Linked Presentation: Cost-effective Attack Forensics by Recording and Correlating File System ChangesRethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion