Linked Presentation: Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion