Targeted Pooled Latent-Space Steganalysis Applied to Generative Steganography, with a Fix
Levecque, Noirault, Pevný et al.
Steganographic schemes dedicated to generated images modify the seed vector in the latent space to embed a message, whereas most steganalysis methods attempt to detect the embedding in the image space. This paper proposes to perform steganalysis in the latent space by modeling the statistical distribution of the norm of the latent vector. Specifically, we analyze the practical security of a scheme proposed by Hu et. al. for latent diffusion models, which is both robust and practically undetectable when steganalysis is performed on generated images. We show that after embedding, the Stego (latent) vector is distributed on a hypersphere while the Cover vector is i.i.d. Gaussian. By going from the image space to the latent space, we show that it is possible to model the norm of the vector in the latent space under the Cover or Stego hypothesis as Gaussian distributions with different variances. A Likelihood Ratio Test is then derived to perform pooled steganalysis. The impact of the potential knowledge of the prompt and the number of diffusion steps, is also studied. Additionally, we also show how, by randomly sampling the norm of the latent vector before generation, the initial Stego scheme becomes undetectable in the latent space.
academic
Targeted Pooled Latent-Space Steganalysis Applied to Generative Steganography, with a Fix
This paper proposes a novel steganalysis method targeting steganography in generative images. While traditional steganalysis performs detection in the image space, generative steganography embeds messages by modifying seed vectors in the latent space. This work conducts steganalysis in the latent space by modeling the statistical distribution of latent vector norms to detect steganography. The paper analyzes the practical security of the latent diffusion model steganography scheme proposed by Hu et al., which exhibits robustness and undetectability in image-space steganalysis. The research reveals that embedded steganographic latent vectors are distributed on a hypersphere, while cover vectors follow an independent and identically distributed Gaussian distribution. Pooled steganalysis is performed using likelihood ratio testing, and the effects of prompt knowledge and diffusion steps are investigated. Additionally, the paper demonstrates how to make the original steganography scheme undetectable in latent space by randomly sampling latent vector norms.
Generative steganography is an emerging and active research field that enables embedding of large-capacity payloads with robustness to operations such as JPEG compression while potentially remaining undetected. Unlike traditional steganography that only modifies the noise component of images, the embedding process in generative steganography also alters the semantic content of images.
Limitations of Existing Methods: Most steganalysis methods attempt detection in the image space, while generative steganography modifies seed vectors in the latent space
Insufficient Security Analysis: Many published schemes have blind spots in security analysis within the latent space
Detection Challenges: The scheme by Hu et al. is both robust and undetectable in image-domain steganalysis, necessitating new analytical approaches
Generative steganography is particularly popular in latent diffusion models because these models provide high-quality image generation. Understanding and analyzing the security of such schemes is of significant importance to the information security field.
Proposes Latent-Space Steganalysis Method: First steganalysis conducted in latent space rather than image space or marginal distributions
Establishes Statistical Detection Model: Models the statistical distribution of latent vector norms, representing cover and steganography hypotheses as Gaussian distributions with different variances
Develops Likelihood Ratio Testing: Pooled detector based on likelihood ratio testing (LRT) that is easily extensible to batch image detection
Provides Security Fix: Proposes Scaled Spread Spectrum (Scaled SS) encoding method that makes the steganography scheme undetectable in latent space by randomly sampling latent vector norms
Comprehensive Experimental Analysis: Investigates the effects of prompt knowledge and diffusion steps on detection performance
Input: Images generated by latent diffusion models and their corresponding latent vectors
Output: Determination of whether an image is a cover image or steganographic image
Constraints: Follows Kerckhoffs' principle; the attacker knows the L2L channel and fixed parameters α but not the secret key
Compared to existing work, this paper is the first to analyze joint distributions rather than marginal distributions in latent space, providing more in-depth security assessment.
The paper cites multiple important related works, including:
Hu et al. (2024): The original steganography scheme analyzed
Rombach et al. (2022): Foundational work on latent diffusion models
Cox et al. (2008): Classical textbook on digital watermarking
Fridrich (2009): Classical textbook on steganography
Multiple related works on deep learning-based steganalysis
This paper makes important contributions to security analysis of generative steganography, proposing novel analytical perspectives and effective detection methods, while also providing corresponding security improvement schemes. It has significant implications for advancing the field.