{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:31:33Z","timestamp":1772767893883,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3626495.3626506","type":"proceedings-article","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T12:06:04Z","timestamp":1700481964000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["DECORAIT - DECentralized Opt-in\/out Registry for AI Training"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1296-9254","authenticated-orcid":false,"given":"Kar","family":"Balan","sequence":"first","affiliation":[{"name":"University of Surrey, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3898-0596","authenticated-orcid":false,"given":"Andrew","family":"Gilbert","sequence":"additional","affiliation":[{"name":"University of Surrey, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0661-9990","authenticated-orcid":false,"given":"Alexander","family":"Black","sequence":"additional","affiliation":[{"name":"University of Surrey, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9472-0425","authenticated-orcid":false,"given":"Simon","family":"Jenni","sequence":"additional","affiliation":[{"name":"Adobe Research, US"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9629-9718","authenticated-orcid":false,"given":"Andy","family":"Parsons","sequence":"additional","affiliation":[{"name":"Adobe, US"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3580-4685","authenticated-orcid":false,"given":"John","family":"Collomosse","sequence":"additional","affiliation":[{"name":"Adobe Research, US"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. Intl. Broadcasting Convention (IBC).","author":"Aythora J.","year":"2020","unstructured":"J. Aythora 2020. Multi-stakeholder Media Provenance Management to Counter Synthetic Media Risks in News Publishing. In Proc. Intl. Broadcasting Convention (IBC)."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. CVPR Workshop on Media Forensics.","author":"Balan K.","unstructured":"K. Balan, S. Agarwal, S. Jenni, A. Parsons, A. Gilbert, and J. Collomosse. 2023. EKILA: Synthetic Media Provenance and Attribution for Generative Art. In Proc. CVPR Workshop on Media Forensics."},{"key":"e_1_3_2_1_3_1","unstructured":"J. Benet. 2014. IPFS - Content Addressed Versioned P2P File System. arxiv:1407.3561\u00a0[cs.NI]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050061"},{"key":"e_1_3_2_1_5_1","article-title":"A Survey: Security, Transparency, and Scalability Issues of NFT\u2019s and Its Marketplaces","volume":"22","author":"Bhujel S.","year":"2022","unstructured":"S. Bhujel and Y. Rahulamathavan. 2022. A Survey: Security, Transparency, and Scalability Issues of NFT\u2019s and Its Marketplaces. J. Sensors. MDPI. 22, 22 (2022).","journal-title":"J. Sensors. MDPI."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. CVPR Workshop on Media Forensics. 972\u2013980","author":"Black A.","unstructured":"A. Black, T. Bui, H. Jin, V. Swaminathan, and J. Collomosse. 2021. Deep Image Comparator: Learning To Visualize Editorial Change. In Proc. CVPR Workshop on Media Forensics. 972\u2013980."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. CVPR WS.","author":"Bui T.","unstructured":"T. Bui, S. Agarwal, N. Yu, and J. Collomosse. 2023. RoSteALS: Robust Steganography using Autoencoder Latent Space. In Proc. CVPR WS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2967640"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00338"},{"key":"e_1_3_2_1_10_1","unstructured":"N. Carlini J. Hayes M. Nasr M. Jagielski V. Sehwag F. Tram\u00e8r B. Balle D. Ippolito and E. Wallace. 2023. Extracting Training Data from Diffusion Models. arxiv:2301.13188\u00a0[cs.CR]"},{"key":"e_1_3_2_1_11_1","volume-title":"International conference on machine learning. PMLR, 1597\u20131607","author":"Chen T.","unstructured":"T. Chen, S. Kornblith, M. Norouzi, and G. Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597\u20131607."},{"key":"e_1_3_2_1_12_1","unstructured":"Coalition for Content Provenance and Authenticity. 2021. Technical Specification v1.3. Technical Report. C2PA. https:\/\/c2pa.org\/"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. ACM Doc.Eng.","author":"Collomosse J.","unstructured":"J. Collomosse, T. Bui, A. Brown, J. Sheridan, A. Green, M. Bell, J. Fawcett, J. Higgins, and O. Thereaux. 2018. ARCHANGEL: Trusted Archives of Digital Public Documents. In Proc. ACM Doc.Eng."},{"key":"e_1_3_2_1_14_1","first-page":"831","article-title":"A Fragile Watermarking scheme for Image Authentication with Tamper Localization Using Integer Wavelet transform","volume":"5","author":"Venkatesan M.","year":"2019","unstructured":"P.\u00a0Meenakshi Devi, M. Venkatesan, and K. Duraiswamy. 2019. A Fragile Watermarking scheme for Image Authentication with Tamper Localization Using Integer Wavelet transform. J. Computer Science 5, 11 (2019), 831\u2013837.","journal-title":"J. Computer Science"},{"key":"e_1_3_2_1_15_1","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume":"34","author":"Dhariwal P.","year":"2021","unstructured":"P. Dhariwal and A. Nichol. 2021. Diffusion models beat GANs on image synthesis. NeuIPS 34 (2021), 8780\u20138794.","journal-title":"NeuIPS"},{"key":"e_1_3_2_1_16_1","volume-title":"Tokenized: The Law of Non-Fungible Tokens and Unique Digital Property. Indiana Law Journal","author":"Fairfield J.","year":"2021","unstructured":"J. Fairfield. 2021. Tokenized: The Law of Non-Fungible Tokens and Unique Digital Property. Indiana Law Journal (2021)."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. Selected Areas in Cryptography (SAC).","author":"Gilbert H.","unstructured":"H. Gilbert and H. Handschuh. 2003. Security Analysis of SHA-256 and Sisters. In Proc. Selected Areas in Cryptography (SAC)."},{"key":"e_1_3_2_1_18_1","volume-title":"Decentralized and Collaborative AI on Blockchain. In IEEE Intl. Conf. on Blockchain. IEEE.","author":"Harris D.","unstructured":"J.\u00a0D. Harris and B. Waggoner. 2019. Decentralized and Collaborative AI on Blockchain. In IEEE Intl. Conf. on Blockchain. IEEE."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Hendrycks D.","year":"2019","unstructured":"D. Hendrycks and T. Dietterich. 2019. Benchmarking Neural Network Robustness to Common Corruptions and Perturbations. Proceedings of the International Conference on Learning Representations (2019)."},{"key":"e_1_3_2_1_20_1","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho J.","year":"2020","unstructured":"J. Ho, A. Jain, and P. Abbeel. 2020. Denoising diffusion probabilistic models. NIPS 33 (2020), 6840\u20136851.","journal-title":"NIPS"},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Distributed ledger technologies for public good","volume":"1","author":"Holmes C.","year":"2018","unstructured":"C. Holmes. 2018. Distributed ledger technologies for public good. Tech. Rep., UK Gov. Office for Science 1 (2018), 1\u201333.","journal-title":"Tech. Rep., UK Gov. Office for Science"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"N. Kumari B. Zhang R. Zhang E. Shechtman and J. Zhu. 2023. Multi-Concept Customization of Text-to-Image Diffusion. arxiv:2212.04488\u00a0[cs.CV]","DOI":"10.1109\/CVPR52729.2023.00192"},{"key":"e_1_3_2_1_23_1","unstructured":"V.\u00a0L. Lemieux. 2016. Blockchain Technology for Recordkeeping: Help or Hype?Technical Report. U. British Columbia."},{"key":"e_1_3_2_1_24_1","unstructured":"S. Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_25_1","unstructured":"A. Narayanan J. Bonneau E. Felten A. Miller and S. Goldfeder. 2016. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. U. Princeton."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. ICCV.","author":"Nguyen E.","unstructured":"E. Nguyen, T. Bui, V. Swaminathan, and J. Collomosse. 2021. OSCAR-Net: Object-centric Scene Graph Attention for Image Attribution. In Proc. ICCV."},{"key":"e_1_3_2_1_27_1","volume-title":"d.]. Introducing Chat-GPT. https:\/\/openai.com\/blog\/chatgpt. Accessed","author":"AI.","year":"2023","unstructured":"OpenAI. [n. d.]. Introducing Chat-GPT. https:\/\/openai.com\/blog\/chatgpt. Accessed: 2023."},{"key":"e_1_3_2_1_28_1","volume-title":"SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. arxiv:2307.01952\u00a0[cs.CV]","author":"Podell D.","year":"2023","unstructured":"D. Podell, Z. English, K. Lacey, A. Blattmann, T. Dockhorn, J. M\u00fcller, J. Penna, and R. Rombach. 2023. SDXL: Improving Latent Diffusion Models for High-Resolution Image Synthesis. arxiv:2307.01952\u00a0[cs.CV]"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"A. Ramesh P. Dhariwal A. Nichol C. Chu and M. Chen. 2022. Hierarchical Text-Conditional Image Generation with CLIP Latents. https:\/\/doi.org\/10.48550\/ARXIV.2204.06125","DOI":"10.48550\/ARXIV.2204.06125"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"R. Rombach A. Blattmann D. Lorenz P. Esser and B. Ommer. 2021. High-Resolution Image Synthesis with Latent Diffusion Models. arxiv:2112.10752\u00a0[cs.CV]","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_31_1","unstructured":"L. Rosenthol A. Parsons E. Scouten J. Aythora B. MacCormack P. England M. Levallee J. Dotan 2020. Content Authenticity Initiative (CAI): Setting the Standard for Content Attribution. Technical Report. Adobe Inc."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"N. Ruiz Y. Li V. Jampani Y. Pritch M. Rubinstein and K. Aberman. 2022. DreamBooth: Fine Tuning Text-to-image Diffusion Models for Subject-Driven Generation. (2022).","DOI":"10.1109\/CVPR52729.2023.02155"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"C. Saharia W. Chan S. Saxena L. Li J. Whang E. Denton S. Kamyar\u00a0Ghasemipour B. Karagol\u00a0Ayan S. Mahdavi R. Gontijo\u00a0Lopes T. Salimans J. Ho D.\u00a0J. Fleet and M. Norouzi. 2022. Photorealistic Text-to-Image Diffusion Models with Deep Language Understanding. arXiv preprint arXiv:2205.11487 (2022).","DOI":"10.1145\/3528233.3530757"},{"key":"e_1_3_2_1_34_1","unstructured":"C. Schuhmann R. Vencu R. Beaumont . Kaczmarczyk C. Mullis A. Katta T. Coombes J. Jitsev and A. Komatsuzaki. 2021. LAION-400M: Open Dataset of CLIP-Filtered 400 Million Image-Text Pairs. arxiv:2111.02114\u00a0[cs.CV]"},{"key":"e_1_3_2_1_35_1","unstructured":"J. Shi W. Xiong Z. Lin and H.\u00a0Joon Jung. 2023. InstantBooth: Personalized Text-to-Image Generation without Test-Time Finetuning. arxiv:2304.03411\u00a0[cs.CV]"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"G. Somepalli V. Singla M. Goldblum J. Geiping and T. Goldstein. 2022. Diffusion Art or Digital Forgery? Investigating Data Replication in Diffusion Models. arxiv:2212.03860\u00a0[cs.LG]","DOI":"10.1109\/CVPR52729.2023.00586"},{"key":"e_1_3_2_1_37_1","unstructured":"G. Somepalli V. Singla M. Goldblum J. Geiping and T. Goldstein. 2023. Understanding and Mitigating Copying in Diffusion Models. arxiv:2305.20086\u00a0[cs.LG]"},{"key":"e_1_3_2_1_38_1","volume-title":"d.]. Stable Diffusion Public Release. https:\/\/stability.ai\/blog\/stable-diffusion-public-release. Accessed","year":"2023","unstructured":"Stablity.ai. [n. d.]. Stable Diffusion Public Release. https:\/\/stability.ai\/blog\/stable-diffusion-public-release. Accessed: 2023."},{"key":"e_1_3_2_1_39_1","unstructured":"G. Tolias R. Sicre and H. J\u00e9gou. 2015. Particular object retrieval with integral max-pooling of CNN activations. arXiv preprint arXiv:1511.05879 (2015)."},{"key":"e_1_3_2_1_40_1","unstructured":"M. Walport. 2015. Distributed Ledgers: Beyond Blockchain. Technical Report. UK Government."},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. ICLR.","author":"Yu N.","unstructured":"N. Yu, V. Skripniuk, D. Chen, L. Davis, and M. Fritz. 2021. Responsible Disclosure of Generative Models Using Scalable Fingerprinting. In Proc. ICLR."}],"event":{"name":"CVMP '23: European Conference on Visual Media Production","location":"London United Kingdom","acronym":"CVMP '23"},"container-title":["Proceedings of the 20th ACM SIGGRAPH European Conference on Visual Media Production"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626495.3626506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3626495.3626506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:07:00Z","timestamp":1755972420000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3626495.3626506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":41,"alternative-id":["10.1145\/3626495.3626506","10.1145\/3626495"],"URL":"https:\/\/doi.org\/10.1145\/3626495.3626506","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}