Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI