Generative Text Steganography with Large Language Model
Abstract.
Recent advances in large language models (LLMs) have blurred the boundary of high-quality text generation between humans and machines, which is favorable for generative text steganography. Currently, advanced steganographic mapping is not suitable for LLMs since most users are restricted to accessing only the black-box API or user interface of the LLMs, thereby lacking access to the training vocabulary and its sampling probabilities. In this paper, we explore a black-box generative text steganographic method based on the user interfaces of large language models, which is called LLM-Stega. The main goal of LLM-Stega is to ensure secure covert communication between Alice (sender) and Bob (receiver) by using the user interfaces of LLMs. Specifically, We first construct a keyword set and design a new encrypted steganographic mapping to embed secret messages. Furthermore, an optimization mechanism based on reject sampling is proposed to guarantee accurate extraction of secret messages and rich semantics of generated stego texts. Comprehensive experiments demonstrate that the proposed LLM-Stega outperforms current state-of-the-art methods.
1. Introduction
Steganography is the science and art of embedding secret information into cover media, aiming to covertly transmit secret information through public channels (Anderson and Petitcolas, 1998; Provos and Honeyman, 2003; Cox et al., 2007). The principle of steganography can be illustrated by Simmons’ ”prisoner problem”(Simmons, 1984): There are two prisoners Alice (sender) and Bob (receiver) in jail who are trying to hatch an escape plan. The only way they can communicate is carefully censored by warden Eve (steganalyzer). Therefore, they must find some way to embed the secret messages into a normal digital carrier (called cover) to obtain an “innocent-looking” medium with secret messages (called stego). According to the types of digital carrier, steganography can be divided into image steganography (Lu et al., 2021; Su et al., 2024; Yu et al., 2024; Yao et al., 2024), video steganography (Mou et al., 2023; Meng et al., 2024; Mohamed et al., 2024; Jahromi et al., 2024), audio steganography (Jiang et al., 2020; Wu et al., 2020; AlSabhany et al., 2020) and text steganography (Yang et al., 2018; Ziegler et al., 2019; Dai and Cai, 2019; Peng et al., 2023; Zhang et al., 2021; Ding et al., 2023). Recently, text steganography has become a popular research topic in the information security field since text has high universality and robustness when transmitted through public channels.
Early text steganography methods are mainly achieved by modifying content, such as embedding secret information through synonym replacement (Qi et al., 2013; Xiang et al., 2014; Li et al., 2019) or spelling conversion (Shirali-Shahreza, 2008). Although these methods can effectively maintain the semantic imperceptibility of stego text, they have low embedding capacity and significant differences in statistical distribution characteristics (Zhang et al., 2021). Recent advancements in deep neural networks (DNNs) and natural language processing (NLP) have catalyzed a paradigm shift in text steganography, propelling it towards generative text steganography with high embedding capacity and security. (Fang et al., 2017; Yang et al., 2018; Ziegler et al., 2019; Zhang et al., 2021; Zhou et al., 2021; Peng et al., 2023; Ding et al., 2023).
As shown in Figure.1(a), existing generative text steganographic methods typically involve training a language model on a corpus. Subsequently, secret messages are embedded by establishing a steganographic mapping between specific binary bits representing the secret messages and the sampling probability of words within the training vocabulary. These methods have demonstrated commendable performance in terms of security and text quality. However, these methods still have two limitations: (1) These are white-box methods and require that Alice and Bob share the same language model and training vocabulary. Constrained by the language model and training corpus, the generated texts have a significant gap in fluency, logic, and diversity compared to natural texts. (2) the embedding paradigm, building a steganographic mapping between secret messages and sampling probabilities of the off-the-shelf language model, inevitably changes the sampling probability distribution, resulting in security risk. The first limitation can be resolved by using a superior language model. For example, both Zigegler et al. (Ziegler et al., 2019) and Dai et al. (Dai and Cai, 2019) leverage GPT-2 as the language model to generate stego text. Recently, Wang et al. (Wang et al., 2024) use LLaMA (Touvron et al., 2023) to generate stego texts, which is the first attempt for generative text steganography based on LLM. Although these attempts improve the text quality of generated stego text, they cannot achieve satisfied embedding capacity and security since they still use the white-box steganographic mapping to embed secret messages. Some experimental results of these attempts demonstrate the aforementioned second limitation.
In order to address the above questions and fully leverage the generation ability of LLMs, as shown in Figure 1(b), we explore a black-box generative text steganography based on the user interfaces (UIs) of large language models. The contributions of this paper as the following:
-
(1)
It is the first exploration using the UIs of LLMs to implement a black-box generative text steganography, which generates stego texts and extracts secret messages by using some elaborated prompts.
-
(2)
We construct a keyword set and design an encrypted steganographic mapping to embed secret messages. Meanwhile, an optimization mechanism based on reject sampling is proposed to ensure the accurate extraction of secret messages and the rich semantics of generated stego texts.
- (3)
2. Related Works
2.1. Generative text Steganography
The main trait of generative text steganography is that an off-the-shelf language model is directly used to generate stego texts under the control of steganographic mapping. Thus, both language model and steganographic mapping play important roles in generative text steganography.
Recently, with the emergence of language models based on DNNs, generative text steganography has continuously made breakthroughs in quality and security. Fang et al. (Fang et al., 2017) proposed a preliminary idea for generative text steganography. They first randomly divided the vocabulary into groups to map the -bit secret messages. Then the highest probability token in a group is selected during generation. Yang et al. (Yang et al., 2018, 2020b) indicated that using a better language model can generate more fluent and secure stego texts. Both Ziegler et al (Ziegler et al., 2019) and Dai et al. (Dai and Cai, 2019) use GPT-2 as a language model to generate stego texts. Meanwhile, they designed a different steganographic mapping to embed secret messages. Their findings show that good steganographic mapping is also beneficial for the security of generative text steganography. From the perspective of provably secure steganography, Zhang et al. (Zhang et al., 2021) proposed an Adaptive Dynamic Grouping (ADG) steganography, which recursively embeds secret information by the adaptive dynamic grouping of the vocabulary tokens. Ding et al. (Ding et al., 2023) proposed a novel steganographic mapping based on ”Distribution Copies” (Discop). Since the steganographic behavior does not destroy the original distribution, this method has state-of-the-art security.
2.2. Large Language Models
LLMs have achieved excellent performance on multiple tasks, and researchers have sought ways to utilize LLMs as task-specific data generators. For example, using LLMs to generate tabular data (Borisov et al., 2022), relational triples (Chia et al., 2022), sentence pairs (Schick and Schütze, 2021), and instruction data (Simmons, 1984). In these methods, LLMs have a satisfied generation quality for specific subject categories in zero-shot learning. However, existing methods often use simple class condition prompts and some researchers explore ways to improve the quality of the generated data without improving prompt conditions. For example, SuperGen(Meng et al., 2022) and ZeroGen (Ye et al., 2022) used LLMs to generate text classification data and used noise robust learning techniques (Wang et al., 2019) to deal with the quality of the generated data. SunGen (Gao et al., 2023) used the learned data quality weights to re-weight the data generated in the training process to obtain more excellent data.
Notably, some researchers have begun to explore the use of prompt engineering to tune LLMs and LLMs-API to generate data. Chen et al. (Chen et al., 2023) explored using soft prompts to tune the data generated by LLMs when white box LLMs and seed samples are used. Yu et al. (Yu et al., 2023) further proposed a method suitable for black box LLMs and even LLMs-API (for example, ChatGPT) to generate the required data without relying on any labeled samples.
From the above review, it is obvious that existing generative text steganographic methods are the white-box paradigm, i.e., both embedding and extracting secret messages require the off-the-shelf language model and sampling probability distribution of vocabulary on all generation steps. In addition, due to the expensive training and excellent performance, the off-the-shelf large language models have high commercial value. Users hardly access the sampling distribution and rely more on the black-box APIs and UIs to leverage LLMs. Therefore, existing white-box methods are not suitable for LLMs. How to design a black-box generative text steganography with large language models, has become an interesting problem.
3. The Proposed Methodology
As shown in Figure. 2, the proposed LLM-Stega aims to generate stego texts and extracting secret messages by using the UI of LLMs. The LLM-Stega is composed of four parts, including keyword construction, encrypted steganographic mapping, steganographic text generation, and secret message extraction. We will elaborate on each of them in the rest of this section.
3.1. Keyword Set Construction
Due to the black-box, we do not have access to the training vocabulary of LLM and its distribution at each step to encode secret messages. Thus, a keyword set is constructed to encode the secret messages, where the keywords are the important components of generated stego texts. In this paper, we select the subject, predicate, object, and emotion as the keywords of each generated sentence. We first design a keyword prompt to induce the LLMs to generate four keyword subsets, containing subject set, predicate set, object set, and emotion set. Apart from the emotion set with 3 different words (negative, positive, and neutral) and their sampling probabilities, others contain 16 different high-probability words and corresponding sampling probabilities.
Notably, randomly selecting keywords from the four subsets appear with unclear logic and semantic blur, which brings difficulties to the satisfied stego text generation. In order to mitigate the question, the LLM, induced by an evaluation prompt, is used to evaluate the superiority of the randomly selected keywords and optimize their probabilities. Compared with existing white-box methods, using the constructed keyword set to encode secret messages has three significant advantages: (1) the keyword set is separated from the generation process of LLM, users do not require accessing the sampling distribution of LLMs. Meanwhile, the steganographic behavior does not change the sampling distribution of LLM, which improves the security of the generated stego texts. (2) since the keywords and sampling their probabilities are optimized by using the potential knowledge of LLM, the generated stego text based on these keywords can achieve high text quality. (3) in an ideal situation, the keyword set can encode massive secret messages as long as the set is large enough.
3.2. Encrypted Steganographic Mapping
In practice, the number of commonly used keywords is limited and their sampling distribution does not obey uniform distribution. If these subsets are directly used to encode the secret messages, the embedding capacity and security of the generated stego could not be satisfied. To resolve these problems, we first augment the keyword set. Specifically, we perform repeated sampling to expand the keyword set according to the optimized sampling probabilities. Then, the location indices of keywords in the augmentation set are directly used to encode secret messages. In this part, for a good trade-off between time cost and embedding capacity, we expand the capacity of three subsets (subject, predicate, and object) from 16 to words and that of the emotion subset from 3 to which can encode bits secret messages. In the augmentation keyword set, the more common keyword has a higher sampling probability, encoding more secret messages. The augmentation strategy not only enhances the embedding capacity but also maintains the real sampling probabilities of the keywords encoded secret messages.
We notice that the location indices of the keywords are fixed, which leads to the potential exposure risk of the steganographic behavior. To further improve the security of steganographic mapping, an encryption strategy is designed. Concretely, we use a One-Time Password mechanism to implement the encryption. XOR operation is performed using the number of the keyword repetitions and the release time of stego text on online social networks (OSNs), which is formulated as follows:
(1) |
where and denote the binary of the number of the keyword repetition and that of the release time whose components consist of six numbers, containing date, hour, and minute. is the XOR operation. The computation result is regarded as a private key shared by Alice and Bob. Although Eve intercepts the augmentation keyword set, he(or she) still cannot correctly decode secret messages.
Compared with existing steganographic mappings, the proposed encrypted steganographic mapping does not destroy the sampling distribution of LLM in the generation process since the steganographic mapping is independent of the LLM generation process. Because of this trait, the proposed mapping applies to various LLMs with user interfaces. Due to the page limitation, in this paper, we only leverage the UIs of GPT-4 to evaluate the superiority of the proposed encrypted steganographic mapping.
3.3. Steganographic Text Generation and Secret Message Extraction
The main goal of the proposed LLM-Stega is that using the user interfaces of LLMs implements steganographic text generation and secret message extraction. After selecting keywords by using the proposed encrypted steganographic mapping, we use an embedding prompt to induce LLMs to generate stego texts. Unlike an explicit extraction algorithm, the extraction relied on the LLM cannot ensure a perfectly accurate extraction. Thus, we proposed a feedback optimization mechanism based on reject sampling.
In the generation process, under the guidance of a designed extraction prompt, LLM attempts to output the keywords encoded in the secret messages. If the output keywords have errors, the LLM could return the main reason for these errors and optimize the embedding, generation, and extraction prompts until there are no extraction errors. The feedback optimization mechanism based on reject sampling is shown in Algorithm.1 in detail. In our experiments, making two rejecting samples ensures the accurate extraction of secret messages embedded into each stego sentence. It is noteworthy that there is a generation prompt behind the reject sampling module shown in Figure. 2. The main reason is that during iterative optimization, the generated stego texts tend to be simple sentences merely containing keywords, so as to ensure accurate extraction. While, the sentence diversity and semantic richness of the generated stego texts are diminished, resulting in secure risk. Therefore, we design and optimize the embedding and generation prompts to ensure rich semantic and accurate extraction, respectively.
After Bob gains the generated stego texts from OSNs, he (or she) leverages the extraction prompt to extract keywords from the generated stego texts using the LLM UIs. Finally, according to the shared side information, containing the keyword set, private-key, One-Time-Password mechanism, and the release times of stego texts on OSNs, Bob perfectly decodes the secret messages.
4. Experiment
In this section, we evaluate the performance of LLM-Stega in terms of text quality, embedding capacity, anti-steganalysis ability, statistical imperceptibility and human evaluation. The details of the experimental setup and result analysis are described in the following sections.
4.1. Experimental Setup
(1) LLM and Theme information selection. In the experiments, we select the UI of GPT-4 to implement block-box generative text steganography since the GPT-4 is an advanced and widely used LLM. Due to the vivid topics and popularity, the Entertainment News (LLM-Stega) and Reviews of science fiction movies (LLM-Stega) are selected as the theme information to constrain the semantics and context of the generated stego texts.
(2) Baselines. Three advanced generative steganographic methods are rebuilt, including Arithmetic (Ziegler et al., 2019), ADG (Zhang et al., 2021), and Discop (Ding et al., 2023). Due to our computation and memory limitations, we use the LSTM model trained on News(Thompson, 2017) data as an off-the-shelf language model. However, to demonstrate that the advantages of our proposed method are not solely attributed to the use of LLMs, we also implemented a version using Discop with LLaMA2 (Discop) as the language generation model, testing whether LLMs without fine-tuning improves the generation of steganographic texts. For the Arithmetic-based algorithm, we choose the steganography text generated under the different embedding capacities of 1.39 bit per word (bpw) (AC-2) and 3.99 bpw (AC-6) to compare.
4.2. Metrics
(1) Text Quality. We select the Perplexity (PPL) and semantic similarity (SS) to evaluate the text quality of generated stego texts. For the PPL, it is a general quantitative metric in the other text generation tasks (Mikolov et al., 2010). The PPL is defined as follows:
(2) |
where is the length of the text, is the -th token in text, and is the probability assigned by the language model to the -th word given the preceding words. In this experiment, we choose the GPT-2 model of huggingface to calculate the PPL values of different steganographic texts. For the semantic similarity, We choose the Sentence-bert (Reimers and Gurevych, 2019) method and use the roberta-base-nli-mean-tokens (Liu et al., 2019) model to extract sentence vectors, to calculate the cosine similarity between steganographic text and cover text.
(2) Embedding Capacity (EC). It is the average number of secret messages embedded into one token, which is represented as bits per word (bpw). It can be calculated as:
(3) |
where is the total number of bits in the embedded secret messages, and is the total number of words in the generated steganographic text. Since steganography is a key technology for covert communication, embedding capacity is an important metric.
(3) Anti-steganalysis Ability. The ability is an important metric for security. In this experiment, we leverage three advanced steganalysis methods, containing LS-CNN (LC) (Wen et al., 2019), BiLSTM-Dense (BD) (Yang et al., 2020a), and Bert-FT (BF) (Peng et al., 2021). The steganalysis accuracy is described below:
(4) |
where is true positives, is true negatives, is false positives, and is false negatives, and we assume the stego texts are positive samples.
Steganography | Perplexity | Semantic similarity |
AC-2 (Ziegler et al., 2019) | 199.80 | 0.3421 |
AC-6 (Ziegler et al., 2019) | 287.97 | 0.3723 |
ADG (Zhang et al., 2021) | 709.84 | 0.4189 |
Discop (Ding et al., 2023) | 46.73 | 0.6150 |
Discop (Ding et al., 2023) | 123.24 | 0.6322 |
LLM-Stega | 165.76 | 0.5881 |
LLM-Stega | 171.52 | 0.6413 |
(4) Statistical Imperceptibility. The Kullback-Leibler Divergence (KLD) serves as an evaluation metric to measure the imperceptibility of steganographic algorithms by comparing the distribution of the generated stego-texts against the distribution of the original cover texts. In our experiment, we select the KLD proposed by Zhang et al. (Zhang et al., 2021) to evaluate the statistical imperceptibility of the tested methods. It is formulated as follows:
(5) |
where and are the mean and standard deviation of cover texts, while and represent those of stego-texts.
(5) Human Evaluation. For the human evaluation, we focus on evaluating three key aspects of the generated texts: fluency, coherence, and relevance. Our human evaluation was conducted by three researchers who were not involved in the study and each one holds a Bachelor’s degree, demonstrating sufficient expertise in the NLP field. The evaluation process involved a mixed assessment sheet containing both generated stego and cover texts, only stego text scores were selected for analysis. The evaluators, unaware of the underlying algorithms, labels, or any other details, were tasked solely with assessing and scoring the text quality. Each annotator independently rates the texts on a five-point scale (ranging from ’very poor’ to ’very good’) for fluency, coherence, and relevance. The higher evaluation score denotes the better generated stego texts.
4.3. Results and Analysis
(1) Embedding Capacity and Text Quality. The experimental results of length and EC of generated stego texts are listed in Table 2. To The best of our knowledge, the average length of the News dataset (Thompson, 2017) is about 15 words. The Arithmetic and the proposed LLM-Stega have more similar lengths with natural News than ADG and Discop. Meanwhile, the proposed LLM-Stega can achieve the highest embedding capacity. Since the proposed encrypted steganographic mapping is independent of the generation process of LLM, the embedding capacity is not constrained by the distribution entropy of each time step.
Steganography | length | Embedding capacity |
AC-2 (Ziegler et al., 2019) | 14.391 | 1.39 bpw |
AC-6 (Ziegler et al., 2019) | 14.944 | 3.99 bpw |
ADG (Zhang et al., 2021) | 22.411 | 5.63 bpw |
Discop (Ding et al., 2023) | 100.000 | 4.76 bpw |
Discop (Ding et al., 2023) | 100.000 | 3.67 bpw |
LLM-Stega | 13.333 | 5.93 bpw |
LLM-Stega | 16.419 | 4.81 bpw |
Table 1 demonstrates the results of text quality of the generated stego texts. In the exploration of literature (Yang et al., 2020b), it is found that texts on public social networks are written by people of different ages and backgrounds in different ways of expression. This leads to the fact that most of the human-written sentences may not obey the optimal language model and form a large variance. From the security, if the generated stego texts have more similar PPL values with normal sentences, their security is higher.
In addition, the higher similarity represents the more similarity between cover and stego sentences, namely, higher security. In our experiments, the average PPL of the normal sentence in the News dataset is 185.64. The “AC-2” can achieve the most similar PPL value and the lowest SS. In addition, the “Discop” algorithm gains the best SS and the maximum gap of PPL. Our method underperforms the Discop because Discop uses the same prefix but different random numbers to generate cover and stego texts, resulting in similar semantics. In contrast, our method generates stego and cover texts using different keywords, thereby leading to slightly lower similarity. Additional experiments confirmed that our method achieves a semantic similarity score of 0.9103 when using the same keywords, which is better than Discop. While the proposed LLM-Stega can make the best trade-off between PPL and SS.
Steganography | Stego-text example |
AC | in the past few years of the past year and is the most comprehensive issue of a generation of the |
ADG | j d vance a man who tells us about the constitution stresses there is no indication of collapse |
Discop | The play begins with having a small boy entering a bar in a night club. Out of the three bars he takes, he is attracted to one woman. Nils André, one of the dancers, is attracted to him. ”Nils is as nice as I am,” André says. The trio sing and dance together in a night club as the bar explodes. der Garçons, an act of urban youth, also appear in the bar as well as at a church. This is where Nils tells the woman |
Discop | to put it up as a gift for you?? Something wrong with the layout? Hope it is fixed now, but it should not come back..¡/s¿¡s¿ Javier Pastore has signed for Roma on a 5-year deal with the Italian side paying Qatari side Qatar SC €52m. The Argentinean playmaker has been one of Barcelona’s prime targets for the past week, but after they refused to pay the buyout clause of the player Barcelona moved |
LLM-Stega | Acclaimed dancer, Luna Moves, unassumingly announced her new song, which intriguingly entwines rhythmic beats with her signature performative flair. |
LLM-Stega | The actor’s production of the time machine is received positively, marked by a creative touch that adds to the film’s time-traveling allure. |
(2)Anti-steganalysis Ability. In the experiment, the training dataset consists of 10,000 cover sentences generated by an off-the-shelf language model without embedding secret messages and 10,000 stego sentences generated by the same language model. The validation dataset includes 1,000 cover sentences and 1,000 generated stego sentences. The testing dataset consists of 1,000 cover sentences and 1,000 generated stego sentences. Please note that the cover sentences in the training, validation, and testing datasets should not overlap. Figure. 3 presents the enhanced results of anti-steganalysis, incorporating additional experimental data. The proposed method, LLM-Stega, continues to exhibit superior performance across all metrics when compared to traditional steganography methods such as AC-2, AC-6, ADG, and Discop. Notably, LLM-Stega achieves the LS-CNN of 51.55%, BiLSTM-Dense of 49.20%, and Bert-FT of 50.00%, underscoring its efficacy in maintaining imperceptibility against steganalysis techniques.
Embedding prompt | Extraction prompt | Text-length | PPL1 | Bert-score | PPL2 | Reject rate |
✗ | ✗ | 17254 | 118.80 | 46.23 | 180.55 | 67.80% |
✗ | ✓ | 17254 | 118.80 | 46.23 | 178.54 | 42.70% |
✓ | ✗ | 12292 | 151.60 | 45.92 | 172.50 | 53.30% |
✓ | ✓ | 12292 | 151.60 | 45.92 | 165.82 | 41.40% |
✓✓ | ✓✓ | 13094 | 104.67 | 46.33 | 137.26 | 44.10% |
✓✓✓ | ✓✓✓ | 20096 | 96.67 | 47.54 | 109.31 | 21.00% |
(3)Statistical Imperceptibility. The KLD thus quantifies the entropy difference between the cover and stego-text distributions, assessing the degree to which the proposed algorithm ensures the stego-texts remain statistically similar to the cover texts.
In this part, we choose the pre-trained BERT to represent the latent feature of cover and stego texts, which is different from the KLD in Zhang et al. (Zhang et al., 2021). In our experiments, as shown in Figure 4, we find that the probability distributions of the latent features normalized by the softmax activation function obey a normal distribution. We take the logarithm of the experimental results to more clearly compare the differences in statistical imperceptibility between the different algorithms. Among them, the KLD value for the AC algorithm is significantly higher than the other three algorithms, indicating the AC algorithm’s poorer statistical imperceptibility, which also aligns with its inferior performance in resisting steganalysis compared to the other algorithms. The experimental data confirms that our LLM-Stega method excels in statistical imperceptibility compared to other algorithms, ensuring that the stego-texts are semantically consistent with the cover texts and exhibit similar distributional characteristics.
(4) Human Evaluation. In order to further evaluate the effectiveness of the proposed LLM-Stega, we implement the human evaluation experiment. The details of evaluation scores are illustrated in Figure. 4. The experimental results indicate that the LLM-Stega outperformed the other three algorithms. This suggests that LLM-Stega is more effective in generating steganographic texts that are contextually relevant and less detectable. The results demonstrate LLM-Stega’s superior performance in generating steganographic texts that are fluent, coherent, and relevant. This finding is significant in the context of text steganography, highlighting the potential of LLM-Stega in applications where the imperceptibility of the embedded message is crucial. Besides, in Table 3, we also randomly select some examples of stego text generated by LLM-Stega and existing methods for qualitative analysis. We find that the stego text is fluent enough, with correct grammar and coherent semantics.
4.4. Ablation Study
As the crux of the proposed LLM-Stega is these elaborated prompts, we carry out the ablation study to verify the effectiveness of prompt optimization. In the experiment, PPL1 denotes the Perplexity score for the initially generated text, serving as a baseline measure of text complexity. Reject rate denotes the rate of one rejection sampling, and PPL2 reflects the Perplexity score of the steganographic text following rejection sampling. Furthermore, the Bert-score is utilized to quantify the semantic similarity between the steganographic text and the original cover text.
We adopt a structured approach to optimize embedding and extraction prompts, specifically focusing on applications within the steganographic domain. This process is segmented into three phases: an initial optimization phase (denoted as ✓), followed by further optimization phase (denoted as ✓✓), and concluding with a deep optimization phase (denoted as ✓✓✓). ”Initial optimization” involved designing the basic structure of text prompts, including theme and a maximum length of generated stego sentences, etc. Based on the initial optimization, “Further optimization” is used to improve text prompts according to the feedback from LLMs. Finally, ”deep optimization” consisted of iterative improvements to the prompt details through continuous feedback, further refining the prompt to achieve the task objectives.
The experimental results are shown in Table LABEL:tab:AIFM. We notice that using ”Initial optimization” increases the PPL value and decreases BERT scores, namely, the text quality is reduced. This is because the main goal of “Initial optimization” is to ensure accurately extracting secret messages. In subsequent optimization phases, we aim to improve text quality on the condition that the secret information is extracted accurately, achieving high imperceptibility for the stego-text. Thus, both the PPL and the reject rate have decreased. Besides, the single instance of rejection sampling rate is due to the tuned prompt’s ability to produce text that allows for 100% extraction of the secret information in just one attempt. The experimental results show that the “further optimization” process meets expectations. After ”deep iterations”, the probability of rejection sampling drops to its lowest, while the quality of the text is enhanced to its highest. The experimental results demonstrated that the proposed prompt optimization based on reject sampling significantly improved the quality of the generated stego texts.
5. Conclusion
Previous works of generative linguistic steganography inevitably introduce distortions to the distribution estimated by off-the-shelf language models. In this paper, we attempted to use the user interfaces of large language models for generative-linguistic steganography. Firstly, an encrypted steganographic mapping is proposed to map the secret messages into the words of four keyword sets. These keyword sets are constructed and optimized for the potential knowledge of LLMs. Then, we propose an optimization mechanism based on reject sampling to improve the effectiveness of the prompts. Finally, comprehensive experimental results evaluate the superiority of the proposed LLMs over other tested methods in terms of text quality, embedding capacity, and anti-steganalysis.
The LLM-Stega is the first attempt at generative text steganography based on the UIs of LLM. It is a preliminary method. Meanwhile, steganographic mapping is a simple method to encode secret messages and does not fully leverage the powerful generation ability for text steganography. In future work, we will research a special fine-tuning strategy to further leverage the potential knowledge and generation ability of LMMs for improving the performance of generative text steganography.
Acknowledgements.
This work was supported in part by the National Natural Science Foundation of China under Grant 62272463.References
- (1)
- AlSabhany et al. (2020) Ahmed A AlSabhany, Ahmed Hussain Ali, Farida Ridzuan, AH Azni, and Mohd Rosmadi Mokhtar. 2020. Digital audio steganography: Systematic review, classification, and analysis of the current state of the art. Computer Science Review 38 (2020), 100316.
- Anderson and Petitcolas (1998) Ross J Anderson and Fabien AP Petitcolas. 1998. On the limits of steganography. IEEE Journal on selected areas in communications 16, 4 (1998), 474–481.
- Borisov et al. (2022) Vadim Borisov, Kathrin Seßler, Tobias Leemann, Martin Pawelczyk, and Gjergji Kasneci. 2022. Language models are realistic tabular data generators. arXiv preprint arXiv:2210.06280 (2022).
- Chen et al. (2023) Derek Chen, Celine Lee, Yunan Lu, Domenic Rosati, and Zhou Yu. 2023. Mixture of Soft Prompts for Controllable Data Generation. arXiv preprint arXiv:2303.01580 (2023).
- Chia et al. (2022) Yew Ken Chia, Lidong Bing, Soujanya Poria, and Luo Si. 2022. RelationPrompt: Leveraging prompts to generate synthetic data for zero-shot relation triplet extraction. arXiv preprint arXiv:2203.09101 (2022).
- Cox et al. (2007) Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, and Ton Kalker. 2007. Digital watermarking and steganography. Morgan kaufmann.
- Dai and Cai (2019) Falcon Z Dai and Zheng Cai. 2019. Towards near-imperceptible steganographic text. arXiv preprint arXiv:1907.06679 (2019).
- Ding et al. (2023) Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, and Nenghai Yu. 2023. Discop: Provably Secure Steganography in Practice Based on “Distribution Copies”. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 2238–2255.
- Fang et al. (2017) Tina Fang, Martin Jaggi, and Katerina Argyraki. 2017. Generating steganographic text with LSTMs. arXiv preprint arXiv:1705.10742 (2017).
- Gao et al. (2023) Jiahui Gao, Renjie Pi, Lin Yong, Hang Xu, Jiacheng Ye, Zhiyong Wu, Weizhong Zhang, Xiaodan Liang, Zhenguo Li, and Lingpeng Kong. 2023. Self-guided noise-free data generation for efficient zero-shot learning. In International Conference on Learning Representations (ICLR 2023).
- Jahromi et al. (2024) Zeinab Torabi Jahromi, Seyed Mohammad Hossein Hasheminejad, and Seyed Vahab Shojaedini. 2024. Deep learning semantic image synthesis: a novel method for unlimited capacity, high noise resistance coverless video steganography. Multimedia Tools and Applications 83, 6 (2024), 17047–17065.
- Jiang et al. (2020) Shunzhi Jiang, Dengpan Ye, Jiaqing Huang, Yueyun Shang, and Zhuoyuan Zheng. 2020. SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application. Journal of Network and Computer Applications 165 (2020), 102689.
- Li et al. (2019) Mengdi Li, Kai Mu, Ping Zhong, Juan Wen, and Yiming Xue. 2019. Generating steganographic image description by dynamic synonym substitution. Signal Processing 164 (2019), 193–201.
- Liu et al. (2019) Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics. 4221–4231.
- Lu et al. (2021) Shao-Ping Lu, Rong Wang, Tao Zhong, and Paul L Rosin. 2021. Large-capacity image steganography based on invertible neural networks. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 10816–10825.
- Meng et al. (2024) Laijin Meng, Xinghao Jiang, Zhenzhen Zhang, Zhaohong Li, and Tanfeng Sun. 2024. A robust coverless video steganography based on maximum DC coefficients against video attacks. Multimedia Tools and Applications 83, 5 (2024), 13427–13461.
- Meng et al. (2022) Yu Meng, Jiaxin Huang, Yu Zhang, and Jiawei Han. 2022. Generating training data with language models: Towards zero-shot language understanding. Advances in Neural Information Processing Systems 35 (2022), 462–477.
- Mikolov et al. (2010) Tomas Mikolov, Martin Karafiát, Lukas Burget, Jan Cernockỳ, and Sanjeev Khudanpur. 2010. Recurrent neural network based language model.. In Interspeech, Vol. 2. Makuhari, 1045–1048.
- Mohamed et al. (2024) Hassan Mohamed, Ahmed Elliethy, Amr Abdelaziz, and Hussein Aly. 2024. Real-time motion estimation based video steganography with preserved consistency and local optimality. Multimedia Tools and Applications (2024), 1–24.
- Mou et al. (2023) Chong Mou, Youmin Xu, Jiechong Song, Chen Zhao, Bernard Ghanem, and Jian Zhang. 2023. Large-capacity and flexible video steganography via invertible neural network. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 22606–22615.
- Peng et al. (2023) Wanli Peng, Tao Wang, Zhenxing Qian, Sheng Li, and Xinpeng Zhang. 2023. Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack. IEEE Signal Processing Letters 30 (2023), 299–303.
- Peng et al. (2021) Wanli Peng, Jinyu Zhang, Yiming Xue, and Zhenghong Yang. 2021. Real-time text steganalysis based on multi-stage transfer learning. IEEE Signal Processing Letters 28 (2021), 1510–1514.
- Provos and Honeyman (2003) Niels Provos and Peter Honeyman. 2003. Hide and seek: An introduction to steganography. IEEE security & privacy 1, 3 (2003), 32–44.
- Qi et al. (2013) Cao Qi, Sun Xingming, and Xiang Lingyun. 2013. A secure text steganography based on synonym substitution. In IEEE Conference Anthology. IEEE, 1–3.
- Reimers and Gurevych (2019) Nils Reimers and Iryna Gurevych. 2019. Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084 (2019).
- Schick and Schütze (2021) Timo Schick and Hinrich Schütze. 2021. Generating datasets with pretrained language models. arXiv preprint arXiv:2104.07540 (2021).
- Shirali-Shahreza (2008) Mohammad Shirali-Shahreza. 2008. Text steganography by changing words spelling. In 2008 10th international conference on advanced communication technology, Vol. 3. IEEE, 1912–1913.
- Simmons (1984) Gustavus J Simmons. 1984. The prisoners’ problem and the subliminal channel. In Advances in Cryptology: Proceedings of Crypto 83. Springer, 51–67.
- Su et al. (2024) Wenkang Su, Jiangqun Ni, and Yiyan Sun. 2024. StegaStyleGAN: Towards Generic and Practical Generative Image Steganography. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 38. 240–248.
- Thompson (2017) Anthony Thompson. 2017. Kaggle. https://www.kaggle.com/snapcrack/all-the-news/data.
- Touvron et al. (2023) Hugo Touvron, Thibaut Lavril, Gautier Izacard, Xavier Martinet, Marie-Anne Lachaux, Timothée Lacroix, Baptiste Rozière, Naman Goyal, Eric Hambro, Faisal Azhar, et al. 2023. Llama: Open and efficient foundation language models. arXiv preprint arXiv:2302.13971 (2023).
- Wang et al. (2019) Yisen Wang, Xingjun Ma, Zaiyi Chen, Yuan Luo, Jinfeng Yi, and James Bailey. 2019. Symmetric cross entropy for robust learning with noisy labels. In Proceedings of the IEEE/CVF international conference on computer vision. 322–330.
- Wang et al. (2024) Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu, and Lingxiao Li. 2024. LLsM: Generative Linguistic Steganography with Large Language Model. arXiv preprint arXiv:2401.15656 (2024).
- Wen et al. (2019) Juan Wen, Xuejing Zhou, Ping Zhong, and Yiming Xue. 2019. Convolutional neural network based text steganalysis. IEEE Signal Processing Letters 26, 3 (2019), 460–464.
- Wu et al. (2020) Junqi Wu, Bolin Chen, Weiqi Luo, and Yanmei Fang. 2020. Audio steganography based on iterative adversarial attacks against convolutional neural networks. IEEE transactions on information forensics and security 15 (2020), 2282–2294.
- Xiang et al. (2014) Lingyun Xiang, Xingming Sun, Gang Luo, and Bin Xia. 2014. Linguistic steganalysis using the features derived from synonym frequency. Multimedia tools and applications 71 (2014), 1893–1911.
- Yang et al. (2020a) Hao Yang, YongJian Bao, Zhongliang Yang, Sheng Liu, Yongfeng Huang, and Saimei Jiao. 2020a. Linguistic steganalysis via densely connected LSTM with feature pyramid. In Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security. 5–10.
- Yang et al. (2018) Zhong-Liang Yang, Xiao-Qing Guo, Zi-Ming Chen, Yong-Feng Huang, and Yu-Jin Zhang. 2018. RNN-stega: Linguistic steganography based on recurrent neural networks. IEEE Transactions on Information Forensics and Security 14, 5 (2018), 1280–1295.
- Yang et al. (2020b) Zhong-Liang Yang, Si-Yu Zhang, Yu-Ting Hu, Zhi-Wen Hu, and Yong-Feng Huang. 2020b. VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Transactions on Information Forensics and Security 16 (2020), 880–895.
- Yao et al. (2024) Ye Yao, Junyu Wang, Qi Chang, Yizhi Ren, and Weizhi Meng. 2024. High invisibility image steganography with wavelet transform and generative adversarial network. Expert Systems with Applications (2024), 123540.
- Ye et al. (2022) Jiacheng Ye, Jiahui Gao, Qintong Li, Hang Xu, Jiangtao Feng, Zhiyong Wu, Tao Yu, and Lingpeng Kong. 2022. Zerogen: Efficient zero-shot learning via dataset generation. arXiv preprint arXiv:2202.07922 (2022).
- Yu et al. (2024) Jiwen Yu, Xuanyu Zhang, Youmin Xu, and Jian Zhang. 2024. Cross: Diffusion model makes controllable, robust and secure image steganography. Advances in Neural Information Processing Systems 36 (2024).
- Yu et al. (2023) Yue Yu, Yuchen Zhuang, Jieyu Zhang, Yu Meng, Alexander Ratner, Ranjay Krishna, Jiaming Shen, and Chao Zhang. 2023. Large language model as attributed training data generator: A tale of diversity and bias. arXiv preprint arXiv:2306.15895 (2023).
- Zhang et al. (2021) Siyu Zhang, Zhongliang Yang, Jinshuai Yang, and Yongfeng Huang. 2021. Provably Secure Generative Linguistic Steganography. In Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021. 3046–3055.
- Zhou et al. (2021) Xuejing Zhou, Wanli Peng, Boya Yang, Juan Wen, Yiming Xue, and Ping Zhong. 2021. Linguistic steganography based on adaptive probability distribution. IEEE Transactions on Dependable and Secure Computing 19, 5 (2021), 2982–2997.
- Ziegler et al. (2019) Zachary Ziegler, Yuntian Deng, and Alexander M Rush. 2019. Neural Linguistic Steganography. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). 1210–1215.