Security and privacy on generative data in aigc: A survey

T Wang, Y Zhang, S Qi, R Zhao, Z **a… - ACM Computing Surveys, 2024 - dl.acm.org
The advent of artificial intelligence-generated content (AIGC) represents a pivotal moment in
the evolution of information technology. With AIGC, it can be effortless to generate high …

Editguard: Versatile image watermarking for tamper localization and copyright protection

X Zhang, R Li, J Yu, Y Xu, W Li… - Proceedings of the …, 2024 - openaccess.thecvf.com
In the era of AI-generated content (AIGC) malicious tampering poses imminent threats to
copyright integrity and information security. Current deep image watermarking while widely …

Attacks and defenses for generative diffusion models: A comprehensive survey

VT Truong, LB Dang, LB Le - arxiv preprint arxiv:2408.03400, 2024 - arxiv.org
Diffusion models (DMs) have achieved state-of-the-art performance on various generative
tasks such as image synthesis, text-to-image, and text-guided image-to-image generation …

Copyright protection in generative ai: A technical perspective

J Ren, H Xu, P He, Y Cui, S Zeng, J Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
Generative AI has witnessed rapid advancement in recent years, expanding their
capabilities to create synthesized content such as text, images, audio, and code. The high …

Simac: A simple anti-customization method for protecting face privacy against text-to-image synthesis of diffusion models

F Wang, Z Tan, T Wei, Y Wu… - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Despite the success of diffusion-based customization methods on visual content creation
increasing concerns have been raised about such techniques from both privacy and political …

Create your world: Lifelong text-to-image diffusion

G Sun, W Liang, J Dong, J Li, Z Ding… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Text-to-image generative models can produce diverse high-quality images of concepts with
a text prompt, which have demonstrated excellent ability in image generation, image …

Prompt Stealing Attacks Against {Text-to-Image} Generation Models

X Shen, Y Qu, M Backes, Y Zhang - 33rd USENIX Security Symposium …, 2024 - usenix.org
Text-to-Image generation models have revolutionized the artwork design process and
enabled anyone to create high-quality images by entering text descriptions called prompts …

Rethinking the invisible protection against unauthorized image usage in stable diffusion

S An, L Yan, S Cheng, G Shen, K Zhang, Q Xu… - 33rd USENIX Security …, 2024 - usenix.org
Advancements in generative AI models like Stable Diffusion, DALL· E 2, and Midjourney
have revolutionized digital creativity, enabling the generation of authentic-looking images …

EditShield: Protecting Unauthorized Image Editing by Instruction-Guided Diffusion Models

R Chen, H **, Y Liu, J Chen, H Wang… - European Conference on …, 2024 - Springer
Text-to-image diffusion models have emerged as an evolutionary for producing creative
content in image synthesis. Based on the impressive generation abilities of these models …

Prompt-agnostic adversarial perturbation for customized diffusion models

C Wan, Y He, X Song, Y Gong - Advances in Neural …, 2025 - proceedings.neurips.cc
Diffusion models have revolutionized customized text-to-image generation, allowing for
efficient synthesis of photos from personal data with textual descriptions. However, these …