, Z. Gong, A. Kumar, T. Li, S. Li, P. Hui, When creators meet the metaverse: a survey on computational arts, (2021). arXiv preprint arXiv: 2111.13486."},{"key":"10.1016\/j.knosys.2026.115714_bib0007","doi-asserted-by":"crossref","first-page":"70977","DOI":"10.1109\/ACCESS.2023.3294090","article-title":"Machine-generated text: a comprehensive survey of threat models and detection methods","volume":"11","author":"Crothers","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.knosys.2026.115714_bib0008","unstructured":"Deloitte, Generative AI and the Creator Economy, 2023, https:\/\/www2.deloitte.com\/us\/en\/pages\/chief-marketing-officer\/articles\/generative-ai-creator-economy.html."},{"key":"10.1016\/j.knosys.2026.115714_bib0009","unstructured":"C.C. Group, The Impact of Generative AI on the Creator Economy, 2024, https:\/\/www.prnewswire.com\/news-releases."},{"issue":"3","key":"10.1016\/j.knosys.2026.115714_bib0010","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/MWC.003.2300053","article-title":"Blockchain-empowered lifecycle management for AI-generated content products in edge networks","volume":"31","author":"Liu","year":"2024","journal-title":"IEEE Wireless Commun."},{"issue":"3","key":"10.1016\/j.knosys.2026.115714_bib0011","doi-asserted-by":"crossref","first-page":"3539","DOI":"10.1109\/TPAMI.2022.3180556","article-title":"MVSS-Net: multi-view multi-scale supervised networks for image manipulation detection","volume":"45","author":"Dong","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.knosys.2026.115714_bib0012","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"3155","article-title":"Hierarchical fine-grained image forgery detection and localization","author":"Guo","year":"2023"},{"issue":"2","key":"10.1016\/j.knosys.2026.115714_bib0013","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","article-title":"A robust image authentication method distinguishing JPEG compression from malicious manipulation","volume":"11","author":"Lin","year":"2001","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"10.1016\/j.knosys.2026.115714_bib0014","doi-asserted-by":"crossref","first-page":"2664","DOI":"10.1109\/TIFS.2016.2594136","article-title":"Quaternion-based image hashing for adaptive tampering localization","volume":"11","author":"Yan","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.knosys.2026.115714_bib0015","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"11964","article-title":"EditGuard: versatile image watermarking for tamper localization and copyright protection","author":"Zhang","year":"2024"},{"key":"10.1016\/j.knosys.2026.115714_bib0016","series-title":"ISSCS 2011-International Symposium on Signals, Circuits and Systems","first-page":"1","article-title":"A robust hashing of ID photos","author":"Smoaca","year":"2011"},{"key":"10.1016\/j.knosys.2026.115714_bib0017","doi-asserted-by":"crossref","first-page":"7131","DOI":"10.1007\/s11042-017-4625-x","article-title":"Robust image authentication via locality sensitive hashing with core alignment","volume":"77","author":"Ma","year":"2018","journal-title":"Multimed Tools Appl."},{"issue":"1","key":"10.1016\/j.knosys.2026.115714_bib0018","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1109\/TDSC.2021.3136163","article-title":"Perceptual image hashing with locality preserving projection for copy detection","volume":"20","author":"Huang","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.knosys.2026.115714_bib0019","series-title":"Proceedings of 3rd IEEE International Conference on Image Processing","first-page":"227","article-title":"A robust content based digital signature for image authentication","volume":"3","author":"Schneider","year":"1996"},{"issue":"2","key":"10.1016\/j.knosys.2026.115714_bib0020","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","article-title":"Robust and secure image hashing","volume":"1","author":"Swaminathan","year":"2006","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.knosys.2026.115714_bib0021","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TKDE.2013.45","article-title":"Robust perceptual image hashing based on ring partition and NMF","volume":"26","author":"Tang","year":"2013","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"10.1016\/j.knosys.2026.115714_bib0022","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TIFS.2012.2190594","article-title":"Perceptual image hashing based on shape contexts and local feature points","volume":"7","author":"Lv","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.knosys.2026.115714_bib0023","unstructured":"X. Bi, D. Chen, G. Chen, S. Chen, D. Dai, C. Deng, H. Ding, K. Dong, Q. Du, Z. Fu, et al., Deepseek llm: scaling open-source language models with longtermism, (2024). arXiv preprint arXiv: 2401.02954."},{"key":"10.1016\/j.knosys.2026.115714_bib0024","unstructured":"H. Lu, W. Liu, B. Zhang, B. Wang, K. Dong, B. Liu, J. Sun, T. Ren, Z. Li, H. Yang, et al., Deepseek-vl: towards real-world vision-language understanding, (2024). arXiv preprint arXiv: 2403.05525."},{"key":"10.1016\/j.knosys.2026.115714_bib0025","unstructured":"H. Du, Z. Li, D. Niyato, J. Kang, Z. Xiong, D.I. Kim, et al., Enabling AI-generated content (AIGC) services in wireless edge networks, (2023). arXiv preprint arXiv: 2301.03220."},{"key":"10.1016\/j.knosys.2026.115714_bib0026","doi-asserted-by":"crossref","unstructured":"Z. Sun, H. Yu, X. Song, R. Liu, Y. Yang, D. Zhou, Mobilebert: a compact task-agnostic bert for resource-limited devices, (2020). arXiv preprint arXiv: 2004.02984.","DOI":"10.18653\/v1\/2020.acl-main.195"},{"issue":"12","key":"10.1016\/j.knosys.2026.115714_bib0027","doi-asserted-by":"crossref","first-page":"14871","DOI":"10.1109\/TMC.2024.3449645","article-title":"Cross-modal generative semantic communications for mobile aigc: joint semantic encoding and prompt engineering","volume":"23","author":"Liu","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"9","key":"10.1016\/j.knosys.2026.115714_bib0028","doi-asserted-by":"crossref","first-page":"8902","DOI":"10.1109\/TMC.2024.3356178","article-title":"Diffusion-based reinforcement learning for edge-enabled AI-generated content services","volume":"23","author":"Du","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"10.1016\/j.knosys.2026.115714_bib0029","doi-asserted-by":"crossref","first-page":"2137","DOI":"10.1109\/TMC.2024.3493375","article-title":"A wireless AI-generated content (AIGC) provisioning framework empowered by semantic communication","volume":"24","author":"Cheng","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"10.1016\/j.knosys.2026.115714_bib0030","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/JSAC.2020.3036946","article-title":"Attention-weighted federated deep reinforcement learning for device-to-device assisted heterogeneous collaborative edge caching","volume":"39","author":"Wang","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.knosys.2026.115714_bib0031","series-title":"ICC 2023-IEEE International Conference on Communications","first-page":"2976","article-title":"Communication and storage efficient federated split learning","author":"Mu","year":"2023"},{"issue":"4","key":"10.1016\/j.knosys.2026.115714_bib0032","first-page":"1963","article-title":"Robust image hashing based on random Gabor filtering and dithered lattice vector quantization","volume":"21","author":"Li","year":"2011","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"10.1016\/j.knosys.2026.115714_bib0033","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","article-title":"Robust image hashing with ring partition and invariant vector distance","volume":"11","author":"Tang","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.knosys.2026.115714_bib0034","series-title":"Proceedings of the 26th ACM International Conference on Multimedia","first-page":"1389","article-title":"Robustness and discrimination oriented hashing combining texture and invariant vector distance","author":"Huang","year":"2018"},{"key":"10.1016\/j.knosys.2026.115714_bib0035","doi-asserted-by":"crossref","first-page":"25409","DOI":"10.1007\/s11042-018-5799-6","article-title":"Image authentication based on robust image hashing with geometric correction","volume":"77","author":"Karsh","year":"2018","journal-title":"Multimed Tools Appl."},{"key":"10.1016\/j.knosys.2026.115714_bib0036","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"11461","article-title":"Repaint: inpainting using denoising diffusion probabilistic models","author":"Lugmayr","year":"2022"},{"issue":"5","key":"10.1016\/j.knosys.2026.115714_bib0037","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1109\/TSMC.1983.6313086","article-title":"Visual cortical neurons as localized spatial frequency filters","author":"Pollen","year":"2012","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"6","key":"10.1016\/j.knosys.2026.115714_bib0038","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1152\/jn.1987.58.6.1233","article-title":"An evaluation of the two-dimensional Gabor filter model of simple receptive fields in cat striate cortex","volume":"58","author":"Jones","year":"1987","journal-title":"J. Neurophysiol."},{"key":"10.1016\/j.knosys.2026.115714_bib0039","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.sigpro.2017.02.008","article-title":"Robust image hashing with multidimensional scaling","volume":"137","author":"Tang","year":"2017","journal-title":"Signal Processing"},{"issue":"2","key":"10.1016\/j.knosys.2026.115714_bib0040","first-page":"331","article-title":"Robust image hashing via random Gabor filtering and DWT","volume":"55","author":"Tang","year":"2018","journal-title":"Comput., Mater. Continua"},{"issue":"9","key":"10.1016\/j.knosys.2026.115714_bib0041","doi-asserted-by":"crossref","first-page":"4516","DOI":"10.1109\/TIP.2018.2839890","article-title":"A Gabor feature-based quality assessment model for the screen content images","volume":"27","author":"Ni","year":"2018","journal-title":"IEEE Trans. Image Process."},{"issue":"11","key":"10.1016\/j.knosys.2026.115714_bib0042","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.knosys.2026.115714_bib0043","unstructured":"A.G. Weber, The USC-SIPI image database: version 5, (2006). http:\/\/sipi.usc.edu\/database\/."},{"issue":"9","key":"10.1016\/j.knosys.2026.115714_bib0044","doi-asserted-by":"crossref","first-page":"1704","DOI":"10.1109\/TPAMI.2011.235","article-title":"Aggregating local image descriptors into compact codes","volume":"34","author":"Jgou","year":"2012","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.knosys.2026.115714_bib0045","series-title":"Storage and Retrieval Methods and Applications for Multimedia 2004","first-page":"472","article-title":"UCID: An uncompressed color image database","volume":"5307","author":"Schaefer","year":"2003"},{"key":"10.1016\/j.knosys.2026.115714_bib0046","unstructured":"D. Podell, Z. English, K. Lacey, A. Blattmann, T. Dockhorn, J. M\u00fcller, J. Penna, R. Rombach, Sdxl: improving latent diffusion models for high-resolution image synthesis, (2023). arXiv preprint arXiv: 2307.01952."},{"key":"10.1016\/j.knosys.2026.115714_bib0047","series-title":"Testing statistical hypotheses","author":"Lehmann","year":"2005"},{"key":"10.1016\/j.knosys.2026.115714_bib0048","unstructured":"M. Zhu, H. Chen, Q. Yan, X. Huang, G. Lin, W. Li, Z. Tu, H. Hu, J. Hu, Y. Wang, GenImage: A Million-Scale Benchmark for Detecting AI-Generated Image, 2023, arXiv: 2306.08571."},{"key":"10.1016\/j.knosys.2026.115714_bib0049","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"4015","article-title":"Segment anything","author":"Kirillov","year":"2023"},{"key":"10.1016\/j.knosys.2026.115714_bib0050","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.cose.2016.07.006","article-title":"Robust image hashing via DCT and LLE","volume":"62","author":"Tang","year":"2016","journal-title":"Comput. Secur."},{"key":"10.1016\/j.knosys.2026.115714_bib0051","series-title":"Proceedings of the 2023ACM Workshop on Information Hiding and Multimedia Security","first-page":"7","article-title":"TMCIH: Perceptual robust image hashing with transformer-based multi-layer constraints","author":"Fang","year":"2023"},{"key":"10.1016\/j.knosys.2026.115714_bib0052","article-title":"A high performance region recognition network-enhanced deep CNN for image content perceptual hashing","author":"Yang","year":"2025","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"10.1016\/j.knosys.2026.115714_bib0053","doi-asserted-by":"crossref","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","article-title":"PSCC-Net: progressive spatio-channel correlation network for image manipulation detection and localization","volume":"32","author":"Liu","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.knosys.2026.115714_bib0054","unstructured":"X. Ma, B. Du, Z. Jiang, A.Y.A. Hammadi, J. Zhou, IML-ViT: Benchmarking Image Manipulation Localization by Vision Transformer, (2023). arXiv preprint arXiv: 2307.14863."},{"key":"10.1016\/j.knosys.2026.115714_bib0055","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"13440","article-title":"Robust image forgery detection over online social network shared images","author":"Wu","year":"2022"}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705126004545?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705126004545?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T12:07:35Z","timestamp":1774699655000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705126004545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":55,"alternative-id":["S0950705126004545"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2026.115714","relation":{},"ISSN":["0950-7051"],"issn-type":[{"value":"0950-7051","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Galio: Defending ownership of AI-generated images against content-preserving tampering","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2026.115714","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115714"}}