Breaking the Stealth-Potency Trade-off in Clean-Image Backdoors with Generative Trigger Optimization