{"id":"https://openalex.org/W4399990958","doi":"https://doi.org/10.1186/s42400-026-00582-7","title":"Towards trustworthy management of AIGC copyright: blockchain-enabled full lifecycle recording and multi-party auditing approach","display_name":"Towards trustworthy management of AIGC copyright: blockchain-enabled full lifecycle recording and multi-party auditing approach","publication_year":2026,"publication_date":"2026-04-08","ids":{"openalex":"https://openalex.org/W4399990958","doi":"https://doi.org/10.1186/s42400-026-00582-7"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-026-00582-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00582-7","pdf_url":null,"source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1186/s42400-026-00582-7","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018021099","display_name":"Jiajia Jiang","orcid":"https://orcid.org/0000-0002-8193-9970"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jiajia Jiang","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-8193-9970","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046853408","display_name":"Moting Su","orcid":"https://orcid.org/0009-0002-1842-4584"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Moting Su","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Aiqun Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aiqun Wu","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057787077","display_name":"Xiangli Xiao","orcid":"https://orcid.org/0000-0002-3250-0603"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fengshu Li","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Xiangli Xiao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiangli Xiao","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5018021099"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.00144963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.8169000148773193,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.8169000148773193,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11159","display_name":"Manufacturing Process and Optimization","score":0.7775999903678894,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12111","display_name":"Industrial Vision Systems and Defect Detection","score":0.7032999992370605,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9712852835655212},{"id":"https://openalex.org/keywords/product-lifecycle","display_name":"Product lifecycle","score":0.5562766790390015},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.5061284899711609},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.48144739866256714},{"id":"https://openalex.org/keywords/system-lifecycle","display_name":"System lifecycle","score":0.4309500455856323},{"id":"https://openalex.org/keywords/application-lifecycle-management","display_name":"Application lifecycle management","score":0.4218997657299042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.40529105067253113},{"id":"https://openalex.org/keywords/new-product-development","display_name":"New product development","score":0.2445944845676422},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15016725659370422},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1417813003063202},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.0821409523487091}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9712852835655212},{"id":"https://openalex.org/C194304873","wikidata":"https://www.wikidata.org/wiki/Q1967338","display_name":"Product lifecycle","level":3,"score":0.5562766790390015},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.5061284899711609},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.48144739866256714},{"id":"https://openalex.org/C35280785","wikidata":"https://www.wikidata.org/wiki/Q559486","display_name":"System lifecycle","level":4,"score":0.4309500455856323},{"id":"https://openalex.org/C30452754","wikidata":"https://www.wikidata.org/wiki/Q621590","display_name":"Application lifecycle management","level":3,"score":0.4218997657299042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40529105067253113},{"id":"https://openalex.org/C19351080","wikidata":"https://www.wikidata.org/wiki/Q1395034","display_name":"New product development","level":2,"score":0.2445944845676422},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15016725659370422},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1417813003063202},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0821409523487091},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1186/s42400-026-00582-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00582-7","pdf_url":null,"source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2406.14966","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2406.14966","pdf_url":"https://arxiv.org/pdf/2406.14966","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:228e2f282bb94d29a81555b02be22a18","is_oa":true,"landing_page_url":"https://doaj.org/article/228e2f282bb94d29a81555b02be22a18","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"},{"id":"doi:10.48550/arxiv.2406.14966","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2406.14966","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-026-00582-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00582-7","pdf_url":null,"source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3170711941","display_name":null,"funder_award_id":"KYCX25_0634","funder_id":"https://openalex.org/F4320335769","funder_display_name":"Graduate Research and Innovation Projects of Jiangsu Province"},{"id":"https://openalex.org/G5255232751","display_name":null,"funder_award_id":"62522112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6471789372","display_name":null,"funder_award_id":"72561011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8183431286","display_name":null,"funder_award_id":"2020YFB1005500","funder_id":"https://openalex.org/F4320335774","funder_display_name":"Key Technologies Research and Development Program"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335769","display_name":"Graduate Research and Innovation Projects of Jiangsu Province","ror":null},{"id":"https://openalex.org/F4320335774","display_name":"Key Technologies Research and Development Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W4319990412","https://openalex.org/W4322576471","https://openalex.org/W4321608014","https://openalex.org/W4386825119","https://openalex.org/W4390872921","https://openalex.org/W4323838480","https://openalex.org/W4391137989","https://openalex.org/W3150259629","https://openalex.org/W2996158238","https://openalex.org/W4391653804","https://openalex.org/W4310365787","https://openalex.org/W4286267960","https://openalex.org/W4406856660","https://openalex.org/W2557717610","https://openalex.org/W3211144118","https://openalex.org/W4388937529","https://openalex.org/W4408100224","https://openalex.org/W3025413549","https://openalex.org/W4380534753","https://openalex.org/W2616721641","https://openalex.org/W4391547981","https://openalex.org/W4390728454","https://openalex.org/W4394896937","https://openalex.org/W3022475079","https://openalex.org/W4410598123","https://openalex.org/W4220922485","https://openalex.org/W4412150568","https://openalex.org/W2808861077","https://openalex.org/W4312380740","https://openalex.org/W4214882459","https://openalex.org/W4287890976","https://openalex.org/W3189400999","https://openalex.org/W4312706002","https://openalex.org/W2074633331","https://openalex.org/W3191179104","https://openalex.org/W4226000197","https://openalex.org/W4404102669","https://openalex.org/W4317038640","https://openalex.org/W4403094516","https://openalex.org/W4402727205","https://openalex.org/W7101396251","https://openalex.org/W4290710595","https://openalex.org/W4312896989","https://openalex.org/W4388188892"],"related_works":["https://openalex.org/W2386546059","https://openalex.org/W2352001183","https://openalex.org/W2065093007","https://openalex.org/W1546685302","https://openalex.org/W2463298341","https://openalex.org/W2717941190","https://openalex.org/W2316473513","https://openalex.org/W2001049975","https://openalex.org/W2992240247","https://openalex.org/W1479753024"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,29,51,73,128,135,142,177,212,218],"escalating":[3],"proliferation":[4],"of":[5,31,53,76,88,130,144,172,180,217,221],"artificial":[6],"intelligence":[7],"technologies,":[8],"AI-generated":[9],"content":[10],"(AIGC)":[11],"has":[12,22,65],"progressively":[13],"permeated":[14],"across":[15,134,176],"diverse":[16],"domains.":[17],"However,":[18],"this":[19,155,157,231],"explosive":[20],"application":[21],"also":[23],"sparked":[24],"widespread":[25],"public":[26],"discussion":[27],"about":[28],"copyright":[30,34,74,110,148,164,203,219,240],"AIGC.":[32,181],"Existing":[33],"legal":[35,80],"frameworks,":[36],"originally":[37],"designed":[38],"around":[39],"human":[40,48],"creators,":[41],"now":[42],"face":[43],"a":[44,104,161,169,187,196],"paradigm":[45],"shift.":[46],"As":[47],"involvement":[49],"in":[50,71,93,238],"generation":[52,95],"AIGC":[54,77,94,109,163,200,222,239],"diminishes,":[55],"where":[56],"creative":[57],"expression":[58],"increasingly":[59],"hinges":[60],"on":[61,122],"AI.":[62],"This":[63],"discrepancy":[64],"introduced":[66],"multifaceted":[67],"complexities":[68],"and":[69,86,150,226,236],"challenges":[70],"determining":[72],"ownership":[75,220],"within":[78],"established":[79],"boundaries.":[81],"Given":[82],"this,":[83],"meticulous":[84],"recording":[85,171],"auditing":[87],"contributions":[89],"from":[90,211],"all":[91],"parties":[92],"becomes":[96],"imperative.":[97],"Blockchain,":[98],"with":[99],"its":[100],"decentralized":[101,188],"storage,":[102],"offers":[103],"robust":[105],"technical":[106],"foundation":[107],"for":[108,190,199],"management.":[111,241],"Yet":[112],"existing":[113],"blockchain-based":[114],"solutions":[115],"have":[116],"clear":[117],"limitations:":[118],"most":[119],"only":[120],"focus":[121],"certifying":[123],"final":[124],"generated":[125,175],"products,":[126],"ignoring":[127],"management":[129,165,198],"critical":[131,209],"intermediate":[132,173],"data":[133,174,183],"full":[136,178],"lifecycle,":[137],"thus":[138],"failing":[139],"to":[140],"meet":[141],"needs":[143],"core":[145],"scenarios":[146],"like":[147],"confirmation":[149],"multi-party":[151,192],"profit":[152],"distribution.":[153],"For":[154],"purpose,":[156],"paper":[158],"introduces":[159],"AIGC-Chain,":[160],"trustworthy":[162,197],"system.":[166],"It":[167],"conducts":[168],"comprehensive":[170],"lifecycle":[179],"Such":[182],"is":[184],"deposited":[185],"into":[186],"blockchain":[189],"secure":[191],"auditing,":[193],"thereby":[194],"constructing":[195],"copyright.":[201],"In":[202],"dispute":[204],"scenarios,":[205],"auditors":[206],"can":[207],"retrieve":[208],"proof":[210],"blockchain,":[213],"facilitating":[214],"precise":[215],"determination":[216],"products.":[223],"Both":[224],"theoretical":[225],"experimental":[227],"analyses":[228],"confirm":[229],"that":[230],"scheme":[232],"shows":[233],"exceptional":[234],"performance":[235],"security":[237]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-11T08:15:01.531666","created_date":"2024-06-25T00:00:00"}
