{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T10:01:12Z","timestamp":1775642472227,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:00:00Z","timestamp":1775606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:00:00Z","timestamp":1775606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012154","name":"Graduate Research and Innovation Projects of Jiangsu Province","doi-asserted-by":"publisher","award":["KYCX25_0634"],"award-info":[{"award-number":["KYCX25_0634"]}],"id":[{"id":"10.13039\/501100012154","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72561011"],"award-info":[{"award-number":["72561011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62522112"],"award-info":[{"award-number":["62522112"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ganpo Talent Program of Jiangxi Province","award":["gpyc20240012"],"award-info":[{"award-number":["gpyc20240012"]}]},{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2020YFB1005500"],"award-info":[{"award-number":["2020YFB1005500"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Youth Fund Program of Jiangxi Province","award":["20252BAC220008"],"award-info":[{"award-number":["20252BAC220008"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With the escalating proliferation of artificial intelligence technologies, AI-generated content (AIGC) has progressively permeated across diverse domains. However, this explosive application has also sparked widespread public discussion about the copyright of AIGC. Existing copyright legal frameworks, originally designed around human creators, now face a paradigm shift. As human involvement in the generation of AIGC diminishes, where creative expression increasingly hinges on AI. This discrepancy has introduced multifaceted complexities and challenges in determining the copyright ownership of AIGC within established legal boundaries. Given this, meticulous recording and auditing of contributions from all parties in AIGC generation becomes imperative. Blockchain, with its decentralized storage, offers a robust technical foundation for AIGC copyright management. Yet existing blockchain-based solutions have clear limitations: most only focus on certifying final generated products, ignoring the management of critical intermediate data across the full lifecycle, thus failing to meet the needs of core scenarios like copyright confirmation and multi-party profit distribution. For this purpose, this paper introduces AIGC-Chain, a trustworthy AIGC copyright management system. It conducts a comprehensive recording of intermediate data generated across the full lifecycle of AIGC. Such data is deposited into a decentralized blockchain for secure multi-party auditing, thereby constructing a trustworthy management for AIGC copyright. In copyright dispute scenarios, auditors can retrieve critical proof from the blockchain, facilitating precise determination of the copyright ownership of AIGC products. Both theoretical and experimental analyses confirm that this scheme shows exceptional performance and security in AIGC copyright management.<\/jats:p>","DOI":"10.1186\/s42400-026-00582-7","type":"journal-article","created":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:18:14Z","timestamp":1775639894000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards trustworthy management of AIGC copyright: blockchain-enabled full lifecycle recording and multi-party auditing approach"],"prefix":"10.1186","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8193-9970","authenticated-orcid":false,"given":"Jiajia","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Moting","family":"Su","sequence":"additional","affiliation":[]},{"given":"Aiqun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Fengshu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiangli","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,8]]},"reference":[{"issue":"3","key":"582_CR1","doi-asserted-by":"publisher","first-page":"2845","DOI":"10.1109\/TNSM.2023.3241610","volume":"20","author":"MRR Ansori","year":"2023","unstructured":"Ansori MRR, Allwinnaldo ARN, Igboanusi IS, Lee JM, Kim D-S (2023) Hades: hash-based audio copy detection system for copyright protection in decentralized music sharing. IEEE Trans Netw Serv Manage 20(3):2845\u20132853","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"582_CR2","doi-asserted-by":"publisher","first-page":"6338","DOI":"10.1109\/TEM.2022.3231057","volume":"71","author":"C Baliker","year":"2024","unstructured":"Baliker C, Baza M, Alourani A, Alshehri A, Alshahrani H, Choo K-KR (2024) On the applications of blockchain in fintech: advancements and opportunities. IEEE Trans Eng Manage 71:6338\u20136355","journal-title":"IEEE Trans Eng Manage"},{"issue":"4","key":"582_CR3","doi-asserted-by":"publisher","first-page":"2316","DOI":"10.1109\/TSC.2023.3246476","volume":"16","author":"X Chen","year":"2023","unstructured":"Chen X, Yang A, Weng J, Tong Y, Huang C, Li T (2023) A blockchain-based copyright protection scheme with proactive defense. IEEE Trans Serv Comput 16(4):2316\u20132329","journal-title":"IEEE Trans Serv Comput"},{"key":"582_CR4","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/OJCS.2023.3315835","volume":"4","author":"C Chen","year":"2023","unstructured":"Chen C, Li Y, Wu Z, Xu M, Wang R, Zheng Z (2023) Towards reliable utilization of aigc: blockchain-empowered ownership verification mechanism. IEEE Open J Comput Soc 4:326\u2013337","journal-title":"IEEE Open J Comput Soc"},{"key":"582_CR5","doi-asserted-by":"crossref","unstructured":"Fernandez P, Couairon G, J\u00e9gou H, Douze M, Furon T (2023) The stable signature: rooting watermarks in latent diffusion models. In: 2023 IEEE\/CVF international conference on computer vision (ICCV), pp. 22409\u201322420","DOI":"10.1109\/ICCV51070.2023.02053"},{"issue":"2","key":"582_CR6","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1287\/mnsc.2023.4718","volume":"70","author":"B Franke","year":"2024","unstructured":"Franke B, Fritz QG, Stenzel A (2024) The (limited) power of blockchain networks for information provision. Manage Sci 70(2):971\u2013990","journal-title":"Manage Sci"},{"issue":"1","key":"582_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1017\/S2044251323000735","volume":"15","author":"H Gaffar","year":"2025","unstructured":"Gaffar H, Albarashdi S (2025) Copyright protection for ai-generated works: exploring originality and ownership in a digital landscape. Asian J Int Law 15(1):23\u201346","journal-title":"Asian J Int Law"},{"issue":"10","key":"582_CR8","doi-asserted-by":"publisher","first-page":"2582","DOI":"10.1109\/TPDS.2021.3071176","volume":"32","author":"Y Hassanzadeh-Nazarabadi","year":"2021","unstructured":"Hassanzadeh-Nazarabadi Y, K\u00fcp\u00e7\u00fc A, \u00d6zkasap O (2021) Lightchain: scalable dht-based blockchain. IEEE Trans Parallel Distrib Syst 32(10):2582\u20132593","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"582_CR9","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1080\/10192557.2019.1703520","volume":"27","author":"T He","year":"2019","unstructured":"He T (2019) The sentimental fools and the fictitious authors: rethinking the copyright issues of ai-generated contents in china. Asia Pac Law Rev 27(2):218\u2013238","journal-title":"Asia Pac Law Rev"},{"issue":"2","key":"582_CR10","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1080\/10192557.2019.1703520","volume":"27","author":"T He","year":"2019","unstructured":"He T (2019) The sentimental fools and the fictitious authors: rethinking the copyright issues of ai-generated contents in china. Asia Pac Law Rev 27(2):218\u2013238","journal-title":"Asia Pac Law Rev"},{"issue":"7","key":"582_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3645104","volume":"56","author":"JW Heo","year":"2024","unstructured":"Heo JW, Ramachandran GS, Dorri A, Jurdak R (2024) Blockchain data storage optimisations: a comprehensive survey. ACM Comput Surv 56(7):1\u201327","journal-title":"ACM Comput Surv"},{"issue":"6","key":"582_CR12","doi-asserted-by":"publisher","first-page":"3415","DOI":"10.1287\/mnsc.2022.4532","volume":"69","author":"G Iyengar","year":"2023","unstructured":"Iyengar G, Saleh F, Sethuraman J, Wang W (2023) Economics of permissioned blockchain adoption. Manage Sci 69(6):3415\u20133436","journal-title":"Manage Sci"},{"issue":"10 Part A","key":"582_CR13","doi-asserted-by":"publisher","first-page":"7988","DOI":"10.1016\/j.jksuci.2022.07.015","volume":"34","author":"J Jiang","year":"2022","unstructured":"Jiang J, Zhang Y, Zhu Y, Dong X, Wang L, Xiang Y (2022) Dciv: decentralized cross-chain data integrity verification with blockchain. J King Saud University Comput Inf Sci 34(10 Part A):7988\u20137999","journal-title":"J King Saud University Comput Inf Sci"},{"issue":"4","key":"582_CR14","doi-asserted-by":"publisher","first-page":"3616","DOI":"10.1109\/TDSC.2025.3532320","volume":"22","author":"J Jiang","year":"2025","unstructured":"Jiang J, Zhang Y, Zhao J, Gao L, Zhu L, Tian Z (2025) Towards efficient consistency auditing of dynamic data in cross-chain interaction. IEEE Trans Dependable Secure Comput 22(4):3616\u20133628","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"582_CR15","doi-asserted-by":"crossref","unstructured":"Kandlhofer M, Steinbauer G, Hirschmugl-Gaisch S, Huber P (2016) Artificial intelligence and computer science in education: from kindergarten to university. In: 2016 IEEE Frontiers in education conference (FIE), pp. 1\u20139","DOI":"10.1109\/FIE.2016.7757570"},{"issue":"2","key":"582_CR16","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1109\/TNSM.2021.3122923","volume":"19","author":"RH Kim","year":"2022","unstructured":"Kim RH, Noh H, Song H, Park GS (2022) Quick block transport system for scalable hyperledger fabric blockchain over d2d-assisted 5g networks. IEEE Trans Netw Serv Manage 19(2):1176\u20131190","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"582_CR17","doi-asserted-by":"crossref","unstructured":"Krichen M (2023) Generative adversarial networks. In: 2023 14th international conference on computing communication and networking technologies (ICCCNT), pp. 1\u20137","DOI":"10.1109\/ICCCNT56998.2023.10306417"},{"issue":"6","key":"582_CR18","doi-asserted-by":"publisher","first-page":"3399","DOI":"10.1109\/TKDE.2025.3546997","volume":"37","author":"B Li","year":"2025","unstructured":"Li B, Lin L, Zhang S, Xu J, Xiao J, Li B, Jin H (2025) Flexim: efficient and verifiable index management in blockchain. IEEE Trans Knowl Data Eng 37(6):3399\u20133412","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"582_CR19","first-page":"37","volume":"6","author":"Z Liang","year":"2015","unstructured":"Liang Z (2015) Judging substantial similarity under copyright law. The Jurist 6:37\u201350","journal-title":"The Jurist"},{"issue":"3","key":"582_CR20","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1109\/TETC.2020.2993032","volume":"9","author":"W Liang","year":"2021","unstructured":"Liang W, Zhang D, Lei X, Tang M, Li K-C, Zomaya AY (2021) Circuit copyright blockchain: blockchain-based homomorphic encryption for ip circuit protection. IEEE Trans Emerg Top Comput 9(3):1410\u20131420","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"11","key":"582_CR21","doi-asserted-by":"publisher","first-page":"3086","DOI":"10.1109\/TC.2023.3285103","volume":"72","author":"Y Liang","year":"2023","unstructured":"Liang Y, Ma J, Miao Y, Kuang D, Meng X, Deng RH (2023) Privacy-preserving bloom filter-based keyword search over large encrypted cloud data. IEEE Trans Comput 72(11):3086\u20133098","journal-title":"IEEE Trans Comput"},{"key":"582_CR22","doi-asserted-by":"crossref","unstructured":"Li R, Liu AX (2017) Adaptively secure conjunctive query processing over encrypted data for cloud computing. In: 2017 IEEE 33rd international conference on data engineering (ICDE), pp. 697\u2013708","DOI":"10.1109\/ICDE.2017.122"},{"issue":"11","key":"582_CR23","first-page":"13201","volume":"37","author":"C Liu","year":"2023","unstructured":"Liu C, Zhang J, Fang H, Ma Z, Zhang W, Yu N (2023) Dear: a deep-learning-based audio re-recording resilient watermarking. Proc AAAI Conf Artif Intell 37(11):13201\u201313209","journal-title":"Proc AAAI Conf Artif Intell"},{"issue":"3","key":"582_CR24","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/MWC.003.2300053","volume":"31","author":"Y Liu","year":"2024","unstructured":"Liu Y, Du H, Niyato D, Kang J, Xiong Z, Miao C, Shen X, Jamalipour A (2024) Blockchain-empowered lifecycle management for ai-generated content products in edge networks. IEEE Wirel Commun 31(3):286\u2013294","journal-title":"IEEE Wirel Commun"},{"issue":"4","key":"582_CR25","doi-asserted-by":"publisher","first-page":"6446","DOI":"10.1109\/TII.2023.3345450","volume":"20","author":"Z Liu","year":"2024","unstructured":"Liu Z, Huang B, Li Y, Sun Q, Pedersen TB, Gao DW (2024) Pricing game and blockchain for electricity data trading in low-carbon smart energy systems. IEEE Trans Industr Inf 20(4):6446\u20136456","journal-title":"IEEE Trans Industr Inf"},{"issue":"12","key":"582_CR26","doi-asserted-by":"publisher","first-page":"10966","DOI":"10.1109\/TMC.2024.3390208","volume":"23","author":"Y Liu","year":"2024","unstructured":"Liu Y, Du H, Niyato D, Kang J, Xiong Z, Jamalipour A, Shen X (2024) Prosecutor: protecting mobile aigc services on two-layer blockchain via reputation and contract theoretic approaches. IEEE Trans Mob Comput 23(12):10966\u201310983","journal-title":"IEEE Trans Mob Comput"},{"issue":"4","key":"582_CR27","doi-asserted-by":"publisher","first-page":"1256","DOI":"10.1109\/TEM.2020.2978014","volume":"67","author":"J Lockl","year":"2020","unstructured":"Lockl J, Schlatt V, Schweizer A, Urbach N, Harth N (2020) Toward trust in internet of things ecosystems: design principles for blockchain-based iot applications. IEEE Trans Eng Manage 67(4):1256\u20131270","journal-title":"IEEE Trans Eng Manage"},{"key":"582_CR28","doi-asserted-by":"publisher","first-page":"81","DOI":"10.71265\/chkr8w30","volume":"2025","author":"Y Lu","year":"2025","unstructured":"Lu Y (2025) Reforming copyright law for ai-generated content: copyright protection, authorship and ownership. Technol Regul 2025:81\u201395","journal-title":"Technol Regul"},{"issue":"1","key":"582_CR29","doi-asserted-by":"publisher","first-page":"215824402210821","DOI":"10.1177\/21582440221082130","volume":"12","author":"Y Luo","year":"2022","unstructured":"Luo Y, Wei W, Ying Z (2022) Artificial intelligence-generated and human expert-designed vocabulary tests: a comparative study. SAGE Open 12(1):21582440221082130","journal-title":"SAGE Open"},{"key":"582_CR30","doi-asserted-by":"crossref","unstructured":"Mei J (2025) A study on copyright and attribution issues in artificial intelligence generated content (aigc). In: Proceedings of the 2025 11th international conference on humanities and social science research (ICHSSR 2025), pp. 1270\u20131276","DOI":"10.2991\/978-2-38476-440-2_143"},{"key":"582_CR31","doi-asserted-by":"crossref","unstructured":"Meng Z, Morizumi T, Miyata S, Kinoshita H (2018) Design scheme of copyright management system based on digital watermarking and blockchain. In: 2018 IEEE 42nd annual computer software and applications conference (COMPSAC), vol. 02, pp. 359\u2013364","DOI":"10.1109\/COMPSAC.2018.10258"},{"key":"582_CR32","doi-asserted-by":"crossref","unstructured":"Mochram RAA, Makawowor CT, Tanujaya KM, Moniaga JV, Jabar BA (2022) Systematic literature review: Blockchain security in nft ownership. In: 2022 international conference on electrical and information technology (IEIT), pp. 302\u2013306","DOI":"10.1109\/IEIT56384.2022.9967897"},{"issue":"3","key":"582_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3492803","volume":"18","author":"I Natgunanathan","year":"2022","unstructured":"Natgunanathan I, Praitheeshan P, Gao L, Xiang Y, Pan L (2022) Blockchain-based audio watermarking technique for multimedia copyright protection in distribution networks. ACM Trans Multimed Comput Commun Appl 18(3):1\u201323","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"8","key":"582_CR34","doi-asserted-by":"publisher","first-page":"2874","DOI":"10.1109\/TEM.2022.3189734","volume":"70","author":"S Ramzan","year":"2023","unstructured":"Ramzan S, Aqdus A, Ravi V, Koundal D, Amin R, Al Ghamdi MA (2023) Healthcare applications using blockchain technology: motivations and challenges. IEEE Trans Eng Manage 70(8):2874\u20132890","journal-title":"IEEE Trans Eng Manage"},{"issue":"3","key":"582_CR35","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TETC.2021.3099701","volume":"10","author":"A Rasheed","year":"2022","unstructured":"Rasheed A, Mahapatra RN, Varol C, Narashimha K (2022) Exploiting zero knowledge proof and blockchains towards the enforcement of anonymity, data integrity and privacy (adip) in the iot. IEEE Trans Emerg Top Comput 10(3):1476\u20131491","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"582_CR36","unstructured":"Ren K, Yang Z, Lu L, Liu J, Li Y, Wan J, Zhao X, Feng X, Shao S (2024) SoK: on the role and future of AIGC watermarking in the era of Gen-AI. https:\/\/arxiv.org\/abs\/2411.11478"},{"key":"582_CR37","doi-asserted-by":"crossref","unstructured":"Sun Y, Xu Y, Cheng C, Li Y, Lee CH, Asadipour A (2022) Travel with wander in the metaverse: an ai chatbot to visit the future earth. In: 2022 IEEE 24th international workshop on multimedia signal processing (MMSP), pp. 1\u20136","DOI":"10.1109\/MMSP55362.2022.9950031"},{"issue":"1","key":"582_CR38","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/SURV.2011.031611.00024","volume":"14","author":"S Tarkoma","year":"2012","unstructured":"Tarkoma S, Rothenberg CE, Lagerspetz E (2012) Theory and practice of bloom filters for distributed systems. IEEE Commun Surv Tutor 14(1):131\u2013155","journal-title":"IEEE Commun Surv Tutor"},{"key":"582_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2021.105581","volume":"42","author":"Y Wan","year":"2021","unstructured":"Wan Y, Lu H (2021) Copyright protection for ai-generated outputs: the experience from china. Comput Law Secur Rev 42:105581","journal-title":"Comput Law Secur Rev"},{"issue":"4","key":"582_CR40","doi-asserted-by":"publisher","first-page":"2188","DOI":"10.1109\/TNSE.2022.3157867","volume":"9","author":"B Wang","year":"2022","unstructured":"Wang B, Shi J, Wang W, Zhao P (2022) Image copyright protection based on blockchain and zero-watermark. IEEE Trans Netw Sci Eng 9(4):2188\u20132199","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"582_CR41","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1109\/TIFS.2024.3492792","volume":"20","author":"C Wei","year":"2025","unstructured":"Wei C, Wang Y, Gao K, Shao S, Li Y, Wang Z, Qin Z (2025) Pointncbw: Toward dataset ownership verification for point clouds via negative clean-label backdoor watermark. IEEE Trans Inf Forensics Secur 20:191\u2013206","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"582_CR42","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.1109\/TNSM.2023.3237685","volume":"20","author":"X Xiao","year":"2023","unstructured":"Xiao X, Zhang Y, Zhu Y, Hu P, Cao X (2023) Fingerchain: copyrighted multi-owner media sharing by introducing asymmetric fingerprinting into blockchain. IEEE Trans Netw Serv Manage 20(3):2869\u20132885","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"3","key":"582_CR43","first-page":"1860","volume":"16","author":"X Xiao","year":"2023","unstructured":"Xiao X, Zhang Y, Dong X, Wang L, Xiang Y, Cao X (2023) Fair outsourcing paid in fiat money using blockchain. IEEE Trans Serv Comput 16(3):1860\u20131873","journal-title":"IEEE Trans Serv Comput"},{"issue":"10","key":"582_CR44","first-page":"11613","volume":"36","author":"X Yang","year":"2022","unstructured":"Yang X, Zhang J, Chen K, Zhang W, Ma Z, Wang F, Yu N (2022) Tracing text provenance via context-aware lexical substitution. Proc AAAI Conf Artif Intell 36(10):11613\u201311621","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"582_CR45","doi-asserted-by":"publisher","first-page":"14945","DOI":"10.1109\/TEM.2024.3472292","volume":"71","author":"F Yang","year":"2024","unstructured":"Yang F, Abedin MZ, Qiao Y, Ye L (2024) Toward trustworthy governance of ai-generated content (aigc): a blockchain-driven regulatory framework for secure digital ecosystems. IEEE Trans Eng Manage 71:14945\u201314962","journal-title":"IEEE Trans Eng Manage"},{"key":"582_CR46","doi-asserted-by":"crossref","unstructured":"Yang Z, Zeng K, Chen K, Fang H, Zhang W, Yu N (2024) Gaussian shading: Provable performance-lossless image watermarking for diffusion models. In: 2024 IEEE\/CVF conference on computer vision and pattern recognition (CVPR), pp. 12162\u201312171","DOI":"10.1109\/CVPR52733.2024.01156"},{"issue":"5","key":"582_CR47","doi-asserted-by":"publisher","first-page":"167","DOI":"10.63367\/199115992025103605012","volume":"36","author":"X-W Ye","year":"2025","unstructured":"Ye X-W, Cui L-Y, Chen G-R, Liu C-Y (2025) Copyright protection and risk mitigation for ai-generated content (aigc) creations. J Comput 36(5):167\u2013181","journal-title":"J Comput"},{"issue":"3","key":"582_CR48","doi-asserted-by":"publisher","first-page":"2273","DOI":"10.1109\/TCC.2022.3196937","volume":"11","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Jiang J, Dong X, Wang L, Xiang Y (2023) Bedcv: blockchain-enabled decentralized consistency verification for cross-chain calculation. IEEE Trans Cloud Comput 11(3):2273\u20132284","journal-title":"IEEE Trans Cloud Comput"},{"issue":"6","key":"582_CR49","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TAI.2022.3213531","volume":"4","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Zhao J, Jiang J, Zhu Y, Wang L, Xiang Y (2023) Recording behaviors of artificial intelligence in blockchains. IEEE Trans Artif Intell 4(6):1437\u20131448","journal-title":"IEEE Trans Artif Intell"},{"key":"582_CR50","doi-asserted-by":"crossref","unstructured":"Zhang Y, Ni J, Su W, Liao X (2023) A novel deep video watermarking framework with enhanced robustness to h.264\/avc compression. In: Proceedings of the 31st ACM international conference on multimedia. MM \u201923, pp. 8095\u20138104. Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/3581783.3612270"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-026-00582-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-026-00582-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-026-00582-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:18:21Z","timestamp":1775639901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-026-00582-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,8]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["582"],"URL":"https:\/\/doi.org\/10.1186\/s42400-026-00582-7","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,8]]},"assertion":[{"value":"16 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"151"}}