Provably Secure Covert Messaging Using Image-based Diffusion Processes

📅 2025-03-13
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the security and robustness challenges of steganography in image diffusion models. We propose a novel steganographic method that embeds messages directly into the initial latent space—without altering the prior distribution of latent variables—and provide, for the first time, a computational indistinguishability proof against arbitrary polynomial-time adversaries. Our approach integrates provably secure probabilistic design, a robust inverse transformation mechanism, and joint error-correction optimization. It achieves high payload capacity (>100 bits), strong undetectability (AUC < 0.52 against deep neural network detectors), and resilience to common distortions (e.g., 30% cropping, JPEG compression at quality factor 30). Experimental results demonstrate that our method attains an optimal trade-off among capacity, robustness, and reliability—significantly outperforming existing steganographic schemes based on pixel-level manipulation or post-hoc latent-space processing.

Technology Category

Application Category

📝 Abstract
We consider the problem of securely and robustly embedding covert messages into an image-based diffusion model's output. The sender and receiver want to exchange the maximum amount of information possible per diffusion sampled image while remaining undetected. The adversary wants to detect that such communication is taking place by identifying those diffusion samples that contain covert messages. To maximize robustness to transformations of the diffusion sample, a strategy is for the sender and the receiver to embed the message in the initial latents. We first show that prior work that attempted this is easily broken because their embedding technique alters the latents' distribution. We then propose a straightforward method to embed covert messages in the initial latent {em without} altering the distribution. We prove that our construction achieves indistinguishability to any probabilistic polynomial time adversary. Finally, we discuss and analyze empirically the tradeoffs between embedding capacity, message recovery rates, and robustness. We find that optimizing the inversion method for error correction is crucial for reliability.
Problem

Research questions and friction points this paper is trying to address.

Secure embedding of covert messages in image diffusion models.
Maximizing information exchange while avoiding detection by adversaries.
Ensuring robustness and reliability in message recovery and embedding.
Innovation

Methods, ideas, or system contributions that make the work stand out.

Embeds covert messages in initial latents
Maintains latent distribution integrity
Optimizes inversion for error correction
🔎 Similar Papers
No similar papers found.