{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:54:31Z","timestamp":1770278071208,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T00:00:00Z","timestamp":1718323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,14]]},"DOI":"10.1145\/3674912.3674931","type":"proceedings-article","created":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T12:57:33Z","timestamp":1723121853000},"page":"16-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["ProtAIN: Protecting the Authenticity and Integrity Properties of NFT Images"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6427-5519","authenticated-orcid":false,"given":"Iosif","family":"Polenakis","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1280-9483","authenticated-orcid":false,"given":"Vasileios","family":"Vouronikos","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7313-2745","authenticated-orcid":false,"given":"Eftychia","family":"Kiafa","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2862-6390","authenticated-orcid":false,"given":"Maria","family":"Chroni","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6684-8459","authenticated-orcid":false,"given":"Stavros D.","family":"Nikolopoulos","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Ioannina, Greece"}]}],"member":"320","published-online":{"date-parts":[[2024,8,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Andreas\u00a0M Antonopoulos. 2022. Mastering bitcoin: unlocking digital crypto-currencies. O\u2019Reilly."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_3_1","first-page":"2","volume-title":"Ipfs-content addressed, versioned","author":"Benet Juan","year":"2014","unstructured":"Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014)."},{"key":"e_1_3_2_1_4_1","volume-title":"A next-generation smart contract and decentralized application platform. white paper 3, 37","author":"Vitalik Buterin","year":"2014","unstructured":"Vitalik Buterin 2014. A next-generation smart contract and decentralized application platform. white paper 3, 37 (2014), 2\u20131."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3606305.3606317"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISA59645.2023.10345872"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2200628"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103389"},{"key":"e_1_3_2_1_9_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_10_1","volume-title":"Upgrading blockchains: Smart contract use cases in industry. Retrieved December 12","author":"Ream John","year":"2016","unstructured":"John Ream, Yang Chu, and David Schatsky. 2016. Upgrading blockchains: Smart contract use cases in industry. Retrieved December 12 (2016), 2017."},{"key":"e_1_3_2_1_11_1","volume-title":"Blockchain: Blueprint for a new economy. \" O\u2019Reilly Media","author":"Swan Melanie","year":"2015","unstructured":"Melanie Swan. 2015. Blockchain: Blueprint for a new economy. \" O\u2019Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_12_1","volume-title":"The idea of smart contracts. Nick Szabo\u2019s papers and concise tutorials 6, 1","author":"Szabo Nick","year":"1997","unstructured":"Nick Szabo. 1997. The idea of smart contracts. Nick Szabo\u2019s papers and concise tutorials 6, 1 (1997), 199."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/info14020117"},{"key":"e_1_3_2_1_14_1","volume-title":"Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world","author":"Tapscott Don","unstructured":"Don Tapscott and Alex Tapscott. 2016. Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6478-3_3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01552-3"},{"key":"e_1_3_2_1_17_1","volume-title":"Digital image copyright protection method based on blockchain and zero trust mechanism. Multimedia Tools and Applications","author":"Yang Rui","year":"2024","unstructured":"Qiu-yu Zhang, Guo-rui Wu, Rui Yang, and Jia-yan Chen. 2024. Digital image copyright protection method based on blockchain and zero trust mechanism. Multimedia Tools and Applications (2024), 1\u201336."}],"event":{"name":"CompSysTech '24: International Conference on Computer Systems and Technologies 2024","location":"Ruse Bulgaria","acronym":"CompSysTech '24"},"container-title":["Proceedings of the International Conference on Computer Systems and Technologies 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674912.3674931","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674912.3674931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:47:51Z","timestamp":1755906471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674912.3674931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,14]]},"references-count":17,"alternative-id":["10.1145\/3674912.3674931","10.1145\/3674912"],"URL":"https:\/\/doi.org\/10.1145\/3674912.3674931","relation":{},"subject":[],"published":{"date-parts":[[2024,6,14]]},"assertion":[{"value":"2024-08-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}