Establishing Robust Generative Image Steganography via Popular Stable Diffusion

被引:9
作者
Hu, Xiaoxiao [1 ,2 ]
Li, Sheng [1 ,2 ]
Ying, Qichao [3 ]
Peng, Wanli [1 ,2 ]
Zhang, Xinpeng [1 ,2 ]
Qian, Zhenxing [1 ,2 ]
机构
[1] Fudan Univ, Key Lab Culture & Tourism Intelligent Comp, Minist Culture & Tourism, Sch Comp Sci, Shanghai 200437, Peoples R China
[2] Fudan Univ, Lab Multimedia & Artificial Intelligence Secur, Shanghai 200437, Peoples R China
[3] Nvidia Corp, Shanghai 200333, Peoples R China
基金
中国国家自然科学基金;
关键词
Steganography; Diffusion models; Security; Image synthesis; Accuracy; Image coding; Training; robust steganography; generative image steganography; diffusion model;
D O I
10.1109/TIFS.2024.3444311
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Generative steganography, a novel paradigm in information hiding, has garnered considerable attention for its potential to withstand steganalysis. However, existing generative steganography approaches suffer from the limited visual quality of generated images and are challenging to apply to lossy transmissions in real-world scenarios with unknown channel attacks. To address these issues, this paper proposes a novel robust generative image steganography scheme, facilitating zero-shot text-driven stego image generation without the need for additional training or fine-tuning. Specifically, we employ the popular Stable Diffusion model as the backbone generative network to establish a covert transmission channel. Our proposed framework overcomes the challenges of numerical instability and perturbation sensitivity inherent in diffusion models. Adhering to Kerckhoff's principle, we propose a novel mapping module based on dual keys to enhance robustness and security under lossy transmission conditions. Experimental results showcase the superior performance of our method in terms of extraction accuracy, robustness, security, and image quality.
引用
收藏
页码:8094 / 8108
页数:15
相关论文
共 57 条
[1]  
Bansal A, 2022, Arxiv, DOI [arXiv:2208.09392, DOI 10.48550/ARXIV.2208.09392, 10.48550/arXiv.2208.09392]
[2]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[3]   Distribution-Preserving Steganography Based on Text-to-Speech Generative Models [J].
Chen, Kejiang ;
Zhou, Hang ;
Zhao, Hanqing ;
Chen, Dongdong ;
Zhang, Weiming ;
Yu, Nenghai .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :3343-3356
[4]  
Dhariwal P, 2021, ADV NEUR IN, V34
[5]  
Dinh L, 2015, Arxiv, DOI arXiv:1410.8516
[6]  
Dinh Laurent., 2017, 5 INT C LEARN REPR I
[7]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[8]   Writing on wet paper [J].
Fridrich, J ;
Goljan, M ;
Lisonek, P ;
Soukal, D .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3923-3935
[9]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[10]  
Gopalan K, 2003, 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, P629