DiffStega: Towards Universal Training-Free Coverless Image Steganography with Diffusion Models

Yiwei Yang,Zheyuan Liu,Jun Jia,Zhongpai Gao,Yunhao Li,Wei Sun,Xiaohong Liu,Guangtao Zhai
2024-07-15
Abstract:Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) enhances imperceptibility by not using any cover image. Recent works have utilized text prompts as keys in CIS through diffusion models. However, this approach faces three challenges: invalidated when private prompt is guessed, crafting public prompts for semantic diversity, and the risk of prompt leakage during frequent transmission. To address these issues, we propose DiffStega, an innovative training-free diffusion-based CIS strategy for universal application. DiffStega uses a password-dependent reference image as an image prompt alongside the text, ensuring that only authorized parties can retrieve the hidden information. Furthermore, we develop Noise Flip technique to further secure the steganography against unauthorized decryption. To comprehensively assess our method across general CIS tasks, we create a dataset comprising various image steganography instances. Experiments indicate substantial improvements in our method over existing ones, particularly in aspects of versatility, password sensitivity, and recovery quality. Codes are available at \url{<a class="link-external link-https" href="https://github.com/evtricks/DiffStega" rel="external noopener nofollow">this https URL</a>}.
Computer Vision and Pattern Recognition
What problem does this paper attempt to address?
The problems that this paper attempts to solve are several key challenges in traditional image steganography and Coverless Image Steganography (CIS). Specifically, the author points out that the current CIS methods based on diffusion models have the following three main problems: 1. **Private prompts are easily guessed**: If the private prompt is guessed or inferred, the encrypted information may be decrypted by unauthorized entities. 2. **It is difficult to construct the semantic diversity of public prompts**: In order to ensure the diversity and imperceptibility of steganography, public prompts need to be carefully designed to ensure their semantic diversity. 3. **The risk of leakage during the transmission of prompts**: Frequent transmission of private prompts increases the risk of leakage, especially in network communications. To solve these problems, the author proposes a new method named DiffStega. DiffStega improves the existing technology in the following ways: - **Introducing password - dependent reference images**: Use a preset password to generate a reference image as an image prompt instead of relying on a text prompt as a private key. This ensures that only authorized parties can retrieve the hidden information. - **Developing the Noise Flip technique**: Encrypt the noise latent code at the deepest layer of the diffusion model while minimizing the impact on its mean and variance. This further enhances the security of steganography and prevents unauthorized decryption attempts. - **There is no need to transmit the private key every time**: Since the password is independent of the image content, only the password needs to be transmitted once, reducing the risk of leakage. In addition, the author also creates a special dataset to evaluate the performance of their method in general CIS tasks and verifies through experiments the significant improvements of DiffStega in multiple aspects (such as universality, password sensitivity, and recovery quality). In summary, this paper aims to improve the security and robustness of Coverless Image Steganography, especially in combating unauthorized decryption attempts, while reducing the dependence on and transmission risks of private prompts.